A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets
|
2024 |
Bar-on, Maxwel |
Effectiveness of Binary-Level CFI Techniques
|
2024 |
Vaidya, Ruturaj K. |
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes
|
2024 |
Zamani, Mahmoud |
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports
|
2024 |
Bekhouche, Mohamed El Amine |
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
|
2024 |
Khoury, Raphaël |
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
|
2024 |
Cassagne, Julien |
Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols
|
2024 |
Paillat, Ludovic |
Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?
|
2024 |
Sawaya, Yukiko |
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
|
2024 |
Andarzian, Seyed Behnam |
Automated Attacker Behaviour Classification Using Threat Intelligence Insights
|
2024 |
Crochelet, Pierre |
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls
|
2024 |
Koribeche, Wassim |
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
|
2024 |
Brisfors, Martin |
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response
|
2024 |
Biswas, Sayan |
Securing Smart Vehicles Through Federated Learning
|
2024 |
Halim, Sadaf M. D. |
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
|
2024 |
Aurora, Victor |
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
|
2024 |
Besson, Pierre-Victor |
Web Scams Detection System
|
2024 |
Badawi, Emad |
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware
|
2024 |
Faghihi, Farnood |
Original Entry Point Detection Based on Graph Similarity
|
2024 |
Pham, Thanh-Hung |
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
|
2024 |
Lucca, Serena |