Securing Smart Vehicles Through Federated Learning

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (16. : 2022 : Bordeaux) Foundations and practice of security ; Part 1
1. Verfasser: Halim, Sadaf M. D. (VerfasserIn)
Weitere Verfasser: Hossain, Delwar (VerfasserIn), Khan, Latifur (VerfasserIn), Singhal, Anoop (VerfasserIn), Inoue, Hiroyuki (VerfasserIn), Ochiai, Hideya (VerfasserIn), Hamlen, Kevin W. (VerfasserIn), Kadobayashi, Youki (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection 2024 Vitorino, João
Using Reed-Muller Codes for Classification with Rejection and Recovery 2024 Fentham, Daniel
Practices for Assessing the Security Level of Solidity Smart Contracts 2024 Mekkouri, Mohamed
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets 2024 Dzeha, Eric Edem
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study 2024 Ridley, Norah
Hardening Systems Against Data Corruption Attacks at Design Time 2024 Breton, John
Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions? 2024 Sawaya, Yukiko
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations 2024 Andarzian, Seyed Behnam
Automated Attacker Behaviour Classification Using Threat Intelligence Insights 2024 Crochelet, Pierre
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls 2024 Koribeche, Wassim
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure 2024 Brisfors, Martin
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response 2024 Biswas, Sayan
Securing Smart Vehicles Through Federated Learning 2024 Halim, Sadaf M. D.
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection 2024 Aurora, Victor
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures 2024 Besson, Pierre-Victor
Web Scams Detection System 2024 Badawi, Emad
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware 2024 Faghihi, Farnood
Original Entry Point Detection Based on Graph Similarity 2024 Pham, Thanh-Hung
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr 2024 Lucca, Serena
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm 2024 Wang, Ruize
Alle Artikel auflisten