NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 619
1.
  • AuDI: Toward Autonomous IoT... AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication
    Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc ... IEEE journal on selected areas in communications, 06/2019, Letnik: 37, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    IoT devices are being widely deployed. But the huge variance among them in the level of security and requirements for network resources makes it unfeasible to manage IoT networks using a common ...
Celotno besedilo

PDF
2.
  • The Cybersecurity Landscape... The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang ... Proceedings of the IEEE 104, Številka: 5
    Journal Article
    Recenzirano

    Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling ...
Celotno besedilo
3.
  • Security and privacy challe... Security and privacy challenges in industrial internet of things
    Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael Proceedings of the 52nd Annual Design Automation Conference, 06/2015
    Conference Proceeding

    Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and ...
Celotno besedilo
4.
  • ASSURED: Architecture for S... ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices
    Asokan, N.; Nyman, Thomas; Rattanavipanon, Norrathep ... IEEE transactions on computer-aided design of integrated circuits and systems, 11/2018, Letnik: 37, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, ...
Celotno besedilo

PDF
5.
  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT
    Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus ... 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)
    Conference Proceeding
    Odprti dostop

    IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have ...
Celotno besedilo

PDF
6.
  • Counterfeit Object-oriented... Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
    Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher ... 2015 IEEE Symposium on Security and Privacy, 05/2015
    Conference Proceeding
    Odprti dostop

    Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of corresponding defenses ...
Celotno besedilo
7.
  • Remanence Decay Side-Channe... Remanence Decay Side-Channel: The PUF Case
    Zeitouni, Shaza; Oren, Yossef; Wachsmann, Christian ... IEEE transactions on information forensics and security, 06/2016, Letnik: 11, Številka: 6
    Journal Article
    Recenzirano

    We present a side-channel attack based on remanence decay in volatile memory and show how it can be exploited effectively to launch a noninvasive cloning attack against SRAM physically unclonable ...
Celotno besedilo
8.
  • Efficient Privacy-Preservin... Efficient Privacy-Preserving Face Recognition
    Sadeghi, Ahmad-Reza; Schneider, Thomas; Wehrenberg, Immo Information, Security and Cryptology – ICISC 2009
    Book Chapter
    Recenzirano
    Odprti dostop

    Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement and ...
Celotno besedilo

PDF
9.
  • Marionette: Manipulate Your... Marionette: Manipulate Your Touchscreen via a Charging Cable
    Jiang, Yan; Ji, Xiaoyu; Wang, Kai ... IEEE transactions on dependable and secure computing, 07/2024, Letnik: 21, Številka: 4
    Journal Article

    The security of capacitive touchscreens is crucial since they have become the primary human-machine interface on smart devices. This paper presents Marionette , the first wired attack that creates ...
Celotno besedilo
10.
  • Digital Contact Tracing Sol... Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges
    Nguyen, Thien Duc; Miettinen, Markus; Dmitrienko, Alexandra ... IEEE transactions on emerging topics in computing, 04/2024, Letnik: 12, Številka: 2
    Journal Article
    Recenzirano

    The COVID-19 pandemic has caused many countries to deploy novel digital contact tracing (DCT) systems to boost the efficiency of manual tracing of infection chains. In this paper, we systematically ...
Celotno besedilo
1 2 3 4 5
zadetkov: 619

Nalaganje filtrov