A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (16. : 2022 : Bordeaux) Foundations and practice of security ; Part 1
1. Verfasser: Bar-on, Maxwel (VerfasserIn)
Weitere Verfasser: Bezawada, Bruhadeshwar (VerfasserIn), Ray, Indrakshi (VerfasserIn), Ray, Indrajit (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets 2024 Bar-on, Maxwel
Effectiveness of Binary-Level CFI Techniques 2024 Vaidya, Ruturaj K.
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes 2024 Zamani, Mahmoud
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports 2024 Bekhouche, Mohamed El Amine
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives 2024 Khoury, Raphaël
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code 2024 Cassagne, Julien
Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols 2024 Paillat, Ludovic
Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions? 2024 Sawaya, Yukiko
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations 2024 Andarzian, Seyed Behnam
Automated Attacker Behaviour Classification Using Threat Intelligence Insights 2024 Crochelet, Pierre
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls 2024 Koribeche, Wassim
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure 2024 Brisfors, Martin
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response 2024 Biswas, Sayan
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection 2024 Vitorino, João
Using Reed-Muller Codes for Classification with Rejection and Recovery 2024 Fentham, Daniel
Practices for Assessing the Security Level of Solidity Smart Contracts 2024 Mekkouri, Mohamed
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets 2024 Dzeha, Eric Edem
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study 2024 Ridley, Norah
Hardening Systems Against Data Corruption Attacks at Design Time 2024 Breton, John
Securing Smart Vehicles Through Federated Learning 2024 Halim, Sadaf M. D.
Alle Artikel auflisten