Mehdi Montakhabi, Shenja Van Der Graaf (IMEC-SMIT & Vrije Universiteit, Belgium); Akash Madhusudan (COSIC & KU Leuven, Belgium); Aysajan Abidin (KU Leuven, Belgium); Mustafa A. Mustafa (The University of Manchester, UK)

View More Papers

Security Analysis against Spoofing Attacks for Distributed UAVs

Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)

Read More

Bridging the Cyber and Physical Worlds using Blockchains and...

Nikos Fotiou, Vasilios A. Siris, Spyros Voulgaris, George C. Polyzos and Dmitrij Lagutin

Read More

Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks

Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)

Read More