Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Schunter, Matthias"'
Autor:
Cammarota, Rosario, Schunter, Matthias, Rajan, Anand, Boemer, Fabian, Kiss, Ágnes, Treiber, Amos, Weinert, Christian, Schneider, Thomas, Stapf, Emmanuel, Sadeghi, Ahmad-Reza, Demmler, Daniel, Stock, Joshua, Chen, Huili, Hussain, Siam Umar, Riazi, Sadegh, Koushanfar, Farinaz, Gupta, Saransh, Rosing, Tajan Simunic, Chaudhuri, Kamalika, Nejatollahi, Hamid, Dutt, Nikil, Imani, Mohsen, Laine, Kim, Dubey, Anuj, Aysu, Aydin, Hosseini, Fateme Sadat, Yang, Chengmo, Wallace, Eric, Norton, Pamela
In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems provide customers with timely, informed, and customized inferences to
Externí odkaz:
http://arxiv.org/abs/2008.04449
Autor:
Paverd, Andrew, Völp, Marcus, Brasser, Ferdinand, Schunter, Matthias, Asokan, N., Sadeghi, Ahmad Reza, Esteves-Veríssimo, Paulo, Steininger, Andreas, Holz, Thorsten
A significant proportion of today’s information and communication technology (ICT) systems are entrusted with high value assets, and our modern society has become increasingly dependent on these systems operating safely and securely over their anti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______661::665637f0796365d0652e898146cb1c86
https://aaltodoc.aalto.fi/handle/123456789/41931
https://aaltodoc.aalto.fi/handle/123456789/41931
Autor:
Paverd, Andrew, Völp, Marcus, Brasser, Ferdinand, Schunter, Matthias, Asokan, N., Sadeghi, Ahmad-Reza, Esteves-Veríssimo, Paulo, Steininger, Andreas, Holz, Thorsten
A significant proportion of today's information and communication technology (ICT) systems are entrusted with high value assets, and our modern society has become increasingly dependent on these systems operating safely and securely over their antici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::75574c4f9f5222df97be031ba3880bd5
Autor:
Paverd, Andrew, Volp, Marcus, Brasser, Ferdinand, Schunter, Matthias, N Asokan, Sadeghi, Ahmad-Reza, Verissimo, Paulo, Steininger, Andreas, Holz, Thorsten
A significant proportion of today's information and communication technology (ICT) systems are entrusted with high value assets, and our modern society has become increasingly dependent on these systems operating safely and securely over their antici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::e495a035efdcac8bdfed600dce9e10a2
http://orbilu.uni.lu/handle/10993/41487
http://orbilu.uni.lu/handle/10993/41487
Publikováno v:
In Electronic Notes in Theoretical Computer Science 2000 32:59-77
Autor:
Förster, David, Löhr, Hans, Zibuschka, Jan, Kargl, Frank, Conti, Mauro, Schunter, Matthias, Askoxylakis, Ioannis
Publikováno v:
Trust and Trustworthy Computing ISBN: 9783319228457
TRUST
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings, 193-208
STARTPAGE=193;ENDPAGE=208;TITLE=Trust and Trustworthy Computing
TRUST
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings, 193-208
STARTPAGE=193;ENDPAGE=208;TITLE=Trust and Trustworthy Computing
We propose a novel mechanism for excluding misbehaving participants from a vehicular ad-hoc network (V2X system) that does not require resolution of pseudonyms. Our approach enables a revocation authority to exclude the sender of a given message from
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9bd203269d1d1a97fe48efb5b708e8f9
https://doi.org/10.1007/978-3-319-22846-4_12
https://doi.org/10.1007/978-3-319-22846-4_12
Autor:
Athanasopoulos, Elias, Boehner, Martin, Giuffrida, Cristiano, Pidan, Dmitry, Prevelakis, Vassilis, Sourdis, Ioannis, Strydis, Christos, Thomson, John, Conti, Mauro, Schunter, Matthias, Askoxylakis, Ioannis
Publikováno v:
Trust and Trustworthy Computing-8th International Conference, TRUST 2015, Proceedings, 321-322
STARTPAGE=321;ENDPAGE=322;TITLE=Trust and Trustworthy Computing-8th International Conference, TRUST 2015, Proceedings
STARTPAGE=321;ENDPAGE=322;TITLE=Trust and Trustworthy Computing-8th International Conference, TRUST 2015, Proceedings
Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploita
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::0077ad43af161bc158d06e0217718222
https://pure.eur.nl/en/publications/8b4f29ba-5423-495e-8007-123016add35a
https://pure.eur.nl/en/publications/8b4f29ba-5423-495e-8007-123016add35a