AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling | 0 | 0.34 | 2022 |
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication | 0 | 0.34 | 2022 |
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs | 0 | 0.34 | 2021 |
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications | 0 | 0.34 | 2021 |
Shared memory protection in a multi-tenant JVM | 0 | 0.34 | 2021 |
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping | 0 | 0.34 | 2020 |
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling | 0 | 0.34 | 2020 |
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment | 0 | 0.34 | 2020 |
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer). | 0 | 0.34 | 2020 |
MicroVault: Reliable Storage Unit for IoT Devices | 0 | 0.34 | 2020 |
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients | 0 | 0.34 | 2019 |
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. | 0 | 0.34 | 2019 |
Towards Automated Security Design Flaw Detection | 0 | 0.34 | 2019 |
Purchased Fame: Exploring the Ecosystem of Private Blog Networks. | 0 | 0.34 | 2019 |
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks | 0 | 0.34 | 2019 |
Detection of algorithmically generated domain names used by botnets - a dual arms race. | 3 | 0.47 | 2019 |
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. | 0 | 0.34 | 2019 |
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost. | 1 | 0.35 | 2018 |
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems | 0 | 0.34 | 2018 |
Risk-based design security analysis. | 1 | 0.35 | 2018 |
Polyglot Cerberos: Resource Security, Interoperability And Multi-Tenancy For Iot Services On A Multilingual Platform | 0 | 0.34 | 2018 |
Rigging Research Results by Manipulating Top Websites Rankings. | 2 | 0.38 | 2018 |
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. | 0 | 0.34 | 2018 |
Automated Feature Extraction for Website Fingerprinting through Deep Learning. | 1 | 0.35 | 2017 |
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. | 0 | 0.34 | 2017 |
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions. | 1 | 0.35 | 2017 |
A shared multi-stakeholder platform for IoT: poster. | 0 | 0.34 | 2017 |
The Wolf of Name Street: Hijacking Domains Through Their Nameservers. | 5 | 0.42 | 2017 |
μPnP-WAN: Experiences with LoRa and its deployment in DR Congo | 1 | 0.43 | 2017 |
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. | 5 | 0.42 | 2016 |
Systematic scalability assessment for feature oriented multi-tenant services | 3 | 0.37 | 2016 |
Feature-Based Variability Management For Scalable Enterprise Applications: Experiences With An E-Payment Case | 0 | 0.34 | 2016 |
Data Protection Compliance Regulations and Implications for Smart Factories of the Future | 0 | 0.34 | 2016 |
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments. | 11 | 0.58 | 2016 |
Towards a container-based architecture for multi-tenant SaaS applications. | 3 | 0.44 | 2016 |
Towards systematically addressing security variability in software product lines. | 0 | 0.34 | 2016 |
Request And Conquer: Exposing Cross-Origin Resource Size | 5 | 0.42 | 2016 |
Security and privacy controls for streaming data in extended intelligent environments. | 2 | 0.36 | 2016 |
Do security patterns really help designers? | 23 | 0.87 | 2015 |
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications | 2 | 0.37 | 2015 |
Mobile device fingerprinting considered harmful for risk-based authentication | 8 | 0.66 | 2015 |
Continuous evolution of multi-tenant SaaS applications: a customizable dynamic adaptation approach | 7 | 0.44 | 2015 |
Adaptive Performance Isolation Middleware for Multi-tenant SaaS | 4 | 0.39 | 2015 |
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios. | 2 | 0.42 | 2015 |
SecSess: keeping your session tucked away in your browser | 1 | 0.35 | 2015 |
Protected Web Components: Hiding Sensitive Information in the Shadows | 1 | 0.36 | 2015 |
Advanced monitoring and smart auto-scaling of NoSQL systems | 0 | 0.34 | 2015 |
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report. | 3 | 0.47 | 2014 |
Evolutionary algorithms for classification of malware families through different network behaviors | 10 | 0.92 | 2014 |
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. | 2 | 0.37 | 2014 |