Stop the war!
Остановите войну!
for scientists:
default search action
EICC 2022: Barcelona, Spain
- David Megías, Roberto Di Pietro, Joaquín García-Alfaro:
EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022. ACM 2022, ISBN 978-1-4503-9603-5 - Aykan Inan:
Method for Approximating RSA Prime Factors. 1-5 - Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries. 6-11 - Eileen Köhler, Daniel Spiekermann:
Smart Home as a Silent Witness - A Survey. 12-16 - Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel:
Towards Passive Identification of Aged Android Devices in the Home Network. 17-20 - Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection. 21-28 - Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson:
Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. 29-35 - Inger Anne Tøndel, Gunnar Brataas:
SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation. 36-41 - Venkata Sai Charan Putrevu, Gowtham Ratnakaram, Sandeep K. Shukla:
DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor. 42-48 - Martin Atzmueller, Rushed Kanawati:
Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological Overview. 49-52 - Marek Pawlicki, Rafal Kozik, Michal Choras:
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach. 53-56 - Agathe Blaise, Elena Mihailescu, Bruno Vidalenc, Laurent Aufrechter, Darius Mihai, Mihai Carabas:
Learning Model Generalisation for Bot Detection. 57-63 - Slawomir Matelski:
Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication. 64-71 - Pawel Szumelda, Natan Orzechowski, Mariusz Rawski, Artur Janicki:
VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection. 72-78 - Carina Heßeling, Jörg Keller:
Pareto-Optimal Covert Channels in Sensor Data Transmission. 79-84 - Febrianti Wibawa, Ferhat Özgür Çatak, Murat Kuzlu, Salih Sarp, Umit Cali:
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case. 85-90 - Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski:
Creating vulnerabilities and exploits database of IoT devices. 91-92 - Andraz Hovnik, Luka Jelovcan, Anze Mihelic, Simon Vrhovec:
Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey. 93-94 - Ena Barcic, Petra Grd, Igor Tomicic, Bogdan Okresa Duric:
Age Estimation of Occluded Faces using EfficientNet-B3 CNN Model. 95-96 - Alberto Pedrouzo-Ulloa, Fernando Pérez-González, David Vázquez-Padín:
Secure Collaborative Camera Attribution✱. 97-98 - Christian Oliva, Santiago Palmero Muñoz, Luis Fernando Lago-Fernández, David Arroyo:
Improving LSTMs' under-performance in Authorship Attribution for short texts. 99-101 - Aleksandar Velinov, Aleksandra Mileva:
POSTER: Launching a ZIP Bomb on the DICOM-enabled Devices. 102-103 - Gerhard Steinke, Ryan C. LaBrie, Satadipa Sarkar:
Recommendation for Continuous Ethical Analysis of AI Algorithms. 104-106 - Steffen Wendzel, Luca Caviglione, Bernhard Fechner:
Steganography Hiding Patterns: A Brief Review. 107-108 - Carina Heßeling, Jörg Keller, Sebastian Litzinger:
Kleptography in Authentication Protocols: Why is it Still Possible? 109-110 - Josep Domingo-Ferrer:
Ethics by Design in Decentralized Computing. 111-113 - Fulvio Valenza:
Next Generation of Hybrid Threats. 114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.