Search
Search Results
-
Enhancing Research Clarity: Ontology-Based Modeling of Argumentation in RPML
Navigating the research process, from problem identification to argumentation construction, challenges novice researchers. This study introduces RPML... -
A Hierarchical Knowledge Framework for Digital Twins of Buildings and Their Energy Systems (Position Paper)
This position paper explores applying the Data, Information, Knowledge, Wisdom (DIKW) framework to Digital Twins of buildings and their energy... -
An Explanation User Interface for a Knowledge Graph-Based XAI Approach to Process Analysis
In consulting practice, effective use of AI technologies presupposes consultant’s and client’s ability to understand generated results. Our knowledge... -
Smart Appliance Abnormal Electrical Power Consumption Detection
Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home... -
Projective Space Stern Decoding and Application to SDitH
We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size... -
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of... -
Device Fingerprinting in a Smart Grid CPS
Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms... -
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms... -
Game Theoretic Modeling of Insider Threats in an Organization
Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies.... -
One Time Chat – A Toy End-to-End Encrypted Web Messaging Service
In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web... -
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image... -
Physically Unclonable Fingerprints for Authentication
We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method... -
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic... -
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms
Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be... -
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
In the race for quantum-safe cryptography, fostered by the ongoing National Institute of Standards and Technology (NIST) post-quantum standardization... -
Diversity Algorithms for Laser Fault Injection
Before third-party evaluation and certification, manufacturers often conduct internal security evaluations on secure hardware devices, including... -
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection
Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe... -
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning
Microgrids face challenges in monitoring and controlling the power quality (PQ) of integrated electrical systems to make timely decisions.... -
EasyLog: An Efficient Kernel Logging Service for Machine Learning
Recently, logs serves as a crucial tool to monitor system’s real-time state for experiments and generate data for machine learning. However, the... -
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures
Critical National Infrastructure (CNI) is vital and critical to the delivery of essential services to society and is necessary for a country to...