TBA
View More Papers
Denial-of-Service Attacks on C-V2X Networks
Natasa Trkulja, David Starobinski (Boston University), and Randall Berry (Northwestern University)
Read MorePHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
Mitziu Echeverria (The University of Iowa), Zeeshan Ahmed (The University of Iowa), Bincheng Wang (The University of Iowa), M. Fareed Arif (The University of Iowa), Syed Rafiul Hussain (Pennsylvania State University), Omar Chowdhury (The University of Iowa)
Read MoreOn Building the Data-Oblivious Virtual Environment
Tushar Jois (Johns Hopkins University), Hyun Bin Lee, Christopher Fletcher, Carl A. Gunter (University of Illinois at Urbana-Champaign)
Read More