Search

Your search keyword '"BERTINO, ELISA"' showing total 121,948 results

Search Constraints

Start Over You searched for: Author "BERTINO, ELISA" Remove constraint Author: "BERTINO, ELISA"
121,948 results on '"BERTINO, ELISA"'

Search Results

1. TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments

2. ZT-SDN: An ML-powered Zero-Trust Architecture for Software-Defined Networks

3. Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data

4. Uncovering Attacks and Defenses in Secure Aggregation for Federated Deep Learning

5. Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples

6. CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications

7. SoK: Leveraging Transformers for Malware Analysis

8. Transfer Learning for Security: Challenges and Future Directions

9. FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning

10. Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

11. FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge

12. Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode

13. Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements

14. Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report

15. TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support

16. Maximal Domain Independent Representations Improve Transfer Learning

17. Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation

18. Towards Efficient Privacy-Preserving Deep Packet Inspection

19. SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis

20. EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry

21. Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models

22. Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

24. Attack Management

25. Challenges in the Use of ML for Security

26. Hardware Security Analysis

27. Case Studies

28. Background on Machine Learning Techniques

29. Detection

30. Introduction

31. Security Policy Learning

32. Software Security Analysis

34. Simeon -- Secure Federated Machine Learning Through Iterative Filtering

35. Fine with '1234'? An Analysis of SMS One-Time Password Randomness in Android Apps

36. Computing Research Challenges in Next Generation Wireless Networking

37. PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols

38. Artificial Intelligence & Cooperation

39. Artificial Intelligence at the Edge

40. Black-box Model Inversion Attribute Inference Attacks on Classification Models

41. FLAP -- A Federated Learning Framework for Attribute-based Access Control Policies

42. 5G Security and Privacy: A Research Roadmap

43. Security with Privacy

45. An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks

47. Concluding Remarks

48. Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations

49. Machine Learning Techniques for Cybersecurity

50. Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions

Catalog

Books, media, physical & digital resources