Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)
OAuth 2.0 Authorization using Blockchain-based Tokens
View More Papers
Designing a Secure IoT System Architecture from a Virtual...
Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku
Read MoreADROIT: Detecting Spatio-Temporal Correlated Attack-Stages in IoT Networks
Dinil Mon Divakaran (Trustwave, Singapore); Rhishi Pratap Singh, Kushan Sudheera Kalupahana Liyanage, Mohan Gurusamy (National University of Singapore, Singapore); Vinay Sachidananda (Trustwave, Singapore)
Read MoreInformation Leaks in Sequential Federated Learning
Anastassiya Pustozerova and Rudolf Mayer (SBA Research, Austria)
Read MoreMining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)
Read More