DBSec B

19 papers

YearTitle / Authors
2022Assessing Differentially Private Variational Autoencoders Under Membership Inference.
Daniel Bernau, Jonas Robl, Florian Kerschbaum
2022Attack-Resilient Blockchain-Based Decentralized Timed Data Release.
Jingzhe Wang, Balaji Palanisamy
2022Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks.
Andrea Milakovic, Rudolf Mayer
2022Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings
Shamik Sural, Haibing Lu
2022End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Stefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise
2022Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors.
Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabaninejad
2022Integrating and Evaluating Quantum-safe TLS in Database Applications.
Anselme Tueno, David Boehm, Shin Ho Choe
2022Knowledge Mining in Cybersecurity: From Attack to Defense.
Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham
2022Liberate Your Servers: A Decentralized Content Compliance Validation Protocol.
Bowen Liu, Jianying Zhou
2022Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards.
Jeroen Weener, Florian Hahn, Andreas Peter
2022Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection.
Matt Gorbett, Hossein Shirazi, Indrakshi Ray
2022MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data.
Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham
2022Mitigating Privacy Vulnerability Caused by Map Asymmetry.
Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita, Hidehito Gomi
2022On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps.
Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray
2022ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases.
Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone
2022Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption.
Anis Bkakria
2022Security Operations Center Roles and Skills: A Comparison of Theory and Practice.
Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul
2022Utility and Privacy Assessment of Synthetic Microbiome Data.
Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart
2022Verification and Validation Methods for a Trust-by-Design Framework for the IoT.
Davide Ferraris, M. Carmen Fernández Gago, Javier López