SECAL 2023
|
2024 |
|
PriST-AI 2023
|
2024 |
|
Balancing XAI with Privacy and Security Considerations
|
2024 |
Spartalis, Christoforos N. |
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving
|
2024 |
Abdelsalam, Mohamed |
Firmware-Based DoS Attacks in Wireless Sensor Network
|
2024 |
Lau, Phi Tuong |
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms
|
2024 |
Grimaldi, Alexandre |
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle
|
2024 |
Kammüller, Florian |
Execution at RISC: Stealth JOP Attacks on RISC-V Applications
|
2024 |
Buckwell, Loïc |
Modeling Obfuscation Stealth Through Code Complexity
|
2024 |
Schrittwieser, Sebastian |
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI
|
2024 |
Senanayake, Janaka |
Internet Transparency Through Multi-party Computation
|
2024 |
Maćkowiak, Paweł |
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript
|
2024 |
Sigalov, Daniil |
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models
|
2024 |
Hector, Kevin |
TAURIN 2023
|
2024 |
|
ADIoT 2023
|
2024 |
|
An Opportunity-Based Approach to Information Security Risk
|
2024 |
Tran, Dinh Uy |
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
|
2024 |
Jørgensen, Cecilie Solberg |
The VOCODES Kill Chain for Voice Controllable Devices
|
2024 |
Esposito, Sergio |
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
|
2024 |
Kalutharage, Chathuranga Sampath |
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
|
2024 |
Zhou, Yuanding |