Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)
OAuth 2.0 Authorization using Blockchain-based Tokens
View More Papers
Security Analysis against Spoofing Attacks for Distributed UAVs
Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)
Read MoreUIDS: Unikernel-based Intrusion Detection System for the Internet of...
Vittorio Cozzolino, Nikolai Schwellnus (Technical University of Munich, Germany); Aaron Yi Ding (Delft University of Technology, The Netherlands); Jörg Ott (Technical University of Munich, Germany)
Read MoreDesigning a Secure IoT System Architecture from a Virtual...
Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku
Read MoreMining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Read More