European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems

Livrables

Publications

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures

Auteurs: Eva Papadogiannaki, Sotiris Ioannidis
Publié dans: ACM Computing Surveys, Numéro 54/6, 2022, ISSN 1557-7341
Éditeur: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

On Architectural Support for Instruction Set Randomization

Auteurs: George Christou, Giorgos Vasiliadis, Vassilis Papaefstathiou, Antonis Papadogiannakis, Sotiris Ioannidis
Publié dans: ACM Transactions on Architecture and Code Optimization, Numéro 17/4, 2020, Page(s) 1-26, ISSN 1544-3566
Éditeur: Association for Computing Machinary, Inc.
DOI: 10.1145/3419841

A Hessian inversion-free exact second order method for distributed consensus optimization

Auteurs: Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Publié dans: IEEE Transactions on Signal and Information Processing over Networks, Numéro 8, 2022, ISSN 2373-776X
Éditeur: IEEE
DOI: 10.1109/tsipn.2022.3203860

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks

Auteurs: Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal
Publié dans: Computers & Security, Numéro 94, 2020, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101849

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey

Auteurs: Pls Jayalaxmi, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim
Publié dans: IEEE Access, Numéro 10, 2022, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3220622

A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures

Auteurs: Fabio Federici; Davide Martintoni; Valerio Senni
Publié dans: Volume 12, Numéro 5, 2022, ISSN 0000-0000
Éditeur: MDPI
DOI: 10.3390/electronics12030566

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation

Auteurs: Ernesto Gómez-Marín; Luis Parrilla; Gianfranco Mauro; Antonio Escobar-Molero; Diego P. Morales; Encarnación Castillo
Publié dans: Sensors, Numéro 7, 2022, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22135060

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Auteurs: Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar, William J Buchanan, Tai Hoon Kim
Publié dans: Journal of Network and Computer Applications, Numéro 204, 2022, ISSN 1084-8045
Éditeur: Academic Press
DOI: 10.1016/j.jnca.2022.103414

Distributed Recursive Estimation Under Heavy-Tail Communication Noise

Auteurs: D. Jakovetic, M. Vukovic, D. Bajovic, A. K. Sahu, S. Kar
Publié dans: SIAM Journal on Control and Optimization, 2022, ISSN 0363-0129
Éditeur: Society for Industrial and Applied Mathematics

Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit

Auteurs: Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun and JPC Rodrigues
Publié dans: IEEE Transactions on Services Computing, Numéro Early Access, 2022, ISSN 0000-0000
Éditeur: IEEE
DOI: 10.1109/tsc.2022.3178471

EFIX: Exact fixed point methods for distributed optimization

Auteurs: Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Publié dans: Journal of Global Optimization, 2022, Page(s) 1-25, ISSN 1573-2916
Éditeur: Springer
DOI: 10.1007/s10898-022-01221-4

Distributed nonlinear state estimation in electric power systems using graph neural networks

Auteurs: Ognjen Kundacina, Mirsad Cosovic, Dragisa Miskovic and Dejan Vukobratovic.
Publié dans: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2022, 2022, Page(s) 8-13
Éditeur: IEEE
DOI: 10.1109/smartgridcomm52983.2022.9960967

The Million Dollar Handshake Secure and Attested Communications in the Cloud

Auteurs: Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publié dans: Conference: IEEE CLOUD 2020, 2020
Éditeur: TBD

Andromeda: Enabling Secure Enclaves For The Android Ecosystem

Auteurs: Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis.
Publié dans: 24th Information Security Conference (ISC)., Numéro LNSC, volume 13118, 2021
Éditeur: Spinger
DOI: 10.1007/978-3-030-91356-4_11

Machine learning methods for device identification using wireless fingerprinting.

Auteurs: Srđan Šobot, Vukan Ninković, Dejan Vukobratović, Milan Pavlović and Miloš Radovanović
Publié dans: 5th International Balkan Conference on Communications and Networking (BalkanCom), Sarajevo, Bosnia and Herzegovina, 2022, Page(s) 83-188
Éditeur: IEEE
DOI: 10.1109/balkancom55633.2022.9900723

PoSC: Combined Score for Consensus in Intemet-of-Things Applications

Auteurs: Arshdeep Singh, Rahul Saha, Mauro Conti, Gulshan Kumar
Publié dans: Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022
Éditeur: IEEE
DOI: 10.1109/bcca55292.2022.9922056

On Matrix Multiplication with Homomorphic Encryption

Auteurs: Panagiotis Rizomiliotis; Aikaterini Triakosia
Publié dans: In Proceedings of the 2022 on Cloud Computing Security Workshop (CCSW'22), Numéro 7, 2022, ISBN 9781450398756
Éditeur: ACM
DOI: 10.1145/3560810.3564267

Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures

Auteurs: Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni
Publié dans: SECRYPT 2022, 2022, Page(s) 499-506
Éditeur: ScitePress
DOI: 10.5220/0011144700003283

An enclave assisted snapshot-based kernel integrity monitor

Auteurs: Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publié dans: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24, ISBN 9781450371322
Éditeur: ACM
DOI: 10.1145/3378679.3394539

Towards achieving confidentiality in Hyperledger Fabric

Auteurs: Benedikt Hofmann, Prabhakaran Kasinathan, Martin Wimmer
Publié dans: IEEE International Conference on Blockchain (Blockchain), 2022
Éditeur: IEEE
DOI: 10.1109/blockchain55522.2022.00060

Secure Remote Maintenance via Workflow-Driven Security Framework

Auteurs: Kasinathan, Prabhakaran, Davide Martinoni, Benedikt Hofmann, Valerio Senni, Martin Wimmer
Publié dans: Conference: IEEE Blockchain 2021, 2021
Éditeur: IEEE
DOI: 10.1109/blockchain53845.2021.00016

Employing a consensus nonlinearity in distributed estimation under heavy-tail noise

Auteurs: Manojlo Vukovic, Dusan Jakovetic, Dragana Bajovic, Anit Kumar Sahu, Soummya Kar
Publié dans: 32nd EURO 2022 Conference, 2022
Éditeur: In selected journals by the conference

SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning

Auteurs: Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah, Mauro Conti
Publié dans: Privacy Enhancing Technologies Symposium (PETS), 2023, Page(s) 140–157
Éditeur: N/A
DOI: 10.56553/popets-2023-0009

Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning

Auteurs: Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah
Publié dans: Annual Computer Security Applications Conference (ACSAC 2022), 2022, Page(s) 146-158
Éditeur: N/A
DOI: 10.1145/3564625.3568135

Network Intrusion Detection in Encrypted Traffic

Auteurs: Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis
Publié dans: The Fourth International Workshop on Secure Smart Societies in Next Generation Networks (IEEE DSC 2022), 2022
Éditeur: IEEE
DOI: 10.1109/dsc54232.2022.9888942

, Edge Machine Learning in 3GPP NB-IoT: Architecture, Applications and Demonstration

Auteurs: D. Vukobratovic, M. Lukic, I. Mezei, D. Bajovic, D. Danilovic, M. Savic, Z. Bodroski, S. Skrbic, D. Jakovetic
Publié dans: European Signal Processing Conference, EUSIPCO 2022, 2022, Page(s) 707-711
Éditeur: IEEE
DOI: 10.23919/eusipco55093.2022.9909793

Sensitive information protection in blockchain-based supply-chain management for aerospace

Auteurs: Davide Martintoni, Valerio Senni, Ernesto Gomez Marin, Javier Cabrera Gutierrez
Publié dans: IEEE International Conference on Omni-layer Intelligent Systems (COINS), 2022, 2022
Éditeur: IEEE
DOI: 10.1109/coins54846.2022.9854974

Homomorphic Encryption in Manufacturing Compliance Checks

Auteurs: Aikaterini Triakosia, Panagiotis Rizomiliotis, Konstantinos Tserpes, Cecilia Tonelli, Valerio Senni, Fabio Federici
Publié dans: Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Numéro LNCS, volume 13582, 2022
Éditeur: Springer
DOI: 10.1007/978-3-031-17926-6_6

Gradient Based Clustering

Auteurs: Aleksandar Armacki; Dragana Bajovic; Dusan Jakovetic; Soummya Kar
Publié dans: The Thirty-ninth International Conference on Machine Learning, Numéro 10, 2022, ISSN 2640-3498
Éditeur: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.7007266

Peek-a-boo - i see your smart home activities, even encrypted!

Auteurs: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac
Publié dans: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, Page(s) 207-218, ISBN 9781450380065
Éditeur: ACM
DOI: 10.1145/3395351.3399421

Partially Oblivious Neural Network Inference

Auteurs: P. Rizomiliotis, C. Diou, A. Triakosia, E. Kyranas, K. Tserpes
Publié dans: 19th International Conference on Security and Cryptography SECRYPT 2022, 2022, Page(s) 158-169
Éditeur: ScitePress
DOI: 10.5220/0011272500003283

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible