
-
Securing Password Authentication for Web-based Applications
The use of passwords and the need to protect passwords are not going awa...
read it
-
SSIDS: Semi-Supervised Intrusion Detection System by Extending the Logical Analysis of Data
Prevention of cyber attacks on the critical network resources has become...
read it
-
ProPoS: A Probabilistic Proof-of-Stake Protocol
We present ProPoS, a Proof-of-Stake protocol dedicated, but not limited,...
read it
-
Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults
In an Industrial Control System (ICS), its complex network of sensors, a...
read it
-
Challenges and Opportunities in CPS Security: A Physics-based Perspective
The integration of cyber technologies (computing and communication) with...
read it
-
On the Insecurities of Mobile D2D File Sharing Applications
With more than 1.3 Billion in the cumulative number of downloads reporte...
read it
-
SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices
The Internet of Things (IoT) is an emerging paradigm that allows a fine-...
read it
-
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach
A design-centric modeling approach was proposed to model the behavior of...
read it
-
SCARR: A Novel Scalable Runtime Remote Attestation
Runtime remote attestation is a technique that allows to validate the co...
read it