We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it...
    Lin Li, Chao Chen, ... Yang **ang in Computer Security – ESORICS 2023
    Conference paper 2024
  2. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

    5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower...
    Md Nazmul Hoq, Jia Wei Yao, ... Mourad Debbabi in Computer Security – ESORICS 2023
    Conference paper 2024
  3. Tactics for Account Access Graphs

    Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both...
    Luca Arnaboldi, David Aspinall, ... Saša Radomirović in Computer Security – ESORICS 2023
    Conference paper 2024
  4. Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference

    Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes...
    Mengfei Ren, Haotian Zhang, ... Yu Lei in Computer Security – ESORICS 2023
    Conference paper 2024
  5. Efficient Pruning for Machine Learning Under Homomorphic Encryption

    Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that...
    Ehud Aharoni, Moran Baruch, ... Roman Vaculin in Computer Security – ESORICS 2023
    Conference paper 2024
  6. AttnCall: Refining Indirect Call Targets in Binaries with Attention

    Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge....
    Rui Sun, Yinggang Guo, ... Qingkai Zeng in Computer Security – ESORICS 2023
    Conference paper 2024
  7. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults

    It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that...
    Tingting Rao, Yixin Su, ... Hai ** in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Parallel and Distributed Data Series Processing on Modern and Emerging Hardware

    This paper summarizes state-of-the-art results on data series processing with the emphasis on parallel and distributed data series indexes that...
    Panagiota Fatourou in Management of Digital EcoSystems
    Conference paper 2024
  9. Open-Source Software Development Communities: An Analysis Approach as a Social Network

    Open-source software plays a very important role in today’s technological world. Developer communities are sharing solutions and exposing their work...
    Georgios C. Makris, Alexandros Z. Spyropoulos, Ioannis Stamelos in Management of Digital EcoSystems
    Conference paper 2024
  10. A Digital Ecosystem for Improving Product Design

    Digitization is reaching to every corner of the industry. The industry 4.0 (I4.0) movement initiated a move towards a stronger reliance on data in...
    Sylvain Lefebvre, Michaël Lecointre, ... Maher Jridi in Management of Digital EcoSystems
    Conference paper 2024
  11. Lightweight Behavior-Based Malware Detection

    Modern malware detection tools rely on special permissions to collect data that can reveal the presence of suspicious software within a machine....
    Marco Anisetti, Claudio A. Ardagna, ... Gabriele Gianini in Management of Digital EcoSystems
    Conference paper 2024
  12. Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles

    With increasing development of connected and autonomous vehicles, the risk of cyber threats on them is also increasing. Compared to traditional...
    Conference paper 2024
  13. Tables with Nulls and Functional Dependencies: Explanation and Quality of Query Answers

    Several applications today deal with tables that are the result of merging other tables coming from different sources (as when recording the results...
    Dominique Laurent, Nicolas Spyratos in Management of Digital EcoSystems
    Conference paper 2024
  14. Machine Learning Economy for Next Generation Industrial IoT: A Vision Under Web 3.0

    The centralised nature of the current Internet i.e., Web 2.0, brings data privacy and security issues to the fore as critical barriers to the...
    Sourabh Bharti, Tharindu Ranathunga, ... Alan McGibney in Management of Digital EcoSystems
    Conference paper 2024
  15. Datasets

    Modern research in the field of Human Activity Recognition primarily revolves around Machine Learning and Deep Learning, due to their substantial...
    Santosh Kumar Tripathy, Roshan Singh, ... Santosh Kumar Satapathy in Advances in Human Activity Detection and Recognition (HADR) Systems
    Chapter 2024
  16. Covid-19 Contact Tracing Application Adoption: A Technology Readiness Model Perspective

    In late December 2019, there was an unforeseen outbreak of Coronavirus (COVID-19), which resulted in a global pandemic that claimed millions of...
    Adesola Tolulope Olaegbe, Muhammad Z. I. Lallmahomed in Innovations and Interdisciplinary Solutions for Underserved Areas
    Conference paper 2024
  17. Enhancing Home Security with Pressure Mat Sensors: A Multi-modal IoT Approach

    Home security is a major concern worldwide, and there are various solutions available, but with limitations. This paper proposes a novel security...
    Karel Veerabudren, Visham Ramsurrun, ... Amar Seeam in Innovations and Interdisciplinary Solutions for Underserved Areas
    Conference paper 2024
  18. A Mobile/Tablet App-Based Patient Records Management System Using Blockchain

    As of 2022, the healthcare industry plays a crucial role in enhancing the quality of life as well as the overall well-being of individuals as it...
    Deepesh Rago, Visham Ramsurrun, ... Amar Seeam in Innovations and Interdisciplinary Solutions for Underserved Areas
    Conference paper 2024
  19. Model-Based Testing of Asynchronously Communicating Distributed Controllers

    Programmable controllers are gaining prevalence even in distributed safety-critical infrastructures, e.g., in the railway and aerospace industries....
    Bence Graics, Milán Mondok, ... István Majzik in Formal Aspects of Component Software
    Conference paper 2024
  20. IoT Attacks Countermeasures: Systematic Review and Future Research Direction

    In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and...
    Conference paper 2024
Did you find what you were looking for? Share feedback.