Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
View More Papers
Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT...
Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris
Read MoreSharing Economy in Future Electricity Markets: Security and Privacy...
Mehdi Montakhabi, Shenja Van Der Graaf (IMEC-SMIT & Vrije Universiteit, Belgium); Akash Madhusudan (COSIC & KU Leuven, Belgium); Aysajan Abidin (KU Leuven, Belgium); Mustafa A. Mustafa (The University of Manchester, UK)
Read MoreIoT Security Solution Distribution via DLT
Le Su (Nanyang Technological University, Singapore); Dinil Mon Divakaran (Trustwave, Singapore); Sze Ling Yeo (Institute for Infocomm Research, Singapore); Jiqiang Lu (Beihang University, China); Vrizlynn Thing (National University of Singapore, Singapore)
Read MoreSecurity Analysis against Spoofing Attacks for Distributed UAVs
Kyo Hyun Kim (University of Illinois at Urbana-Champaign, USA); Siddhartha Nalluri (Duke University, USA); Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Yu Wang (Duke University, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Miroslav Pajic (Duke University, USA); Bo Li (University of Illinois at Urbana-Champaign, USA)
Read More