Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
View More Papers
Designing a Secure IoT System Architecture from a Virtual...
Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku
Read MoreIoT Security Solution Distribution via DLT
Le Su (Nanyang Technological University, Singapore); Dinil Mon Divakaran (Trustwave, Singapore); Sze Ling Yeo (Institute for Infocomm Research, Singapore); Jiqiang Lu (Beihang University, China); Vrizlynn Thing (National University of Singapore, Singapore)
Read MoreOAuth 2.0 Authorization using Blockchain-based Tokens
Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)
Read MoreSecurity Analysis against Spoofing Attacks for Distributed UAVs
Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)
Read More