Download the presentation
A SOAR platform for standardizing and automating operational processes among IoT trustworthy environments_ ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security and Zenodo
Acceptance and acceptability – challenges and opportunities for transformative and sustainable technologies
SiHoneypot: a Digital Twin-based honeypot for Autonomous Vehicles_ 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST) and Zenodo
Completely FROST-ed: IoT issued FROST signature for Hyperledger Fabric blockchain
Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain_ Blockchain and Distributed Ledger Technology as a Service: Architecture, Networking and Applications) and Zenodo
ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms_IEEE Xlpore and Zenodo
A New Design for Self-Encryption_ TrustCom 2023 proceedings and Zenodo
Toward the Conception of a Multichain to Meet Users’ Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry
_ Available on IEEE Xplore and Zenodo
Accelerating Blockchain Applications on IoT Architecture Models – Solutions and Drawbacks_Available on AMC Journal and Zenodo
Threat intelligence using Digital Twin honeypots in Cybersecurity_IEEE Explore and Zenodo
User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability_RISE 2023 online proceedings and Zenodo
Fine-Grained Coverage-Based Fuzzing_ Available on ACM Transactions on Software Engineering and Methodology Journal and Zenodo
FLVoogd: Robust And Privacy Preserving Federated Learning _ Available on Proceedings of Machine Learning Research and Zenodo
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks_ACM Digital Library and Zenodo.
- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay_ Available on Springer and Zenodo
- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent_ Available on Springer and Zenodo
- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents_ Available on Springer and Zenodo
- Lighter is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption_ Available on Springer and Zenodo