Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
View More Papers
Security Analysis against Spoofing Attacks for Distributed UAVs
Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)
Read MoreOAuth 2.0 Authorization using Blockchain-based Tokens
Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)
Read MoreBridging the Cyber and Physical Worlds using Blockchains and...
Nikos Fotiou, Vasilios A. Siris, Spyros Voulgaris, George C. Polyzos and Dmitrij Lagutin
Read MoreIoT Security Solution Distribution via DLT
Le Su (Nanyang Technological University, Singapore); Dinil Mon Divakaran (Trustwave, Singapore); Sze Ling Yeo (Institute for Infocomm Research, Singapore); Jiqiang Lu (Beihang University, China); Vrizlynn Thing (National University of Singapore, Singapore)
Read More