Search

Your search keyword '"Stiller, Burkhard"' showing total 6,761 results

Search Constraints

Start Over You searched for: Author "Stiller, Burkhard" Remove constraint Author: "Stiller, Burkhard"
6,761 results on '"Stiller, Burkhard"'

Search Results

1. FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning

2. De-VertiFL: A Solution for Decentralized Vertical Federated Learning

3. Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data

4. Towards Threat Modelling of IoT Context-Sharing Platforms

5. PACCOR4ESP: Embedded Device Security Attestation using Platform Attribute Certificates

6. DART: A Solution for Decentralized Federated Learning Model Robustness Analysis

7. The Danger Within: Insider Threat Modeling Using Business Process Models

8. SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks

9. Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds

10. Asset-centric Threat Modeling for AI-based Systems

11. QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience

12. GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware

13. Empirical and Theoretical Analysis of Liquid Staking Protocols

14. Assessing the Sustainability and Trustworthiness of Federated Learning Models

15. Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL

16. Sentinel: An Aggregation Function to Secure Decentralized Federated Learning

17. CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

18. RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

19. MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation

20. RansomAI: AI-powered Ransomware for Stealthy Encryption

22. SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

23. Real-time Tracking of Medical Devices: An Analysis of Multilateration and Fingerprinting Approaches

24. FederatedTrust: A Solution for Trustworthy Federated Learning

26. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

29. Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

30. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

32. Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

33. CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

37. On-Chain IoT Data Modification in Blockchains

38. Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

41. On Trust, Blockchain, and Reputation Systems

42. Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities

44. Blockchains and Distributed Ledgers Uncovered: Clarifications, Achievements, and Open Issues

48. SaCI: A Blockchain-Based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage

50. Multi-sector Assessment Framework – a New Approach to Analyse Cybersecurity Challenges and Opportunities

Catalog

Books, media, physical & digital resources