Linked e-resources

Details

On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement
Location Privacy, 5G AKA, and Enhancements
Local Differential Privacy for Private Construction of Classification Algorithms
IMSI Probing: Possibilities and Limitations
Honeysweeper: Towards stealthy honeytoken fingerprinting techniques
Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters
DeCrypto: Finding Cryptocurrency Miners on ISP networks
Detection of Voice Conversion Spoofing Attacks using Voiced Speech
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs
Obfuscation-resilient Semantic Functionality Identification Through Program Simulation
Malware Analysis with Symbolic Execution and Graph Kernel
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
Maraudrones Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.

Browse Subjects

Show more subjects...

Statistics

from
to
Export