Linked e-resources

Details

Machine Learning Security
LOM: Lightweight classifier for obfuscation methods
A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection
Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks
On the robustness of intrusion detection systems for vehicles against adversarial attacks
A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems
Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments
Research on improvement of anomaly detection performance in industrial control systems
Cryptography
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem
Anonymous IBE from PEKS : A Generic Construction
Secure Computation of Shared Secrets and Its Applications
Pattern Matching over Encrypted Data with a Short Ciphertext
Efficient adaptation of TFHE for high end-to-end throughput
AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling
Hardware Security
Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers
Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors
Quantitative Analysis on Attack Capacity in Meltdown-type Attacks
Application Security
Adaptive Network Security Service Orchestraction based on SDN/NFV
A General Framework for Matching Pattern Hiding in Deep Packet Inspection
A Privacy-Preserving Payment Model for EV Charging
Measuring Healthcare Data Breaches
BadASLR: Exceptional cases of ASLR aiding Exploitation.

Browse Subjects

Show more subjects...

Statistics

from
to
Export