Search
Search Results
-
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it... -
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower... -
Tactics for Account Access Graphs
Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both... -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes... -
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that... -
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge.... -
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that... -
Parallel and Distributed Data Series Processing on Modern and Emerging Hardware
This paper summarizes state-of-the-art results on data series processing with the emphasis on parallel and distributed data series indexes that... -
Open-Source Software Development Communities: An Analysis Approach as a Social Network
Open-source software plays a very important role in today’s technological world. Developer communities are sharing solutions and exposing their work... -
A Digital Ecosystem for Improving Product Design
Digitization is reaching to every corner of the industry. The industry 4.0 (I4.0) movement initiated a move towards a stronger reliance on data in... -
Lightweight Behavior-Based Malware Detection
Modern malware detection tools rely on special permissions to collect data that can reveal the presence of suspicious software within a machine.... -
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles
With increasing development of connected and autonomous vehicles, the risk of cyber threats on them is also increasing. Compared to traditional... -
Tables with Nulls and Functional Dependencies: Explanation and Quality of Query Answers
Several applications today deal with tables that are the result of merging other tables coming from different sources (as when recording the results... -
Machine Learning Economy for Next Generation Industrial IoT: A Vision Under Web 3.0
The centralised nature of the current Internet i.e., Web 2.0, brings data privacy and security issues to the fore as critical barriers to the... -
Datasets
Modern research in the field of Human Activity Recognition primarily revolves around Machine Learning and Deep Learning, due to their substantial... -
Covid-19 Contact Tracing Application Adoption: A Technology Readiness Model Perspective
In late December 2019, there was an unforeseen outbreak of Coronavirus (COVID-19), which resulted in a global pandemic that claimed millions of... -
Enhancing Home Security with Pressure Mat Sensors: A Multi-modal IoT Approach
Home security is a major concern worldwide, and there are various solutions available, but with limitations. This paper proposes a novel security... -
A Mobile/Tablet App-Based Patient Records Management System Using Blockchain
As of 2022, the healthcare industry plays a crucial role in enhancing the quality of life as well as the overall well-being of individuals as it... -
Model-Based Testing of Asynchronously Communicating Distributed Controllers
Programmable controllers are gaining prevalence even in distributed safety-critical infrastructures, e.g., in the railway and aerospace industries.... -
IoT Attacks Countermeasures: Systematic Review and Future Research Direction
In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and...