A SOAR platform for standardizing and automating operational processes among IoT trustworthy environments_ ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security and Zenodo

Acceptance and acceptability – challenges and opportunities for transformative and sustainable technologies

Abstract

Completely FROST-ed: IoT issued FROST signature for Hyperledger Fabric blockchain

Abstract

ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms_IEEE Xlpore and Zenodo

Toward the Conception of a Multichain to Meet Users’ Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry

_ Available on IEEE Xplore and Zenodo

Accelerating Blockchain Applications on IoT Architecture Models – Solutions and Drawbacks_Available on AMC Journal and Zenodo

User Behavior Analysis for Malware Detection_ Springer and Zenodo

Threat intelligence using Digital Twin honeypots in Cybersecurity_IEEE Explore and Zenodo

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving_ Available on NDSS and Zenodo

User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability_RISE 2023 online proceedings and Zenodo

FLVoogd: Robust And Privacy Preserving Federated Learning _ Available on Proceedings of Machine Learning Research and Zenodo

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks_ACM Digital Library and Zenodo.

  • ID-based self-encryption via Hyperledger Fabric based smart contract _ Available on Springer and zenodo
  • Combining ID’s, Attributes, and Policies in Hyperledger Fabric_ Available on Springer and zenodo
  • Passtrans: An Improved Password Reuse Model Based on Transformer_ Available on IEEE and Zenodo
  • WordMarkov: A New Password Probability Model of Semantics_ Available on IEEE and Zenodo
  • DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay_ Available on Springer and Zenodo
  • No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent_ Available on Springer and Zenodo
  • VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents_ Available on Springer and Zenodo
  • Lighter is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption_ Available on Springer and Zenodo

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities_ Available on Springer and Zenodo

Fine-Grained Coverage-Based Fuzzing _ Available on NDSS and Zenodo