Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)
OAuth 2.0 Authorization using Blockchain-based Tokens
View More Papers
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Thien Duc Nguyen, Phillip Rieger, Markus Miettinen and Ahmad-Reza Sadeghi (TU Darmstadt, Germany)
Read MoreSecurity Analysis against Spoofing Attacks for Distributed UAVs
Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)
Read MoreMining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Read MoreSharing Economy in Future Electricity Markets: Security and Privacy...
Mehdi Montakhabi, Shenja Van Der Graaf (IMEC-SMIT & Vrije Universiteit, Belgium); Akash Madhusudan (COSIC & KU Leuven, Belgium); Aysajan Abidin (KU Leuven, Belgium); Mustafa A. Mustafa (The University of Manchester, UK)
Read More