Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Vassilis Prevelakis"'
Autor:
Mohammad Hamad, Vassilis Prevelakis
Publikováno v:
Information, Vol 11, Iss 5, p 273 (2020)
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environmen
Externí odkaz:
https://doaj.org/article/d0dfbdfe899f4f7fb1d8ae141242acdf
Autor:
Mohammad Hamad, Andreas Finkenzeller, Hangmao Liu, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst
Publikováno v:
IEEE Internet of Things Journal. 10:3384-3406
Publikováno v:
15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)
t is often useful for a code component (e.g., a library) to be able to maintain information that is hidden from the rest of the program (e.g., private keys used for signing, or usage counters used for behavioral monitoring of the program). In this pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19eccaca2f0b4a5bed2c348ceb658082
Publikováno v:
DATE
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)
The Publish/Subscribe (Pub/Sub) pattern is an attractive paradigm for supporting Vehicle to Cloud (V2C) communication. However, the security threats on confidentiality, integrity, and access control of the published data challenge the adoption of the
Publikováno v:
SECRYPT
Proceedings of the 18th International Conference on Security and Cryptography
18th International Conference on Security and Cryptography (SECRYPT)
Proceedings of the 18th International Conference on Security and Cryptography
18th International Conference on Security and Cryptography (SECRYPT)
Code Reuse Attacks can trick the CPU into performing some actions not originally intended by the running program. This is due to the fact that the execution can move anywhere within a process’s executable memory area, as well as the absence of poli
Publikováno v:
ZENODO
it-Information Technology
it-Information Technology
The Internet of Vehicle (IoV) is an extension of Vehicle-to-Vehicle (V2V) communication that can improve vehicles’ fully autonomous driving capabilities. However, these communications are vulnerable to many attacks. Therefore, it is critical to pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90caabe097c58a8e6d906031bda8f765
https://zenodo.org/record/4385307
https://zenodo.org/record/4385307
The need for secure communications between IoT devices isparamount. However, due to computational constraints and the need forlightweight publish/subscribe type of communications, traditional mechanismsfor secure communications such as TLS and IPsec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3944a24beb25a02376bf81347b594974
Publikováno v:
Model-driven Simulation and Training Environments for Cybersecurity-Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Model-driven Simulation and Training Environments for Cybersecurity
Model-driven Simulation and Training Environments for Cybersecurity ISBN: 9783030624323
MSTEC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Model-driven Simulation and Training Environments for Cybersecurity
Model-driven Simulation and Training Environments for Cybersecurity ISBN: 9783030624323
MSTEC
The ability to analyze software systems without access to the source code, offers many advantages including the detection of vulnerabilities so that they may be fixed before an adversary can exploit them in a zero day attack. This type of analysis al
Publikováno v:
Heterogeneous Computing Architectures ISBN: 9780429399602
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4040bdc0b0356da290b6a6e77c9e4acf
https://doi.org/10.1201/9780429399602-10
https://doi.org/10.1201/9780429399602-10