Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Cyber security cOmpeteNCe fOr Research anD InnovAtion

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

1st year report on exploitation, dissemination, certification and standardization (se abrirá en una nueva ventana)

First year report on exploitation dissemination certication and standardization

3rd year report on cybersecurity threats (se abrirá en una nueva ventana)

Third year report on cybersecurity threats

Final report on liaison with stakeholders (se abrirá en una nueva ventana)
3rd year report on community building and sustainability (se abrirá en una nueva ventana)

Third year report on community building and sustainability

2nd year report on innovation, exploitation, dissemination, certification and standardization (se abrirá en una nueva ventana)

Second year report on innovation exploitation dissemination certification and standardization

2nd year report on liaison with stakeholders (se abrirá en una nueva ventana)

Second year report on liaison with stakeholders

2nd year report on community building and sustainability (se abrirá en una nueva ventana)

Second year report on community building and sustainability

3rd year report on innovation, exploitation, dissemination, certification and standardization (se abrirá en una nueva ventana)

Third year report on innovation exploitation dissemination certification and standardization

3rd year report on liaison with stakeholders (se abrirá en una nueva ventana)

Third year report on liaison with stakeholders

2nd year report on cybersecurity threats (se abrirá en una nueva ventana)

Second year report on cybersecurity threats

2nd report on cybersecurity workforce diversity (se abrirá en una nueva ventana)

Second report on cybersecurity workforce diversity

Final report on innovation, exploitation, dissemination, certification and standardization (se abrirá en una nueva ventana)

Final report on innovation exploitation dissemination certification and standardization

1st report on cybersecurity workforce diversity (se abrirá en una nueva ventana)

First report on cybersecurity workforce diversity

1st year report on designing and developing ESRTE (se abrirá en una nueva ventana)

1st year report on designing and developing an European Secure Resilient and Trusted Ecosystem

1st year report on cybersecurity threats (se abrirá en una nueva ventana)

First year report on cybersecurity threats

Final report on designing and developing an ESRTE (se abrirá en una nueva ventana)

Final report on designing and developing an European Secure Resilient and Trusted Ecosystem

1st year annual report on community building (se abrirá en una nueva ventana)

First year annual report on community building

Final report on community building and sustainability (se abrirá en una nueva ventana)
Cybersecurity Roadmap for Europe (se abrirá en una nueva ventana)
1st year report on liaison with stakeholders (se abrirá en una nueva ventana)

First year report on liaison with stakeholders

2nd year report on designing and developing an ESRTE (se abrirá en una nueva ventana)

Second year report on designing and developing an European Secure Resilient and Trusted Ecosystem

3rd year report on designing and developing an ESRTE (se abrirá en una nueva ventana)

Third year report on designing and developing an European Secure Resilient and Trusted Ecosystem

Publicaciones

Obfuscation-Resilient Executable Payload Extraction From Packed Malware (se abrirá en una nueva ventana)

Autores: Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion
Publicado en: USENIX Security Symposium, 2021
Editor: USENIX
DOI: 10.5281/zenodo.5653364

DDoS Hide & Seek - On the Effectiveness of a Booter Services Takedown (se abrirá en una nueva ventana)

Autores: Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, Christoph Dietzel
Publicado en: Proceedings of the Internet Measurement Conference, 2019, Página(s) 65-72, ISBN 9781450369480
Editor: ACM
DOI: 10.1145/3355369.3355590

Blockchain on MSP430 with IEEE 802.15.4 (se abrirá en una nueva ventana)

Autores: Eryk Schiller; Elfat Esati; Sina Rafati Niya; Burkhard Stiller
Publicado en: The 45th IEEE Conference on Local Computer Networks (LCN), Edición 2, 2020
Editor: IEEE
DOI: 10.5167/uzh-190887

(How Much) Does a Private WAN Improve Cloud Performance? (se abrirá en una nueva ventana)

Autores: Todd Arnold; Ege Gu ̈rmeric ̧liler; Georgia Essig; Arpit Gupta; Matt Calder; Vasileios Giotsas; Ethan Katz-Bassett
Publicado en: IEEE INFOCOM 2020, Edición 2, 2020
Editor: IEEE
DOI: 10.1109/INFOCOM41043.2020.9155428

ICN With DHT Support in Mobile Networks (se abrirá en una nueva ventana)

Autores: Eryk Schiller, Timo Surbeck, Mikael Gasparyan, Burkhard Stiller, Torsten Braun
Publicado en: LCN'22 IEEE, 2022
Editor: IEEE
DOI: 10.1109/lcn53696.2022.9843373

Scheduling Machine Learning Inference on CPU-GPU Integrated Architectures (se abrirá en una nueva ventana)

Autores: Rafail Tsirbas, Giorgos Vasiliadis, Sotiris Ioannidis
Publicado en: 2022 Heterogeneity in Computing Workshop, 2022
Editor: IEEE
DOI: 10.1109/ipdpsw55747.2022.00017

Under the Hood of DANE Mismanagement in SMTP (se abrirá en una nueva ventana)

Autores: "Hyeonmin Lee; Md. Ishtiaq Ashiq; Moritz Müller; Roland van Rijswijk-Deij; Taekyoung ""Ted"" Kwon; Taejoong Chung"
Publicado en: Proceedings of the 31st USENIX Security Symposium, Security 2022, 1 - 16, Edición 2, 2022
Editor: USENIX Association
DOI: 10.5281/zenodo.7696292

Reining in the Web's Inconsistencies with Site Policy (se abrirá en una nueva ventana)

Autores: Stefano Calzavara; Tobias Urban; Dennis Tatang; Marius Steffens; Ben Stock
Publicado en: Network and Distributed System Security Symposium (NDSS), Edición 4, 2020
Editor: ISOC
DOI: 10.5281/zenodo.4312470

A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper) (se abrirá en una nueva ventana)

Autores: Federico Daidone, Barbara Carminati, and Elena Ferrari
Publicado en: IEEE International Conference on Web Services, 2022
Editor: IEEE
DOI: 10.1109/icws55610.2022.00070

Data-driven set-based estimation using matrix zonotopes with set containment guarantees

Autores: Amr Alanwar, Alexander Berndt, Karl Henrik Johansson, Henrik Sandberg
Publicado en: European Control Conference (ECC), 2022
Editor: IEEE

An open measurement dataset on the Bitcoin P2P Network (se abrirá en una nueva ventana)

Autores: Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin
Publicado en: 2021
Editor: IEEE
DOI: 10.5281/zenodo.5112933

Secure Healthcare: 5G-enabled Network Slicing for Elderly Care (se abrirá en una nueva ventana)

Autores: Bruno Dzogovic; Van Thuan Do; Bernardo Santos; Niels Jacot; Boning Feng; Thanh Van Do
Publicado en: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), 2020
Editor: IEEE
DOI: 10.5281/zenodo.3894226

DeepStream: autoencoder-based stream temporal clustering (se abrirá en una nueva ventana)

Autores: Harush, Shimon and Meidan, Yair and Shabtai, Asaf
Publicado en: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Editor: ACM
DOI: 10.1145/3412841.3442083

A Practical Analysis on Mirai Botnet Traffic (se abrirá en una nueva ventana)

Autores: Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller
Publicado en: IFIP Networking 2020, 2020
Editor: IFIP
DOI: 10.5281/zenodo.5642822

 Incident Handling for Healthcare Organizations and Supply-Chains (se abrirá en una nueva ventana)

Autores: Eftychia Lakka, George Hatzivasilis , Stelios Karagiannis, Andreas Alexopoulos , Manos Athanatos, Sotiris Ioannidis, Manolis Chatzimpyrros, Grigorios Kalogiannis, George Spanoudakis
Publicado en: 2nd IEEE Conference on ICT Solutions for eHealth (ICTS4eHealth) 2022, 2022
Editor: IEEE
DOI: 10.5281/zenodo.7349850

RPKI is Coming of Age - A Longitudinal Study of RPKI Deployment and Invalid Route Origins (se abrirá en una nueva ventana)

Autores: Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, Nick Sullivan
Publicado en: Proceedings of the Internet Measurement Conference, 2019, Página(s) 406-419, ISBN 9781450369480
Editor: ACM
DOI: 10.1145/3355369.3355596

I call BS: Fraud Detection in Crowdfunding Campaigns (se abrirá en una nueva ventana)

Autores: Perez, Beatrice and Machado, Sara and Andrews, Jerone and Kourtellis, Nicolas
Publicado en: 14th ACM Web Science Conference, 2022
Editor: ACM
DOI: 10.1145/3501247.3531541

On the Aggression Diffusion Modeling and Minimization in Twitter

Autores: Poiitis, Marinos and Vakali, Athena and Kourtellis, Nicolas
Publicado en: ACM Transactions on the Web, 2021
Editor: ACM

Flaas-enabling practical federated learning on mobile environments. (se abrirá en una nueva ventana)

Autores: Kleomenis Katevas, Diego Perino, and Nicolas Kourtellis
Publicado en: ACM MobiSys, 2022
Editor: ACM
DOI: 10.1145/3498361.3539693

Fast Kernel Error Propagation Analysis in Virtualized Environments (se abrirá en una nueva ventana)

Autores: Nicolas Coppik; Oliver Schwahn; Neeraj Suri
Publicado en: Edición 10, 2021
Editor: IEEE
DOI: 10.5281/zenodo.4442963

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations (se abrirá en una nueva ventana)

Autores: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák
Publicado en: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 2022, ISBN 978-1-4503-9670-7
Editor: ACM
DOI: 10.1145/3538969.3544458

Leveraging google’s publisher-specific ids to detect website administration (se abrirá en una nueva ventana)

Autores: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P.Markatos and Nicolas Kourtellis
Publicado en: ACM The Web Conference (WWW), 2022
Editor: ACM
DOI: 10.1145/3485447.3512124

Roll, Roll, Roll your Root: AComprehensive Analysis ofthe First Ever DNSSEC RootKSK Rollover.

Autores: Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij
Publicado en: Internet Measurement Conference (IMC '19), 2019
Editor: IMC

Identification of Attack Paths Using Kill Chain and Attack Graphs (se abrirá en una nueva ventana)

Autores: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák
Publicado en: NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium, 2022, ISBN 978-1-6654-0601-7
Editor: IEEE
DOI: 10.1109/noms54207.2022.9789803

User tracking in the post-cookie era: How websites bypass gdpr consent to track users (se abrirá en una nueva ventana)

Autores: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P Markatos
Publicado en: The Web Conference 2021, 2021
Editor: ACM
DOI: 10.1145/3442381.3450056

Identification of Twitter Bots Based on an Explainable Machine Learning, Framework: The US 2020 Elections Case Study (se abrirá en una nueva ventana)

Autores: Alexander Shevtsov, Christos Tzagkarakis,  Despoina Antonakaki, Sotiris Ioannidis
Publicado en: ICWSM 2022, 2022
Editor: AAAI
DOI: 10.1609/icwsm.v16i1.19349

Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

Autores: Killer, Christian; Thorbecke, Lucas; Rodrigues, Bruno; Scheid, Eder; Franco, Muriel; Stiller, Burkhard
Publicado en: 45th Conference on Local Computer Networks (LCN), Edición 1, 2020
Editor: IEEE

Under the Spotlight: Web Tracking in Indian Partisan News Websites (se abrirá en una nueva ventana)

Autores: Vibhor Agarwal, Yash Vekaria, Pushkal Agarwal, Sangeeta Mahapatra, Shounak Set, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Publicado en: Proceedings of the Fifteenth International AAAI Conference on Web and Social Media(ICWSM 2021), 2021
Editor: AAAI
DOI: 10.5281/zenodo.5653541

Forecasting the Impact of IXP Outages Using Anycas (se abrirá en una nueva ventana)

Autores: Bertholdo, Leandro M and Ceron, Joao M and Granville, Lisandro Z and van Rijswijk-Deij, Roland
Publicado en: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Editor: IFIP
DOI: 10.5281/zenodo.5645355

An Assurance-Based Risk Management Framework for Distributed Systems (se abrirá en una nueva ventana)

Autores: Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Andrea Foppiani
Publicado en: 2021 IEEE International Conference on Web Services (ICWS), 2021, Página(s) 482-492, ISBN 978-1-6654-1681-8
Editor: IEEE
DOI: 10.1109/icws53863.2021.00068

tsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS

Autores: Giovane Moura, Sebastian Castro, John Heidemann Wes Hardaker
Publicado en: ACM Internet Measurement Conference 2021, 2021
Editor: ACM

Data-driven Set-based Estimation of Polynomial Systems with Application to SIR Epidemics (se abrirá en una nueva ventana)

Autores: Amr Alanwar, Muhammad Umar B Niazi, Karl H Johansson
Publicado en: European Control Conference (ECC), 2022
Editor: IEEE
DOI: 10.23919/ecc55457.2022.9837988

The Rise and Fall of Fake News sites: A Traffic Analysis (se abrirá en una nueva ventana)

Autores: Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos, Nicolas Kourtellis
Publicado en: 13th ACM Web Science Conference 2021, 2021
Editor: ACM
DOI: 10.1145/3447535.3462510

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure (se abrirá en una nueva ventana)

Autores: Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, K.C. Claffy, Anna Sperotto
Publicado en: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Editor: FIP
DOI: 10.5281/zenodo.5645314

KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function (se abrirá en una nueva ventana)

Autores: Sina Rafati Niya; Benjamin Jeffrey; Burkhard Stiller
Publicado en: The 45th IEEE Conference on Local Computer Networks (LCN), Edición 2, 2020
Editor: IEEE
DOI: 10.5167/uzh-191961

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts (se abrirá en una nueva ventana)

Autores: Christof Ferreira Torres, Antonio Ken Iannillo , Arthur Gervais , and Radu State
Publicado en: Euro S&P, 2021
Editor: IEEE
DOI: 10.5281/zenodo.5653502

MENTOR: The Design and Evaluation of a Protection Services Recommender System (se abrirá en una nueva ventana)

Autores: Franco, Muriel; Rodrigues, Bruno; Stiller, Burkhard
Publicado en: Edición 45, 2019
Editor: IFIP
DOI: 10.5281/zenodo.3674270

Gender differences in privacy awareness on social networking sites (se abrirá en una nueva ventana)

Autores: Lili Nemec Zlatolas, Tatjana Welzer
Publicado en: 8th ACM Celebration of Women in Computing: womENcourage™ 2021, 2021
Editor: ACM
DOI: 10.5281/zenodo.5153130

Do You Really Like Me? Anycast Latency and Root DNS Popularity (se abrirá en una nueva ventana)

Autores: John Heidemann(USC/ISI, USC/Computers) Giovane Moura (SIDN Labs), Wes Hardaker (USC/ISI)
Publicado en: DINR 2021 Workshop, 2021
Editor: -
DOI: 10.5281/zenodo.5793117

When parents and children disagree: Diving into DNS delegation inconsistency

Autores: Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, KC Claffy, Anna Sperotto
Publicado en: 2020
Editor: Springer

Domain Name Lifetimes: Baseline and Threats (se abrirá en una nueva ventana)

Autores: Antonia Affinito; Raffaele Sommese; Gautam Akiwate; Stefan Savage; KC Claffy; Geoffrey M. Voelker; Alessio Botta; Mattijs Jonker
Publicado en: Proceedings of the 6th edition of the Network Traffic Measurement and Analysis Conference (TMA Conference 2022), 2022
Editor: International Federation for Information Processing (IFIP)
DOI: 10.5281/zenodo.7695956

Towards Efficient and Secure Analysis of Large Datasets (se abrirá en una nueva ventana)

Autores: Stelvio Cimato, Stefano Nicolo
Publicado en: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020, Página(s) 1351-1356, ISBN 978-1-7281-7303-0
Editor: IEEE
DOI: 10.1109/compsac48688.2020.00-68

A Bayesian Model Combination based approach to Active Malware Analysis (se abrirá en una nueva ventana)

Autores: Abhilash Hota, J. Schönwälder
Publicado en: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022
Editor: IEEE
DOI: 10.1109/csr54599.2022.9850338

Challenges in Identifying Network Attacks Using Netflow Data (se abrirá en una nueva ventana)

Autores: Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt
Publicado en: IEEE International Symposium on Network Computing and Applications (NCA), 2021
Editor: IEEE
DOI: 10.5281/zenodo.5866276

TrustAV - Practical and Privacy Preserving Malware Analysis in the Cloud (se abrirá en una nueva ventana)

Autores: Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis
Publicado en: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020, Página(s) 39-48, ISBN 9781450371070
Editor: ACM
DOI: 10.1145/3374664.3375748

Failure Diagnosis for Cluster Systems using Partial Correlations (se abrirá en una nueva ventana)

Autores: Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri
Publicado en: The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'21), 2021
Editor: IEEE
DOI: 10.5281/zenodo.5509414

YouTubing at Home: Media Sharing Behavior Change as Proxy for MobilityAround COVID-19 Lockdowns (se abrirá en una nueva ventana)

Autores: Mejova, Yelena; Kourtellis, Nicolas
Publicado en: 13th ACM Web Science Conference 2021, 2021
Editor: ACM
DOI: 10.1145/3447535.3462494

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems (se abrirá en una nueva ventana)

Autores: Moshe Kravchik; Battista Biggio; Asaf Shabtai
Publicado en: Edición 15, 2021
Editor: ACM
DOI: 10.1145/3412841.3441892

FLaaS - Federated Learning as a Service (se abrirá en una nueva ventana)

Autores: Nicolas Kourtellis, Kleomenis Katevas, Diego Perino
Publicado en: Proceedings of the 1st Workshop on Distributed Machine Learning, 2020, Página(s) 7-13, ISBN 9781450381826
Editor: ACM
DOI: 10.1145/3426745.3431337

Blockchain-based bug bounty framework (se abrirá en una nueva ventana)

Autores: Badash, L., Tapas, N., Nadler, A., Longo, F. and Shabtai, A.
Publicado en: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Editor: ACM
DOI: 10.1145/3412841.3441906

Differential Tracking Across Topical Webpages of Indian News Media (se abrirá en una nueva ventana)

Autores: Yash Vekaria, Vibhor Agarwal, Pushkal Agarwal, Sangeeta Mahapatra, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Publicado en: 13th ACM Web Science Conference 2021, 2021
Editor: ACM
DOI: 10.1145/3447535.3462497

Cybersecurity in the Era of Digital Transformation: The case of Greece (se abrirá en una nueva ventana)

Autores: Leandros Maglaras; George Drivas; Nestoras Chouliaras; Eerke Boiten; Costas Lambrinoudakis; Sotiris Ioannidis
Publicado en: Edición 7, 2021, Página(s) 1-5, ISBN 978-1-7281-9301-4
Editor: IEEE
DOI: 10.5281/zenodo.4462523

ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data Streams (se abrirá en una nueva ventana)

Autores: Sina Rafati Niya, Danijel Dordevic, Burkhard Stiller
Publicado en: International Symposium on Integrated Network Management (IM 2021), 2021
Editor: IFIP/IEEE
DOI: 10.1109/sa51175.2021.9507182

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Autores: Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Publicado en: CCSW 2020: The ACM Cloud Computing Security Workshop, 2020
Editor: ACM

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management (se abrirá en una nueva ventana)

Autores: Muriel Franco, Bruno Rodrigues, Eder John Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Publicado en: 16th International Conference on Network and Service Management (CNSM 2020), 2020
Editor: IFIP
DOI: 10.23919/cnsm50824.2020.9269037

Measuring the (over)use of service workers for in-page push advertising purposes (se abrirá en una nueva ventana)

Autores: George Pantelakis, Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P Markatos
Publicado en: Passive Active Measurements Conference (PAM), 2022
Editor: Springer
DOI: 10.1007/978-3-030-98785-5_19

Multi-Layer Threat Analysis of the Cloud (Poster)

Autores: Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri
Publicado en: ACM Conference on Computer and Communications Security (CCS), 2022
Editor: ACM

Modeling aggression propagation on social media (se abrirá en una nueva ventana)

Autores: Chrysoula Terizi and Despoina Chatzakou and Evaggelia Pitoura and Panayiotis Tsaparas and Nicolas Kourtellis
Publicado en: Online Social Networks and Media, 2021
Editor: Elsevier
DOI: 10.1016/j.osnem.2021.100137

A Risk Assessment Mechanism for Android Apps (se abrirá en una nueva ventana)

Autores: Ha Xuan Son, Barbara Carminati, Elena Ferrari
Publicado en: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), 2021, Página(s) 237-244, ISBN 978-1-6654-4511-5
Editor: IEEE
DOI: 10.1109/smartiot52359.2021.00044

Æternum: A Decentralized Voting System with Unconditional Privacy

Autores: Christian Killer, Markus Knecht, Claude Müller, Bruno Rodrigues, Eder John Scheid, Muriel Franco, Burkhard Stiller
Publicado en: 2021
Editor: IEEE

Who’s Got Your Mail? Characterizing Mail Service Provider Usage (se abrirá en una nueva ventana)

Autores: Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker
Publicado en: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), 2021
Editor: ACM
DOI: 10.1145/3487552.3487820

IoT-based Access Management Supported by AI and Blockchains (se abrirá en una nueva ventana)

Autores: Eryk Schiller, Elfat Esati, Burkhard Stiller
Publicado en: 17th International Conference on Network and Service Management, 2021
Editor: IFIP
DOI: 10.5167/uzh-205714

SC-FLARE: CooperativeDDoS Signalingbased on Smart Contracts

Autores: Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller
Publicado en: IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020), 2020
Editor: IEEE

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Autores: Agarwal, Pushkal and Joglekar, Sagar and Papadopoulos, Panagiotis and Sastry, Nishanth and Kourtellis, Nicolas T
Publicado en: International Web Conference (WWW), 2020
Editor: ACM

HA-Grid: Security Aware Hazard Analysis for Smart Grids

Autores: L. Castiglione, Z. Hau, P. Ge, L. Munoz-Gonzalez, K.T. Co, F. Teng, E. C. Lupu
Publicado en: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2022
Editor: IEEE

Analyzing the Viability of UAV Missions Facing Cyber Attacks (se abrirá en una nueva ventana)

Autores: Jukka Soikkeli; Cora Perner; Emil Lupu
Publicado en: 1st Workshop on Secure and Reliable Communication and Navigation in the Aerospace Domain (SRCNAS) @ Euro S&P 2021, 2021
Editor: IEEE
DOI: 10.1109/eurospw54576.2021.00018

Safe Reinforcement Learning using Data-Driven Predictive Control

Autores: Mahmoud Selim, Amr Alanwar, M Watheq El-Kharashi, Hazem M Abbas, Karl H Johansson
Publicado en: International Conference on Communications, Signal Processing, and their Applications, 2022
Editor: IEEE

Security Assurance in Modern IoT Systems (se abrirá en una nueva ventana)

Autores: Nicola Bena; Ruslan Bondaruc; Antongiacomo Polimeno
Publicado en: 95th IEEE Vehicular Technology Conference 2022-Spring (IEEE VTC2022-Spring), workshop: 4th Workshop on Connected Intelligence for IoT and Industrial IoT Applications (C3IA), Edición 1, 2022
Editor: IEEE
DOI: 10.1109/vtc2022-spring54318.2022.9860757

Privacy–Preserving Online Content Moderation: A Federated Learning Use Case (se abrirá en una nueva ventana)

Autores: Leonidou Pantelitsa; Kourtellis Nicolas; Salamanos Nikos; Sirivianos Michael
Publicado en: CySoc workshop (part of The Web Conference 2023), Edición 2, 2023
Editor: acm
DOI: 10.5281/zenodo.7386611

Privacy Guarantees for Cloud-Based State Estimation using Partially Homomorphic Encryption 

Autores: Sawsan Emad, Amr Alanwar, Yousra Alkabani, M Watheq EL-Kharashi, Henrik Sandberg, Karl H Johansson
Publicado en: European Control Conference (ECC), 2022
Editor: IEEE

Tangled: A Cooperative Anycast Testbed

Autores: Bertholdo, Leandro M.; Ceron, Joao M.; Vries, Wouter B. de; Schmitt, Ricardo de O.; Granville, Lisandro Zambenedetti; Rijswijk-Deij, Roland van; Pras, Aiko
Publicado en: In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), 2021
Editor: IEEE/IFIP

Threat Modelling for 5G networks (se abrirá en una nueva ventana)

Autores: Santos, Bernardo; Barriga, Luis; Dzogovic, Bruno; Hassan, Ismail; Feng, Boning; Jacot, Niels; Do, Van Thuan; Van Do, Thanh
Publicado en: 2022 International Wireless Communications and Mobile Computing (IWCMC), Edición 1, 2020
Editor: IEEE
DOI: 10.1109/iwcmc55113.2022.9825149

SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage (se abrirá en una nueva ventana)

Autores: Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller
Publicado en: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 2021
Editor: IEEE
DOI: 10.5281/zenodo.5642663

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place (se abrirá en una nueva ventana)

Autores: Sina Rafati Niya; Sebastian Allemann; Arik Gabay; Burkhard Stiller
Publicado en: 15th International Conference on Network and Service Management (CNSM), 2019
Editor: IEEE
DOI: 10.23919/cnsm46954.2019.9012706

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection (se abrirá en una nueva ventana)

Autores: Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza
Publicado en: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Página(s) 153-163, ISBN 9781450383493
Editor: ACM
DOI: 10.1145/3448300.3467827

Requirements and Challenges for Secure and Trustworthy UAS Collaboration (se abrirá en una nueva ventana)

Autores: Marco Anisetti; Claudio A. Ardagna; Barbara Carminati; Elena Ferrari; Cora Lisa Perner
Publicado en: Edición 2, 2021, Página(s) 89-98, ISBN 978-1-7281-8543-9
Editor: IEEE
DOI: 10.1109/TPS-ISA50397.2020.00022

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space (se abrirá en una nueva ventana)

Autores: Pierre-Olivier Brissaud; Jérôme François; Isabelle Chrisment; Thibault Cholez; Olivier Bettan
Publicado en: Proceedings of the 12th IEEE International Workshop on Information Forensics and Security (WIFS) 2020, Edición 2, 2020, Página(s) 1-6, ISBN 978-1-7281-9930-6
Editor: IEEE
DOI: 10.5281/zenodo.4311959

The Million DollarHandshake: Secure andAttested Communications inthe Cloud

Autores: Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publicado en: IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE Cloud 2020), 2020
Editor: IEEE

A Unified Graph-Based Approach to Disinformation Detection using Contextual and Semantic Relations (se abrirá en una nueva ventana)

Autores: Marius Paraschiv, Nikos Salamanos, Costas Iordanou, Nikolaos Laoutaris, Michael Sirivianos
Publicado en: International AAAI Conference on Web and Social Media (ICWSM 2022), 2022
Editor: ICWSM
DOI: 10.5281/zenodo.5534294

Assessing the state and improving the art of parallel testing for C (se abrirá en una nueva ventana)

Autores: Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Publicado en: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019, Página(s) 123-133, ISBN 9781-450362245
Editor: ACM Press
DOI: 10.1145/3293882.3330573

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Autores: Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Publicado en: Proc. of SPIN, 2019
Editor: IEEE

A NIS Directive compliant Cybersecurity Maturity Assessment Framework (se abrirá en una nueva ventana)

Autores: G. Drivas,  A. Chatzopoulou, L. Maglaras, C. Lambrinoudakis, Allan Cook, H. Janicke
Publicado en:  Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 2020
Editor: IEEE
DOI: 10.1109/compsac48688.2020.00-20

BlockZoom: Large-Scale Blockchain Testbed (se abrirá en una nueva ventana)

Autores: Wazen M. Shbair, Mathis Steichen, Jerome Francois, Radu State
Publicado en: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Página(s) 5-6, ISBN 978-1-7281-1328-9
Editor: IEEE
DOI: 10.1109/BLOC.2019.8751230

Talon: An Automated Framework for Cross-Device Tracking Detection (se abrirá en una nueva ventana)

Autores: Solomos, Konstantinos; Ilia, Panagiotis; Ioannidis, Sotiris; Kourtellis, Nicolas
Publicado en: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Edición 8, 2019
Editor: USENIX
DOI: 10.5281/zenodo.3598091

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web (se abrirá en una nueva ventana)

Autores: Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Publicado en: Companion Proceedings of The 2019 World Wide Web Conference, 2019, Página(s) 218-226, ISBN 9781-450366755
Editor: ACM
DOI: 10.1145/3308560.3316495

Complexity Analysis of Decentralized Application Development Using Integration Tools (se abrirá en una nueva ventana)

Autores: PATRIK REK, BLAZ PODGORELEC, and MUHAMED TURKANOVIC
Publicado en: Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, Edición September 22-25, 2019, 2019
Editor: CEUR
DOI: 10.5281/zenodo.3674326

Beyond content analysis - detecting targeted ads via distributed counting (se abrirá en una nueva ventana)

Autores: Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Publicado en: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Página(s) 110-122, ISBN 9781-450369985
Editor: ACM
DOI: 10.1145/3359989.3365428

“How over is it?” Understanding the Incel Community on YouTube (se abrirá en una nueva ventana)

Autores: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos
Publicado en: 2020
Editor: CSCW
DOI: 10.5281/zenodo.3898038

A Proposal for Security Assessment of Trustzone-M Based Software (se abrirá en una nueva ventana)

Autores: Antonio Ken Iannillo, Radu State
Publicado en: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Página(s) 126-127, ISBN 978-1-7281-5138-0
Editor: IEEE
DOI: 10.1109/ISSREW.2019.00110

Auto-Encoding Robot State Against Sensor Spoofing Attacks (se abrirá en una nueva ventana)

Autores: Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
Publicado en: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Página(s) 252-257, ISBN 978-1-7281-5138-0
Editor: IEEE
DOI: 10.1109/ISSREW.2019.00080

Mobile App to SGX Enclave Secure Channel (se abrirá en una nueva ventana)

Autores: Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State
Publicado en: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Página(s) 258-263, ISBN 978-1-7281-5138-0
Editor: IEEE
DOI: 10.1109/issrew.2019.00081

Helping Users Managing Context-Based Privacy Preferences (se abrirá en una nueva ventana)

Autores: Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Publicado en: 2019 IEEE International Conference on Services Computing (SCC), 2019, Página(s) 100-107, ISBN 978-1-7281-2720-0
Editor: IEEE
DOI: 10.1109/scc.2019.00027

Using TLS Fingerprints for OS Identification in Encrypted Traffic (se abrirá en una nueva ventana)

Autores: Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
Publicado en: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Página(s) 1-6, ISBN 978-1-7281-4973-8
Editor: IEEE
DOI: 10.1109/noms47738.2020.9110319

Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud (Poster)

Autores: Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri
Publicado en: ACM Conference on Computer and Communications Security (CCS), 2022
Editor: ACM

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems (se abrirá en una nueva ventana)

Autores: Malte Granderath; Jürgen Schönwälder
Publicado en: IEEE/IFIP Network Operations and Management Symposium (NOMS), Edición 1, 2020
Editor: IEEE
DOI: 10.48550/arxiv.2303.12403

ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource (se abrirá en una nueva ventana)

Autores: Benjamin Green; Richard Derbyshire; William Knowles; James Boorman; Pierre Ciholas; Daniel Prince; David Hutchison
Publicado en: Edición 1, 2020
Editor: Usenix
DOI: 10.5281/zenodo.4311806

Fair and accurate age prediction using distribution aware data curation and augmentation (se abrirá en una nueva ventana)

Autores: Cao, Y., Berend, D., Tolmach, P., Levy, M., Amit, G., Liu, Y., Shabtai A., and Elovici Y.
Publicado en: 2022 IEEE Winter Conference on Applications of Computer Vision (WACV), 2022
Editor: IEEE
DOI: 10.5281/zenodo.5833886

A Streaming Machine Learning Framework for Online Aggression Detection on Twitter

Autores: Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis
Publicado en: International Conference on Big Data (IEEE BigData), 2020
Editor: IEEE

An Automated SMT- based Security Framework for Supporting Migrations in Cloud  Composite Services

Autores: Mohamed Oulaaffart, Rémi Badonnel, Christophe Bianco
Publicado en: NOMS 2022 IEEE/IFIP, 2022
Editor: IEEE

Fault-Enabled Chosen-Ciphertext Attacks on Kyber (se abrirá en una nueva ventana)

Autores: Julius Hermelink, Peter Pessl, and Thomas Poeppelmann
Publicado en: 22nd International Conference on Cryptology in India, 2021
Editor: Springer
DOI: 10.5281/zenodo.5718027

MMU-based Access Control for Libraries (se abrirá en una nueva ventana)

Autores: Marinos Tsantekidis and Vassilis Prevelakis
Publicado en: 18th International Conference on Security and Cryptography (SECRYPT), 2021, ISBN 978-989-758-524-1
Editor: SCITEPRESS
DOI: 10.5220/0010536706860691

A Comprehensive Study of the Bitcoin P2P Network (se abrirá en una nueva ventana)

Autores: Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin
Publicado en: 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Editor: IEEE
DOI: 10.5281/zenodo.5574869

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Autores: Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Publicado en: 2020
Editor: IFIP

Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas
Publicado en: 2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020, Página(s) 1-5, ISBN 978-1-7281-6949-1
Editor: Springer
DOI: 10.1109/MECO49872.2020.9134336

YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy (se abrirá en una nueva ventana)

Autores: Pachilakis, Michalis; Papadopoulos, Panagiotis; Laoutaris, Nikolaos; Markatos, Evangelos P; Kourtellis, Nicolas
Publicado en: ACM Measurement and Analysis of Computing Systems (POMACS), 2021
Editor: ACM
DOI: 10.1145/10.1145/3491044

HSM-based Key Management Solution for Ethereum Blockchain

Autores: Wazen Shbair, Eugene Gavrilov, and Radu State
Publicado en: 2021
Editor: IEEE

Clash of the trackers: measuring the evolution of the online tracking ecosystem

Autores: Kostantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Publicado en: International Conference on Network Traffic Measurement and Analysis Conference, 2020
Editor: ACM, IFIP

Design and implementation of cast-as-intended verifiability for a blockchain-based voting system (se abrirá en una nueva ventana)

Autores: Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller
Publicado en: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Página(s) 286-293, ISBN 9781450368667
Editor: ACM
DOI: 10.1145/3341105.3373884

SlowCoach: Mutating Code to Simulate Performance Bugs

Autores: Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri
Publicado en: International Symposium on Software Reliability Engineering (ISSRE), 2022
Editor: IEEE

ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections (se abrirá en una nueva ventana)

Autores: Muriel Figueredo Franco; Erion Sula; Bruno Rodrigues; Eder J. Scheid; Burkhard Stiller
Publicado en: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), Edición 18, 2020
Editor: springer
DOI: 10.1007/978-3-030-63058-4_3

Security Management and Visualization in a Blockchain-based Collaborative Defense (se abrirá en una nueva ventana)

Autores: Christian Killer, Bruno Rodrigues, Burkhard Stiller
Publicado en: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Página(s) 108-111, ISBN 978-1-7281-1328-9
Editor: IEEE
DOI: 10.1109/bloc.2019.8751272

Stay Thrifty, Stay Secure: AVPN-Based AssuranceFramework for HybridSystems

Autores: Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Publicado en: 17th International Conference on Security and Cryptography (SECRYPT 2020), 2020
Editor: SCITEPRESS

The Reality of Algorithm Agility - Studying the DNSSEC Algorithm Life-Cycle (se abrirá en una nueva ventana)

Autores: Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij
Publicado en: Proceedings of the ACM Internet Measurement Conference, 2020, Página(s) 295-308, ISBN 9781450381383
Editor: ACM
DOI: 10.1145/3419394.3423638

An enclave assisted snapshot-based kernel integrity monitor (se abrirá en una nueva ventana)

Autores: Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publicado en: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Página(s) 19-24, ISBN 9781450371322
Editor: ACM
DOI: 10.1145/3378679.3394539

Securing Runtime Memory via MMU manipulation (se abrirá en una nueva ventana)

Autores: Marinos Tsantekidis and Vassilis Prevelakis
Publicado en: 15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2021, ISBN 978-1-61208-919-5
Editor: IARIA XPS Press
DOI: 10.5281/zenodo.5834070

Understanding the confounding factors of inter-domain routing modeling (Poster) (se abrirá en una nueva ventana)

Autores: Savvas Kastanakis; Vasileios Giotsas; Neeraj Suri
Publicado en:  Internet Measurement Conference (IMC), Edición 1, 2022
Editor: ACM
DOI: 10.5281/zenodo.7391676

Clouding up the Internet - how centralized is DNS traffic becoming? (se abrirá en una nueva ventana)

Autores: Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian Hesselman
Publicado en: Proceedings of the ACM Internet Measurement Conference, 2020, Página(s) 42-49, ISBN 9781450381383
Editor: ACM
DOI: 10.1145/3419394.3423625

BGP Anycast Tuner: Intuitive Route Management for Anycast Services (se abrirá en una nueva ventana)

Autores: Leandro M. Bertholdo, Joao M. Ceron, Lisandro Z. Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
Publicado en: 2020 16th International Conference on Network and Service Management (CNSM), 2020, Página(s) 1-7, ISBN 978-3-903176-31-7
Editor: IEEE
DOI: 10.23919/CNSM50824.2020.9269102

Hard edges: Hardware-based Control-Flow Integrity for Embedded Devices (se abrirá en una nueva ventana)

Autores: Christou, George and Vasiliadis, Giorgos and Athanasopoulos, Elias and Ioannidis, Sotiris
Publicado en: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, 2021
Editor: Springer
DOI: 10.5281/zenodo.5653420

Enabling Digital ForensicsReadiness for Internet ofVehicles

Autores: C. Alexakosa, C. Katsinia , K. Votisb , A. Lalasb , D. Tzovarasb , D. Serpanos
Publicado en: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020, Paphos, Cyprus, 2020
Editor: EWGT

Python-Based TinyIPFIX in Wireless Sensor Networks (se abrirá en una nueva ventana)

Autores: Eryk Schiller, Ramon Huber, Burkhard Stiller
Publicado en: IEEE 46th Conference on Local Computer Networks (LCN), 2021
Editor: IEEE
DOI: 10.1109/lcn52139.2021.9525017

AC-SIF: ACE Access Control for Standardized Secure IoT Firmware Updates (se abrirá en una nueva ventana)

Autores: Joel Höglund, Anum Khurshid, Shahid Raza
Publicado en: SECURWARE 2022, 2022, ISBN 978-1-68558-007-0
Editor: IARIA
DOI: 10.5281/zenodo.7391978

Privacy-Preserving Sequential Publishing of Knowledge Graphs (se abrirá en una nueva ventana)

Autores: Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Publicado en: 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021, Página(s) 2021-2026, ISBN 978-1-7281-9184-3
Editor: IEEE
DOI: 10.1109/icde51399.2021.00194

Towards an Assurance Framework for Edge and IoT Systems (se abrirá en una nueva ventana)

Autores: Marco Anisetti, Claudio Ardagna, Nicola Bena, Ruslan Bondaruc
Publicado en: IEEE International Conference on Edge Computing  2021 (EDGE 2021), 2021
Editor: IEEE
DOI: 10.1109/edge53862.2021.00015

Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems

Autores: Pietro Colombo, Elena Ferrari, Samuele Salvia
Publicado en: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 2020
Editor: ACM

Blockchains in the Age ofSoftwarization - Hands-onExperiences withProgramming SmartContracts and Their SecurityPitfalls

Autores: Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Publicado en: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020
Editor: IEEE

Forecasting the Impact of IXP Outages Using Anycast

Autores: Leandro M. Bertholdo (Universiteit Twente), João M. Ceron (SIDN Labs), Lisandro Z. Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij(NLnet Labs)
Publicado en: Network Traffic Measurement and Analysis Conference 2021, 2021
Editor: IFIP/IEEE

Youtubers not madeforkids: Detecting channels sharing inappropriate videos targeting children (se abrirá en una nueva ventana)

Autores: Myrsini Gkolemi, Panagiotis Papadopoulos, Evangelos Markatos, and Nicolas Kourtellis
Publicado en: 14th ACM Web Science Conference, 2022
Editor: ACM
DOI: 10.1145/3501247.3531556

Bridging the Gap Between Certification and Software Development (se abrirá en una nueva ventana)

Autores: Claudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo
Publicado en: 17th International Conference on Availability, Reliability and Security (ARES 2022), 2022
Editor: ACM
DOI: 10.1145/3538969.3539012

Catching them red-handed: Real-time Aggression Detection on Social Media (se abrirá en una nueva ventana)

Autores: Herodotos Herodotou; Despoina Chatzakou; Nicolas Kourtellis
Publicado en: Edición 1, 2020
Editor: IEEE
DOI: 10.5281/zenodo.4323436

Measuring and visualizing cyber threat intelligence quality (se abrirá en una nueva ventana)

Autores: Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul
Publicado en: International Journal of Information Security, 2020, ISSN 1615-5262
Editor: Springer Verlag
DOI: 10.1007/s10207-020-00490-y

Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review (se abrirá en una nueva ventana)

Autores: Lili Nemec Zlatolas, Luka Hrgarek, Tatjana Welzer, Marko Hölbl
Publicado en: Mathematics, 2021, ISSN 2227-7390
Editor: MDPI
DOI: 10.3390/math10010146

Time-Aware Anonymization of Knowledge Graphs (se abrirá en una nueva ventana)

Autores: Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Publicado en: ACM Transactions on Privacy and Security, 2022, ISSN 2471-2566
Editor: ACM
DOI: 10.1145/3563694

Landscape of IoT security (se abrirá en una nueva ventana)

Autores: Eryk Schiller, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, Burkhard Stiller
Publicado en: Computer Science Review, 2022, ISSN 1574-0137
Editor: Elsevier BV
DOI: 10.1016/j.cosrev.2022.100467

Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers (se abrirá en una nueva ventana)

Autores: Charis Dimopoulos, Apostolos P. Fournaris, Odysseas Koufopavlou
Publicado en: Journal of Sensor and Actuator Networks, Edición 10/3, 2021, Página(s) 56, ISSN 2224-2708
Editor: mdpi
DOI: 10.3390/jsan10030056

Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection (se abrirá en una nueva ventana)

Autores: Kamišalić, A.; Kramberger, R.; Fister, I., Jr.
Publicado en: Applied Sciences, 2021, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app11177987

Evaluating the effects of access control policies within NoSQL systems (se abrirá en una nueva ventana)

Autores: Pietro Colombo, Elena Ferrari
Publicado en: Future Generation Computer Systems, Edición 114, 2021, Página(s) 491-505, ISSN 0167-739X
Editor: Elsevier BV
DOI: 10.1016/j.future.2020.08.026

WeTrace: A privacy-preserving tracing approach (se abrirá en una nueva ventana)

Autores: Muriel Franco, Bruno Rodrigues, Christian Killer, Eder John Scheid, Alessandro De Carli, Andreas Gassmann, David Schonbachler, Burkhard Stiller
Publicado en: Journal of Communications and Networks, Edición 23/5, 2021, Página(s) 374-389, ISSN 1229-2370
Editor: Korean Institute of Communication Sciences
DOI: 10.23919/jcn.2021.000021

Applying k-vertex cardinality constraints on a Neo4j graph database (se abrirá en una nueva ventana)

Autores: Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović
Publicado en: Future Generation Computer Systems, Edición 115, 2021, Página(s) 459-474, ISSN 0167-739X
Editor: Elsevier BV
DOI: 10.1016/j.future.2020.09.036

ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack (se abrirá en una nueva ventana)

Autores: Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza
Publicado en: IEEE Transactions on Dependable and Secure Computing, 2022, ISSN 1545-5971
Editor: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3147262

Looking Beyond theHorizon: Thoughts onProactive Detection ofThreats

Autores: Olivier van der Toorn and Anna Sperotto
Publicado en: Digital Threats: Research and Practice, 2020, ISSN 0001-0782
Editor: Association for Computing Machinary, Inc.

Blockchain-Based Reputation Systems: Implementation Challenges and Mitigation (se abrirá en una nueva ventana)

Autores: Ammar Battah, Youssef Iraqi, Ernesto Damiani
Publicado en: Electronics, Edición 10/3, 2021, Página(s) 289, ISSN 2079-9292
Editor: MDPI
DOI: 10.3390/electronics10030289

A novel approach for detecting vulnerable IoT devices connected behind a home NAT (se abrirá en una nueva ventana)

Autores: Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
Publicado en: Computers & Security, Edición 97, 2020, Página(s) 101968, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101968

Toward a Live BBU Container Migration in Wireless Networks (se abrirá en una nueva ventana)

Autores: Eryk Schiller, Jesutofunmi Ajayi, Silas Weber, Torsten Braun, Burkhard Stiller
Publicado en: Open Journal of the Communications Society , 2022, ISSN 2644-125X
Editor: IEEE
DOI: 10.1109/ojcoms.2022.3149965

Retrofitting post-quantum cryptography in internet protocols (se abrirá en una nueva ventana)

Autores: Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, Roland van Rijswijk-Deij
Publicado en: ACM SIGCOMM Computer Communication Review, Edición 50/4, 2020, Página(s) 49-57, ISSN 0146-4833
Editor: ACM
DOI: 10.1145/3431832.3431838

Ethereum's Peer-to-Peer Network Monitoring and Sybil Attack Prevention (se abrirá en una nueva ventana)

Autores: Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin
Publicado en: Journal of Network and Systems Management, 2022, ISSN 1064-7570
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10922-022-09676-2

Regulating data sharing across MQTT environments (se abrirá en una nueva ventana)

Autores: Pietro Colombo, Elena Ferrari, Engin Deniz Tümer
Publicado en: Journal of Network and Computer Applications, Edición 174, 2021, Página(s) 102907, ISSN 1084-8045
Editor: Academic Press
DOI: 10.1016/j.jnca.2020.102907

SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study (se abrirá en una nueva ventana)

Autores: Mohammad Hamad, Vassilis Prevelakis
Publicado en: Information, Edición 11/5, 2020, Página(s) 273, ISSN 2078-2489
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info11050273

A survey on privacy for b5g/6g: New privacy challenges, and research directions (se abrirá en una nueva ventana)

Autores: Chamara Sandeepa and Bartlomiej Siniarski and Nicolas Kourtellis and Shen Wang and Madhusanka Liyanage
Publicado en: Journal of Industrial Information Integration, 2022, ISSN 2452-414X
Editor: Elsevier
DOI: 10.1016/j.jii.2022.100405

DeepStream: Autoencoder-based stream temporal clustering and anomaly detection (se abrirá en una nueva ventana)

Autores: Shimon Harush; Yair Meidan; Asaf Shabtai
Publicado en: Computers and Security, Edición 1, 2021, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.5281/zenodo.7755943

Standardizing Smart Contracts (se abrirá en una nueva ventana)

Autores: Vittorio Capocasale, Guido Perboli
Publicado en: IEEE Access, 2022, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3202550

PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things (se abrirá en una nueva ventana)

Autores: Ahmed Lekssays, Luca Landa, Barbara Carminati, Elena Ferrari
Publicado en: Computer Networks, Edición 200, 2021, Página(s) 108512, ISSN 1389-1286
Editor: Elsevier BV
DOI: 10.1016/j.comnet.2021.108512

A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

Autores: Daniel Schlette, Marco Caselli, Günther Pernul
Publicado en: IEEE Communications Surveys & Tutorials, 2021, ISSN 1553-877X
Editor: Institute of Electrical and Electronics Engineers

Robust Data-driven Predictive Control Using Reachability Analysis (se abrirá en una nueva ventana)

Autores:  Amr Alanwar, Yvonne Sturz, Karl H Johansson
Publicado en: European Journal of Control, 2022, ISSN 0947-3580
Editor: Lavoisier
DOI: 10.1016/j.ejcon.2022.100666

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses (se abrirá en una nueva ventana)

Autores: Lior Sidi, Asaf Nadler, Asaf Shabtai
Publicado en: IEEE Access, Edición 8, 2020, Página(s) 161580-161592, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3020964

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices (se abrirá en una nueva ventana)

Autores: Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza
Publicado en: Security and Communication Networks, 2022, ISSN 1939-0114
Editor: Wiley Hindawi
DOI: 10.1155/2022/8033799

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists (se abrirá en una nueva ventana)

Autores: Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
Publicado en: Computers & Electrical Engineering, Edición 93, 2021, Página(s) 107215, ISSN 0045-7906
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2021.107215

Multi-Dimensional Certification of Modern Distributed Systems (se abrirá en una nueva ventana)

Autores: Marco Anisetti, Claudio A. Ardagna, Nicola Bena
Publicado en: IEEE Transactions on Services Computing, 2022, ISSN 1939-1374
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tsc.2022.3195071

Security Perception of IoT Devices in Smart Homes

Autores: Lili Nemec Zlatolas, Nataša Feher, Marko Hölbl
Publicado en: Journal of Cybersecurity and Privacy, 2022, ISSN 2624-800X
Editor: MDPI

A Responsible Internet to Increase Trust in the Digital World (se abrirá en una nueva ventana)

Autores: Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat
Publicado en: Journal of Network and Systems Management, Edición 28/4, 2020, Página(s) 882-922, ISSN 1064-7570
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10922-020-09564-7

PCaaD: Towards automated determination and exploitation of industrial systems (se abrirá en una nueva ventana)

Autores: Benjamin Green, Richard Derbyshire, Marina Krotofil, William Knowles, Daniel Prince, Neeraj Suri
Publicado en: Computers & Security, Edición 110, 2021, Página(s) 102424, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102424

A Security Certification Scheme for Information-Centric Networks (se abrirá en una nueva ventana)

Autores: Marco Anisetti, Claudio A. Ardagna, Filippo Berto, Ernesto Damiani
Publicado en: IEEE Transactions on Network and Service Management, 2022, ISSN 1932-4537
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tnsm.2022.3165144

Assessing Cybersecurity Threats and Risks in the Public Sector in Greece

Autores: G. Drivas,  L. Maglaras, H Janicke, S Ioannidis
Publicado en: Journal of Information Warfare, V. 19(1), 2019, ISSN 1445-3312
Editor: Peregrine Technical Solutions, LLC

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks (se abrirá en una nueva ventana)

Autores: Nemec Zlatolas, Welzer, Hölbl, Heričko, Kamišalić
Publicado en: Entropy, Edición 21/8, 2019, Página(s) 772, ISSN 1099-4300
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/e21080772

A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection (se abrirá en una nueva ventana)

Autores: Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič
Publicado en: Sensors, Edición 20/1, 2020, Página(s) 147, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20010147

The Seven Deadly Sins of the HTML5 WebAPI (se abrirá en una nueva ventana)

Autores: Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis
Publicado en: ACM Transactions on Privacy and Security, Edición 23/4, 2020, Página(s) 1-31, ISSN 2471-2566
Editor: ACM
DOI: 10.1145/3403947

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness (se abrirá en una nueva ventana)

Autores: Jan Kohlrausch, Eugene A. Brin
Publicado en: Digital Threats: Research and Practice, Edición 1/1, 2020, Página(s) 1-21, ISSN 2576-5337
Editor: Association for Computing Machinery
DOI: 10.1145/3376926

State Channel as a Service Based on a Distributed and Decentralized Web (se abrirá en una nueva ventana)

Autores: Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic
Publicado en: IEEE Access, Edición 8, 2020, Página(s) 64678-64691, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2984378

anomaly detection trusted hardware sensors for critical infrastructure legacy devices (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris; Charalambos Dimopoulos; Konstantinos Lampropoulos; Odysseas Koufopavlou
Publicado en: Volume 20, Edición 11, 2020, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.20944/preprints202002.0241.v1

A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis (se abrirá en una nueva ventana)

Autores: Ha Xuan Son, Barbara Carminati, and Elena Ferrari
Publicado en: Data Science & Engineering, 2022, ISSN 2364-1541
Editor: Springer
DOI: 10.1007/s41019-022-00189-1

Cost-effective deployment of certified cloud composite services (se abrirá en una nueva ventana)

Autores: Marco Anisetti; Claudio Agostino Ardagna; Ernesto Damiani; Filippo Gaudenzi; Gwanggil Jeon
Publicado en: Journal of Parallel and Distributed Computing, 2019, ISSN 0146-4833
Editor: ELSEVIER
DOI: 10.1016/j.jpdc.2019.09.003

Blockchain-based Privacy Enforcement in the IoT domain (se abrirá en una nueva ventana)

Autores: Federico Daidone, Barbara Carminati, Elena Ferrari
Publicado en: IEEE Transactions on Dependable and Secure Computing, 2020, Página(s) 1-1, ISSN 1545-5971
Editor: IEEE Computer Society
DOI: 10.1109/tdsc.2021.3110181

IoT Device Identification Based on Network Communication Analysis Using Deep Learning (se abrirá en una nueva ventana)

Autores: Jaidip Kotak; Yuval Elovici
Publicado en: Journal of Ambient Intelligence and Humanized Computing, Edición 1, 2022, ISSN 1868-5145
Editor: Springer
DOI: 10.48550/arxiv.2303.12800

The DNS in IoT: Opportunities, Risks, and Challenges (se abrirá en una nueva ventana)

Autores: Cristian Hesselman, Merike Kaeo, Lyman Chapin, Kimberly Claffy, Mark Seiden, Danny McPherson, Dave Piscitello, Andrew McConachie, Tim April, Jacques Latour, Rod Rasmussen
Publicado en: IEEE Internet Computing, Edición 24/4, 2020, Página(s) 23-32, ISSN 1089-7801
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MIC.2020.3005388

Efficient abac based information sharing within mqtt environments under emergencies  (se abrirá en una nueva ventana)

Autores: Pietro Colombo, Elena Ferrari, and Engin Deniz Tu ̈mer
Publicado en: Computer & Security, 2022, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102829

Blockchain Signaling System (BloSS): Cooperative Signalingof Distributed Denial-of-Service Attacks

Autores: Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller
Publicado en: Journal of Network and Systems Management (JNSM) 2020, 2020, ISSN 1064-7570
Editor: Kluwer Academic Publishers

Extracting New Temporal Features to Improve the Interpretability of Undiagnosed Type 2 Diabetes Mellitus Prediction Models (se abrirá en una nueva ventana)

Autores: Simon Kocbek, Primož Kocbek, Lucija Gosak, Nino Fijačko, Gregor Štiglic
Publicado en: Journal of Personalized Medicine, 2022, ISSN 2075-4426
Editor: MDPI
DOI: 10.3390/jpm12030368

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles (se abrirá en una nueva ventana)

Autores: Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke
Publicado en: Array, Edición 5, 2020, Página(s) 100013, ISSN 2590-0056
Editor: Elsevier
DOI: 10.1016/j.array.2019.100013

Extracting Safe Thread Schedules from Incomplete Model Checking Results (se abrirá en una nueva ventana)

Autores: Patrick Metzler, Neeraj Suri, Georg Weissenbacher
Publicado en: Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings, Edición 11636, 2019, Página(s) 153-171, ISBN 978-3-030-30922-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-30923-7_9

Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD (se abrirá en una nueva ventana)

Autores: Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman
Publicado en: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, Edición 12048, 2020, Página(s) 158-174, ISBN 978-3-030-44080-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_10

Ageing@home: A secure 5G welfare technology solution for elderlies (se abrirá en una nueva ventana)

Autores: Feng, Boning; Langhammer, Birgitta; Do, Thuan Van; Jacot, Niels; Santos, Bernardo; Dzogovic, Bruno; Nesse, Per Jonny; Van Do, Thanh
Publicado en: Smart Objects and Technologies for Social Good, Edición 17, 2021, ISBN 9783030914202
Editor: springer
DOI: 10.1007/978-3-030-91421-9_16

"A ""responsible internet"": more confidence in the foundation of the digital society; a new way of internet communication (in Dutch)" (se abrirá en una nueva ventana)

Autores: Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M. Moura,, Abhishta Abhishta, Luca Allodi, Chrysa Papagianni, Bart Nieuwenhuis,  Aiko Pras,  Cees de Laat
Publicado en: Privacy & Information Magazine, 2021
Editor: Paris Publishers
DOI: 10.5281/zenodo.5834147

"""It is just a flu"": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations" (se abrirá en una nueva ventana)

Autores: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
Publicado en: 2020
Editor: arXiv
DOI: 10.5281/zenodo.4306569

On the Influence of Twitter Trolls during the 2016 US Presidential Election (se abrirá en una nueva ventana)

Autores: Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos
Publicado en: 2019
Editor: arXiv
DOI: 10.5281/zenodo.3674304

Angry Birds Flock Together: Aggression Propagation on Social Media (se abrirá en una nueva ventana)

Autores: Chrysoula Terizi; Despoina Chatzakou; Evaggelia Pitoura; Panayiotis Tsaparas; Nicolas Kourtellis
Publicado en: 2020
Editor: arXiv
DOI: 10.5281/zenodo.3692844

On the Aggression Diffusion Modeling and Minimization in Online Social Networks (se abrirá en una nueva ventana)

Autores: Marinos Poiitis, Athena Vakali, Nicolas Kourtellis
Publicado en: 2020
Editor: arXiv
DOI: 10.5281/zenodo.3925683

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter (se abrirá en una nueva ventana)

Autores: Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos
Publicado en: 2020
Editor: arXiv
DOI: 10.5281/zenodo.3902669

WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

Autores: De Carli, A.; Franco, M.; Gassmann, A.; Killer, C.; Rodrigues, B.; Scheid, E.; Schoenbaechler, D.; Stiller, B.
Publicado en: Edición 13, 2020
Editor: arXiv

Derechos de propiedad intelectual

Siemens - 21156824.1

Número de solicitud/publicación: SA4IRA 21156824.1
Fecha: 2020-10-01
Solicitante(s): SIEMENS AKTIENGESELLSCHAFT

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0