Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Elias Athanasopoulos"'
Membership Inference Attacks (MIAs) can be conducted based on specific settings/assumptions and experience different limitations. In this paper, first, we provide a systematization of knowledge for all representative MIAs found in the literature. Sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::04435f3f06e735994b8209abc9819929
Autor:
Nicholas Moellhoff, Tine Arnez, Elias Athanasopoulos, Horacio Costa, Giorgio De Santis, Stephane De Mortillet, Cenk Demirdöver, Giovanni di Benedetto, Boro Dzonov, Anna Elander, Emma Hansson, Mark Henley, Cristian Radu Jecan, Ilkka Kaartinen, Reuf Karabeg, Andrey Kharkov, Brian Kneafsey, Smilja Tudzarova Gjorgova, Drahomir Palencar, Aurelio Portincasa, Georgios Psaras, Hinne Rakhorst, Maria Elena Ruiz Alonso, Michel Rouif, Jacques Saboye, Fabio Santanelli di Pompeo, Stephan Spendel, Nenad Stepic, Olavi Vasar, Rado Zic, Riccardo E. Giunta
Publikováno v:
Handchirurgie, Mikrochirurgie, plastische Chirurgie : Organ der Deutschsprachigen Arbeitsgemeinschaft fur Handchirurgie : Organ der Deutschsprachigen Arbeitsgemeinschaft fur Mikrochirurgie der Peripheren Nerven und Gefasse : Organ der V.... 54(4)
Specialty training in plastic, reconstructive and aesthetic surgery is a prerequisite for safe and effective provision of care. The aim of this study was to assess and portray similarities and differences in the continuing education and specializatio
Honeywords are false passwords associated with each user account. Using a honeyword to login sets off an alarm as a data breach has been detected. Existing approaches for detecting data breaches using honeywords suffer from the need of a trusted comp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2dad950ef8150162a8d6111bd1cc9682
https://zenodo.org/record/8123562
https://zenodo.org/record/8123562
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031045790
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ab937594dd3c8bd7400764dc40a6d7b
https://doi.org/10.1007/978-3-031-04580-6_18
https://doi.org/10.1007/978-3-031-04580-6_18
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
AISec@CCS
Adversarial Text Generation Frameworks (ATGFs) aim at causing a Natural Language Processing (NLP) machine to misbehave, i.e., misclassify a given input. In this paper, we propose EvilText, a general ATGF that successfully evades some of the most popu
Publikováno v:
Cybersecurity Issues in Emerging Technologies ISBN: 9781003109952
In this chapter, we study the security mechanisms implemented in modern hardware architectures. In essence, hardware-based security can be more effective against powerful attacks, while at the same time minimize the imposed runtime overheads of the s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8ed0d783ae67045313730abfcf24c0ac
https://doi.org/10.1201/9781003109952-1
https://doi.org/10.1201/9781003109952-1
Autor:
Mark Henley, Drahomír Palenčár, Marc Vandevoort, Klemen Rogelj, Nicholas Moellhoff, Fabio Santanelli di Pompeo, Emma Hansson, Elias Athanasopoulos, Lisbet Rosenkrantz Hölmich, Ruth Waters, Giovanni Di Benedetto, Aleksandra Bozovic Celebic, Andrzej Piatkowski, Rado Zic, Cenk Demirdöver, Olavi Vasar, Reuf Karabeg, Stephan Spendel, Hinne A. Rakhorst, Ulla Karhunen-Enckell, Horácio Costa, Alexandru Valentin Georgescu, Anna Elander, Dylan J. Murray, Elisabeth A. Kappos, Robert Caulfield, Thierry van Hemelryck, Christian Korvald, Riccardo E. Giunta, Dirk J. Schaefer, Stephane de Mortillet, Georgios Psaras, Carolina Andresen, Nenad Stepic
Publikováno v:
Handchirurgie Mikrochirurgie Plastische Chirurgie, 53(04), 340-348. Georg Thieme Verlag
The European Leadership Forum (ELF) of the European Society of Plastic, Reconstructive and Aesthetic Surgery (ESPRAS) previously identified the need for harmonisation of breast reconstruction standards in Europe, in order to strengthen the role of pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2aa5c4c7cccbe7733b2a04ea59d5232
https://avesis.deu.edu.tr/publication/details/349b3930-c4fc-4073-b046-f85636475f5e/oai
https://avesis.deu.edu.tr/publication/details/349b3930-c4fc-4073-b046-f85636475f5e/oai
Publikováno v:
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
AsiaCCS
AsiaCCS
Honeywords are false passwords injected in a database for detecting password leakage. Generating honeywords is a challenging problem due to the various assumptions about the adversary’s knowledge as well as users’ password-selection behaviour. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0764d0cbc4bf4bf809ed041ab4b1691e
https://zenodo.org/record/5082032
https://zenodo.org/record/5082032
Autor:
Michalis Papaevripides, Orpheas van Rooij, Demetris Kaizer, Elias Athanasopoulos, Marcos Antonios Charalambous
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884178
ESORICS (1)
ESORICS (1)
Fuzzing is significantly evolved in analysing native code, but web applications, invariably, have received limited attention until now. This paper designs, implements and evaluates webFuzz, a gray-box fuzzing prototype for discovering vulnerabilities
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb2889f96019a0389b97f013f490b41c
https://doi.org/10.1007/978-3-030-88418-5_8
https://doi.org/10.1007/978-3-030-88418-5_8