Title |
Conference |
Tags |
The Duster Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding |
RAID2019-2019 - Beijing, China |
|
Drones' Cryptanalysis - Smashing Cryptography with a Flicker |
IEEESymposium-2019 - San Francisco, US |
|
Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots |
CODASPY2019-2019 - Dallas, United States |
|
Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots |
CODASPY2019-2019 - Dallas, United States |
|
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. |
NDSS-2018 - san diego,usa |
|
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices |
cardis-2017 - lugano,switzerland |
|
dr0wned – Cyber-Physical Attack with Additive Manufacturing |
woot-2017 - vancouver,canada |
|
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit |
woot-2017 - vancouver,canada |
|
9-1-1 DDoS: Attacks, Analysis and Mitigation |
EuroSP-2017 - paris,france |
|
Corporate Lab 2: ST Electronics - Singapore University of Technology and Design Cyber Security Lab |
sgcrc-2017 - singapore,singapore |
|
Scholarly Digital Libraries as a Platform for Malware Distribution |
sgcrc-2017 - singapore,singapore |
|
CHALLENGES OF IOT |
CyberTechIsrael-2017 - tel aviv,israel |
|
IOT SECURITY CHALLENGING RESEARCHES |
cybertechSingapore-2016 - marina bay sands,singapore |
|
Cyber Security for Mobile & Telecommunication Systems |
CyberTechIsrael-2016 - tel aviv,israel |
|
Bridging the Air-Gap: Data Exfiltration from Air-Gap Networks |
DeepSec-2015 - vienna,austria |
|
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies |
SecuritySymposium-2015 - washington,USA |
|
OSPF Vulnerability to Persistent Poisoning Attacks: A Systematic Analysis |
ACSAC-2014 - new orleans,usa |
|
Manuscript # 1570022045 – “AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies” |
MalCon-2014 - fajardo,puerto rico |
|
Trusted Detection of Sensitive Activities on Mobile Phones using Power Consumption Measurements |
JISIC-2014 - Hague,netherlands |
|
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files |
JISIC-2014 - Hague,netherlands |
|
Resilience of Anti-Malware Programs to Naïve Modifications of Malicious Binaries |
JISIC-2014 - Hague,netherlands |
|
Exfiltration of information from air-gapped machines using monitor’s LED indicator |
JISIC-2014 - Hague,netherlands |
|
Entity Matching in Online Social Networks |
BigDATA-2013 - Washington, D.C. |
|
AttackingEntity Matching in Online Social Networks |
EconCom-2013 - Washington, D.C. |
|
Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies |
ASECyberSec-2012 - Washington,USA |
|
Heuristics for Speeding up Betweenness Centrality Computation |
4th International Conference on Information Privacy, Security, Risk and Trust (PASSAT)-2012 - Amsterdam, The Netherlands |
|
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data |
4th International Conference on Information Privacy, Security, Risk and Trust (PASSAT)-2012 - Amsterdam, The Netherlands |
|
Welcome |
CollSec-2010 - Washington DC, USA |
Others
Security
|
Anonymity And Integrity Oriented Collaboration |
CollSec-2010 - Washington DC, USA |
Security
Anonymity
Privacy
|