Networks and Security
1 – 50 of 228
- show: 50
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Resilient Cloud Control System: Dynamic Frequency Adaptation via Q-learning
2024) 27th Conference on Innovation in Clouds, Internet and Networks, ICIN(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
(
- Contribution to journal › Article
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Impact of Positioning Uncertainty on Autonomous Intersection Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CCA Security with Short AEAD Tags
(
- Contribution to journal › Article
-
Mark
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
2024)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
(
- Contribution to journal › Article
- 2023
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
2023) In International Review of Law, Computers & Technology(
- Contribution to journal › Article
-
Mark
Efficient Security Protocols for Constrained Devices
2023) In EIT series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on Post-Quantum Cryptography
2023) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Lightweight Machine Learning for Seizure Detection on Wearable Devices
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attack Resilient Cloud-Based Control Systems for Industry 4.0
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
SafeDeep: A Scalable Robustness Verification Framework for Deep Neural Networks
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
EpilepsyNet: Interpretable Self-Supervised Seizure Detection for Low-Power Wearable Systems
2023) 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Safe and Robust Autonomous Intersection Management System Using a Hierarchical Control Strategy and V2I Communication
(
- Contribution to journal › Article
-
Mark
An Open Dataset Storage Standard for 6G Testbeds
2023) p.347-352(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
2023) 2023 International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article
-
Mark
Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces
2023) 13th International Workshop on Resilient Networks Design and Modeling, RNDM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards Practical Cell-Free 6G Network Deployments: An Open-Source End-to-End Ray Tracing Simulator
2023) Asilomar(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Access Security Policy Generation for Containers as a Cloud Service
(
- Contribution to journal › Article
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
2023) 12th IEEE International Conference on Cloud Networking, IEEE CloudNet 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cooperative Vehicles versus Non-Cooperative Traffic Light : Safe and Efficient Passing
(
- Contribution to journal › Article
-
Mark
PAPR : Publicly Auditable Privacy Revocation for Anonymous Credentials
2023) Cryptographers’ Track at the RSA Conference, CT-RSA 2023 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13871 LNCS. p.163-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
(
- Contribution to journal › Article
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
2023) 24th Privacy Enhancing Technologies Symposium, PETS 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic Tasks
2023) International Conference on Cloud Networking(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Taming Cloud Integrated Systems in the Wild
2023)(
- Thesis › Doctoral thesis (compilation)
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2022
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
2022) 25th Conference on Innovation in Clouds, Internet and Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
2022) 8th International Conference on Information Systems Security and Privacy, ICISSP 2022 p.145-153(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article