51 – 60 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cooperative Vehicles versus Non-Cooperative Traffic Light : Safe and Efficient Passing
(
- Contribution to journal › Article
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
2023) 2023 International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article