Publications | |
---|---|
D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks, Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai: Computers & Security, Volume 126, March 2023 | |
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic, Stanislav Špaček, Petr Velan, Martin Holkovič and Tomáš Plesník: NOMS 2023 - IEEE/IFIP Network Operations and Management Symposium, February 2023 | |
Safe Reinforcement Learning using Data-Driven Predictive Control, Mahmoud Selim, Amr Alanwar, M Watheq El-Kharashi, Hazem M Abbas, Karl H Johansson: International Conference on Communications, Signal Processing, and their Applications, 27 - 29 December, 2022 |
|
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs, Klement Hagenhoff and Corinna Schmitt and Gabi Dreo Rodosek: MILCOM 2022 - 2021 IEEE Military Communications Conference MILCOM, 28 November - 2 December 2022 | |
PriApp-Install: Learning User Privacy Preferences on Mobile Apps’ Installation, Ha Xuan Son, Barbara Carminati, and Elena Ferrari: International Conference on Information Security Practice and Experience, 23 - 25 November 2022 | |
Comparative analysis of permissioned blockchain frameworks for industrial applications, Vittorio Capocasale, Gotta Danilo, Guido Perboli: Blockchain: Research and Applications, 8 November 2022 | |
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services, Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor: IEEE CloudNet 2022, 7–10 November 2022 | |
Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud (Poster), Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri: ACM Conference on Computer and Communications Security (CCS), 7-11 November 2022 | |
Multi-Layer Threat Analysis of the Cloud (Poster), Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri: ACM Conference on Computer and Communications Security (CCS), 7-11 November 2022 | |
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems, Moshe Kravchik, Luca Demetrio, Battista Biggio, Asaf Shabtai: Computers & Security, Volume 122, November 2022 | |
Robust Data-driven Predictive Control Using Reachability Analysis, Amr Alanwar, Yvonne Sturz, Karl H Johansson: European Journal of Control, Volume 68, November 2022 | |
A survey on privacy for b5g/6g: New privacy challenges, and research directions, Chamara Sandeepa and Bartlomiej Siniarski and Nicolas Kourtellis and Shen Wang and Madhusanka Liyanage: Journal of Industrial Information Integration, Volume 30, November 2022 | |
Time-sensitive Multi-Flow Routing in Highly Utilized MANETs, Klement Hagenhoff and Eike Viehmann and Gabi Dreo Rodosek: 18th International Conference on Network and Service Management (CNSM), 31 October - 4 November 2022 | |
Towards Effective Performance Fuzzing (fast abstract), Yiqun Chen, Matthew Bradbury and Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 31 October - 3 November 2022 | |
SlowCoach: Mutating Code to Simulate Performance Bugs, Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 31 October - 3 November 2022 | |
HA-Grid: Security Aware Hazard Analysis for Smart Grids, L. Castiglione, Z. Hau, P. Ge, L. Munoz-Gonzalez, K.T. Co, F. Teng, E. C. Lupu: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25–28 October 2022 | |
Understanding the confounding factors of inter-domain routing modeling (Poster), Savvas Kastanakis, Vasilios Giotsas and Neeraj Suri: Internet Measurement Conference (IMC), 25 - 27 October 2022 | |
AC-SIF: ACE Access Control for Standardized Secure IoT Firmware Updates, Joel Höglund, Anum Khurshid, Shahid Raza: SECURWARE 2022, 16 - 20 Occtober 2022 | |
High-Level Synthesis design approach for Number-Theoretic Multiplier, Alexander El-Kady, Apostolos P. Fournaris, Evangelos Haleplidis, Vassilis Paliouras: 2022 IFIP/IEEE 30th International Conference on Very Large Scale Integration (VLSI-SoC), 3 - 5 October 2022 | |
Efficient abac based information sharing within mqtt environments under emergencies, Pietro Colombo, Elena Ferrari, and Engin Deniz Tu ̈mer: Computer & Security, Volume 120, September 2022 | |
ICN With DHT Support in Mobile Networks, Eryk Schiller, Timo Surbeck, Mikael Gasparyan, Burkhard Stiller, Torsten Braun: LCN'22 IEEE, 26 - 29 September 2022 | |
VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events, Eder J. Scheid, Muriel F. Franco, Fabian Kuffer, Niels Kubler, Pascal Kiechl, Burkhard Stiller: 47th IEEE Conference on Local Computer Networks (LCN 2022), 26-29 September 2022 | |
IoT device identification based on network communication analysis using deep learning, Jaidip Kotakm Yuval Elovici: Journal of Ambient Intelligence and Humanized Computing, 26 September 2022 | |
Time-Aware Anonymization of Knowledge Graphs, Anh-Tu Hoang, Barbara Carminati, Elena Ferrari: ACM Transactions on Privacy and Security, 23 September 2022 | |
IoT-Based Access Management Supported by AI and Blockchains, Eryk Schiller, Elfat Esati, Burkhard Stiller: Electronics (2079-9292), 19 September 2022 |