6,761 results on '"Stiller, Burkhard"'
Search Results
52. The Future Internet: Future Internet Assembly 2012: From Promises to Reality
53. On Trust, Blockchain, and Reputation Systems
54. Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices
55. A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption [Póster]
56. MERLINS : moving target defense enhanced with deep-RL for NFV in-depth security
57. Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
58. The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling
59. BUNKER: A Blockchain-based trUsted VNF pacKagE Repository
60. SEConomy: A Framework for the Economic Assessment of Cybersecurity
61. GENEVIZ: A Visual Tool for the Construction and Blockchain-Based Validation of SFC Packages
62. The Swiss Postal Voting Process and Its System and Security Analysis
63. Guardfs: A File System for Integrated Detection and Mitigation of Linux-Based Ransomware
64. Assessing the Sustainability and Trustworthiness of Federated Learning Models
65. Bypassing Cloud Providers' Data Validation to Store Arbitrary Data
66. Multi-domain DDoS Mitigation Based on Blockchains
67. SmartDEMAP: A Smart Contract Deployment and Management Platform
68. The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications
69. A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts
70. Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks
71. Traffic Management for Cloud Federation
72. Smart Contracts – Blockchains in the Wings
73. SaCI: A Blockchain-Based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage
74. Secure Crowdsensing Platforms Through Device Behavior Fingerprinting
75. An NFC Relay Attack with Off-the-shelf Hardware and Software
76. Cloud Flat Rates Enabled via Fair Multi-resource Consumption
77. MERLINS – Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security
78. Deciphering DDoS Attacks Through a Global Lens
79. Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
80. Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains
81. Deferral: on the Feasibility of High-Volume Blockchain-based Referral Systems
82. HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices
83. Behavioral Fingerprinting to Detect Ransomware in Resource-constrained Devices
84. A Technology-driven Overview on Blockchain-based Academic Certificate Handling
85. ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections
86. Trade-offs Based Decision System for Adoption of Cloud-Based Services
87. Two-Way Authentication for the Internet-of-Things
88. The Design and Evaluation of a Heaviness Metric for Cloud Fairness and Correct Virtual Machine Configurations
89. Schengen Routing: A Compliance Analysis
90. A Trustworthy Federated Learning Framework for Individual Device Identification
91. FeDef: A Federated Defense Framework Using Cooperative Moving Target Defense
92. Demo: Utilizing SRv6 to Optimize the Routing Behavior for Tactical Networks
93. Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services
94. E-Voting kann das Vertrauen in die Demokratie stärken.
95. SEConomy: A Framework for the Economic Assessment of Cybersecurity
96. GENEVIZ: A Visual Tool for the Construction and Blockchain-Based Validation of SFC Packages
97. The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling
98. The Swiss Postal Voting Process and Its System and Security Analysis
99. BUNKER: A Blockchain-based trUsted VNF pacKagE Repository
100. Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.