Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations
Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)
Read MoreA Systematic Study of the Consistency of Two-Factor Authentication...
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MoreRoVISQ: Reduction of Video Service Quality via Adversarial Attacks...
Jung-Woo Chang (University of California San Diego), Mojan Javaheripi (University of California San Diego), Seira Hidano (KDDI Research, Inc.), Farinaz Koushanfar (University of California San Diego)
Read MoreShort: Rethinking Secure Pairing in Drone Swarms
Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik (Purdue University)
Read More