-
POSTER: How to securely record logs based on ARM TrustZone
-
POSTER: Characterizing Adversarial Subspaces by Mutual Information
-
POSTER: A Data Life Cycle Modeling Proposal by means of Formal Methods
-
POSTER: Cracking the Graph Routes in WirelessHART Networks
-
POSTER: Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results
-
POSTER: Towards Identifying Early Indicators of a Malware Infection
-
POSTER: Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management
-
POSTER: IoT Application-Centric Access Control (ACAC)
-
POSTER: High efficiency, low-noise Meltdown attack by using a return stack buffer
-
POSTER: Smart contract-based miner registration and block validation