Search

Your search keyword '"Elisa Bertino"' showing total 711 results

Search Constraints

Start Over You searched for: Author "Elisa Bertino" Remove constraint Author: "Elisa Bertino" Topic computer Remove constraint Topic: computer
711 results on '"Elisa Bertino"'

Search Results

1. Orchestration or Automation: Authentication Flaw Detection in Android Apps

2. A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations

3. Privacy in the Era of 5G, IoT, Big Data, and Machine Learning

4. Privacy Preserving Location-Aware Personalized Web Service Recommendations

5. ATFuzzer

6. Edge-Based Intrusion Detection for IoT devices

7. A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles

8. AI-powered Network Security: Approaches and Research Directions

9. ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations

10. Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing

11. Effectiveness of Model-Based Defenses for Digitally Controlled Industrial Systems: Nuclear Reactor Case Study

12. A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration

13. How Deep Learning Is Making Information Security More Intelligent

14. Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT

15. Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations

17. Scalable non-observational predicate learning in ASP

18. AI for Security and Security for AI

19. Fine with '1234'? An Analysis of SMS One-Time Password Randomness in Android Apps

20. Zero Trust Architecture: Does It Help?

21. A security-constrained reinforcement learning framework for software defined networks

22. IoT Attacks and Malware

23. Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services

25. Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation

26. Policy based ensembles for multi domain operations

27. An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs

28. Practical Anonymous Subscription with Revocation Based on Broadcast Encryption

29. Developing A Compelling Vision for Winning the Cybersecurity Arms Race

30. On security policy migrations

31. A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems

32. An empirical study of SMS one-time password authentication in Android apps

33. Opening Pandora's box through ATFuzzer

34. Policy based Ensembles for applying ML on Big Data

35. A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models

36. Access Control Model Extensions to Support Data Privacy Protection based on GDPR

37. On the Quality of Classification Models for Inferring ABAC Policies from Access Logs

38. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices

39. PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones

40. Highly efficient randomized authentication in VANETs

41. Real-Time Digital Signatures for Time-Critical Networks

42. Pareto Optimal Security Resource Allocation for Internet of Things

43. A Collaborative DDoS Defence Framework Using Network Function Virtualization

44. Heimdall: Mitigating the Internet of Insecure Things

45. DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts

46. A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

47. Android resource usage risk assessment using hidden Markov model and online learning

48. Botnets and Internet of Things Security

49. Overview of Mobile Containerization Approaches and Open Research Directions

50. A System for Response and Prevention of Security Incidents in Wireless Sensor Networks

Catalog

Books, media, physical & digital resources