Filter
Conference contribution

Search results

  • Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

    de Vos, A., Brighente, A. & Conti, M., 2023, Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT and SECOMANE 2022, EIS 2022, and SecAssure 2022, Revised Selected Papers. Katsikas, S., Cuppens, F., Kalloniatis, C., Mylopoulos, J., Pallas, F., Pohle, J., Sasse, M. A., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Maestre Vidal, J., Sotelo Monge, M. A., Albanese, M., Katt, B., Pirbhulal, S. & Shukla, A. (eds.). Cham: Springer, p. 67-80 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13785).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    107 Downloads (Pure)
  • Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias

    Manzoni, L., Mariot, L. & Tuba, E., 2021, 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 234-240 7 p. 9644116

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA

    Rezaeezade, A., Perin, G. & Picek, S., 2022, Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Proceedings. Batina, L. & Daemen, J. (eds.). Springer, p. 397-421 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13503 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    25 Downloads (Pure)
  • Towards an Error Control Scheme for a Publish/Subscribe Network

    Stais, C., Voulimeneas, A. & Xylomenos, G., 2013, 2013 National Conference on Communications, NCC 2013.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Towards an evolutionary-based approach for natural language processing

    Manzoni, L., Jakobovic, D., Mariot, L., Picek, S. & Castelli, M., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 985-993 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    49 Downloads (Pure)
  • Towards a traffic map of the Internet Connecting the dots between popular services and users: Connecting the dots between popular services and users

    Koch, T., Jiang, W., Luo, T., Gigis, P., Zhang, Y., Vermeulen, K., Aben, E., Calder, M., Katz-Bassett, E., Manassakis, L., Smaragdakis, G. & Vallina-Rodriguez, N., 2021, HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks. Association for Computing Machinery (ACM), p. 23-30 8 p. (HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    297 Downloads (Pure)
  • Towards Automatic Principles of Persuasion Detection Using Machine Learning Approach

    Bustio-Martínez, L., Herrera-Semenets, V., García-Mendoza, J-L., González-Ordiano, J. Á., Zúñiga-Morales, L., Sánchez Rivero, R., Quiróz-Ibarra, J. E., Santander-Molina, P. A., van den Berg, J. & Buscaldi, D., 2024, Progress in Artificial Intelligence and Pattern Recognition - 8th International Congress on Artificial Intelligence and Pattern Recognition, IWAIPR 2023, Proceedings. Hernández Heredia, Y., Milián Núñez, V. & Ruiz Shulcloper, J. (eds.). Cham: Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14335 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • TRADE: A Transparent, Decentralized Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-6 6 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 4).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience

    Carlet, C., Heuser, A. & Picek, S., 2017, Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Trajectory Hiding and Sharing for Supply Chains with Differential Privacy

    Li, T., Xu, L., Erkin, Z. & Lagendijk, R. L., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer, p. 297-317 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14345 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Tulip: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication

    Ersoy, O., Erkin, Z. & Lagendijk, R. L., 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings. IEEE, p. 396-405 10 p. 8802398. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Tutorials at PPSN 2018

    Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Understanding bifurcation of slow versus fast cyber-attackers

    van Wieren, M., Doerr, C., Jacobs, V. & Pieters, W., 2016, Data Privacy Management and Security Assurance: 11th International Workshop DPM 2016 and 5th International Workshop QASA 2016. Livraga, G., Torra, V., Aldini, A., Martinelli, F. & Suri, N. (eds.). Cham: Springer, p. 19-33 15 p. (Lecture notes in computer science; vol. 9963).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale

    Wagner, D., Kopp, D., Wichtlhuber, M., DIetzel, C., Hohlfeld, O., Smaragdakis, G. & Feldmann, A., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 970-987 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    59 Downloads (Pure)
  • Upside Down: Exploring the Ecosystem of Dark Web Data Markets

    Covrig, B., Mikelarena, E. B., Rosca, C., Goanta, C., Spanakis, G. & Zarras, A., 2022, ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 489-506 18 p. (IFIP Advances in Information and Communication Technology; vol. 648 IFIP).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • Using datasets from industrial control systems for cyber security research and education

    Lin, Q., Verwer, S., Kooij, R. & Mathur, A., 2020, Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers. Nadjm-Tehrani, S. (ed.). Springer, Vol. 11777. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11777 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    37 Downloads (Pure)
  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    23 Downloads (Pure)
  • VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design

    Ren, Z. & Erkin, Z., 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer, Vol. 11598. p. 487-507 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598)(Security and Cryptology; vol. 11598).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    75 Downloads (Pure)
  • Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism

    Xu, L., Li, T. & Erkin, Z., 2023, Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). Danvers: IEEE, p. 266-273 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Victim-aware adaptive covert channels

    Bortolameotti, R., van Ede, T., Continella, A., Everts, M., Jonker, W., Hartel, P. & Peter, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Vulnerability Detection on Mobile Applications Using State Machine Inference

    van der Lee, W. & Verwer, S., 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2018. Los Alamitos, CA: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    149 Downloads (Pure)
  • Watermarking Graph Neural Networks based on Backdoor Attacks

    Xu, J., Koffas, S., Ersoy, O. & Picek, S., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 1179-1197 19 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    7 Downloads (Pure)
  • What Do You See? Transforming Fault Injection Target Characterizations

    Krček, M., 2022, Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Proceedings. Batina, L., Picek, S. & Mondal, M. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13783 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    83 Downloads (Pure)
  • Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

    Chen, Y., Li, M., Zheng, S., Lal, C. & Conti, M., 2021, Security and Trust Management - 17th International Workshop, STM 2021, Proceedings. Roman, R. & Zhou, J. (eds.). 17 ed. Darmstadt, Germany: Springer, Vol. 13075. p. 43-61 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13075 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum

    Tjiam, K., Wang, R., Chen, H. & Liang, K., 2021, CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021. Association for Computing Machinery (ACM), p. 25-35 11 p. (CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    583 Downloads (Pure)