Search

Your search keyword '"D.4.6"' showing total 1,269 results

Search Constraints

Start Over You searched for: Descriptor "D.4.6" Remove constraint Descriptor: "D.4.6"
1,269 results on '"D.4.6"'

Search Results

1. Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation

2. $\mathsf{OPA}$: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning

3. IDEAW: Robust Neural Audio Watermarking with Invertible Dual-Embedding

4. Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

5. Using Synthetic Data to Mitigate Unfairness and Preserve Privacy through Single-Shot Federated Learning

6. LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems

7. Protecting Onion Service Users Against Phishing

8. Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration

9. SETC: A Vulnerability Telemetry Collection Framework

10. A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis

11. Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code

12. Confronting the Reproducibility Crisis: A Case Study of Challenges in Cybersecurity AI

13. VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions

14. Multicore DRAM Bank-& Row-Conflict Bomb for Timing Attacks in Mixed-Criticality Systems

15. DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers

16. CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation

17. Topology-Based Reconstruction Prevention for Decentralised Learning

18. Automated SELinux RBAC Policy Verification Using SMT

19. Protecting Sensitive Tabular Data in Hybrid Clouds

20. DeFi Security: Turning The Weakest Link Into The Strongest Attraction

21. Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata

22. RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices

23. Proving the Absence of Microarchitectural Timing Channels

24. ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies

25. Security Properties through the Lens of Modal Logic

26. OSmosis: No more D\'ej\`a vu in OS isolation

27. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

28. Implementation of Formal Semantics and the Potential of Non-Classical Logic Systems for the Enhancement of Access Control Models: A Literature Review

29. SoK: The Ghost Trilemma

30. Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

31. Execution at RISC: Stealth JOP Attacks on RISC-V Applications

32. Information Leakage from Optical Emanations

33. Performance and Reliability Analysis for Practical Byzantine Fault Tolerance with Repairable Voting Nodes

34. Survey of Federated Learning Models for Spatial-Temporal Mobility Applications

35. CoVE: Towards Confidential Computing on RISC-V Platforms

36. Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging

37. Distributed Non-Interference

38. PUF for the Commons: Enhancing Embedded Security on the OS Level

39. On Blockchain We Cooperate: An Evolutionary Game Perspective

40. Systematic Assessment of Fuzzers using Mutation Analysis

41. Performance Evaluation, Optimization and Dynamic Decision in Blockchain Systems: A Recent Overview

42. An Integrity-Focused Threat Model for Software Development Pipelines

43. A Secure Future for Open-Source Computational Science and Engineering

44. Mahiru: a federated, policy-driven data processing and exchange system

45. Review of Cookie Synchronization Detection Methods

46. Dynamic Practical Byzantine Fault Tolerance and Its Blockchain System: A Large-Scale Markov Modeling

47. RPoA: Redefined Proof of Activity

48. Impact of a non-deterministic rekey interval on the performance of arc4random

49. Bao-Enclave: Virtualization-based Enclaves for Arm

50. A Markov Process Theory for Network Growth Processes of DAG-based Blockchain Systems

Catalog

Books, media, physical & digital resources