Nome |
# |
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems, file dfe4d05d-7932-eb50-e053-6605fe0a26fa
|
71
|
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain, file dfe4d05d-7a13-eb50-e053-6605fe0a26fa
|
21
|
Security Analysis of Smart Grid Data Collection Technologies, file dfe4d05c-8eda-eb50-e053-6605fe0a26fa
|
13
|
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure, file dfe4d05c-916b-eb50-e053-6605fe0a26fa
|
12
|
Applying extensions of evidence theory to detect frauds in financial infrastructures, file dfe4d05c-af0e-eb50-e053-6605fe0a26fa
|
12
|
Cloud security: Emerging threats and current solutions, file dfe4d05c-aedf-eb50-e053-6605fe0a26fa
|
10
|
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services, file dfe4d05c-b104-eb50-e053-6605fe0a26fa
|
10
|
Effective QoS Monitoring in Large Scale Social Networks, file dfe4d05c-88d8-eb50-e053-6605fe0a26fa
|
9
|
Enhancing SIEM Technology to Protect Critical Infrastructures, file dfe4d05c-915b-eb50-e053-6605fe0a26fa
|
9
|
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns, file dfe4d05c-7c93-eb50-e053-6605fe0a26fa
|
8
|
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies, file dfe4d05c-8b32-eb50-e053-6605fe0a26fa
|
8
|
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach, file dfe4d05c-8dee-eb50-e053-6605fe0a26fa
|
8
|
Exploiting diversity and correlation to improve the performance of intrusion detection systems, file dfe4d05c-8f06-eb50-e053-6605fe0a26fa
|
7
|
A framework for mastering heterogeneity in multi-layer security information and event correlation, file dfe4d05c-b007-eb50-e053-6605fe0a26fa
|
7
|
A GPS Spoofing Resilient WAMS for Smart Grid, file dfe4d05c-8c3f-eb50-e053-6605fe0a26fa
|
6
|
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, file dfe4d05c-91aa-eb50-e053-6605fe0a26fa
|
6
|
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach, file dfe4d05c-aed6-eb50-e053-6605fe0a26fa
|
6
|
An OpenNCP-based Solution for Secure eHealth Data Exchange, file dfe4d05d-2cde-eb50-e053-6605fe0a26fa
|
6
|
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems, file dfe4d05d-8155-eb50-e053-6605fe0a26fa
|
6
|
Effective visualization of a big data banking application, file dfe4d05c-8c9a-eb50-e053-6605fe0a26fa
|
5
|
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks, file dfe4d05c-8d05-eb50-e053-6605fe0a26fa
|
5
|
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach, file dfe4d05c-8e58-eb50-e053-6605fe0a26fa
|
5
|
Runtime model checking for sla compliance monitoring and qos prediction, file dfe4d05c-901a-eb50-e053-6605fe0a26fa
|
5
|
Real-time Security & Dependability monitoring: Make it a bundle, file dfe4d05c-9509-eb50-e053-6605fe0a26fa
|
5
|
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks, file dfe4d05c-957d-eb50-e053-6605fe0a26fa
|
5
|
Exposing vulnerabilities in electric power grids: An experimental approach, file dfe4d05c-b086-eb50-e053-6605fe0a26fa
|
5
|
A comparative analysis of emerging approaches for securing java software with Intel SGX, file dfe4d05d-44a7-eb50-e053-6605fe0a26fa
|
5
|
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology, file dfe4d05c-877d-eb50-e053-6605fe0a26fa
|
4
|
Enabling convergence of physical and logical security through intelligent event correlation, file dfe4d05c-88f3-eb50-e053-6605fe0a26fa
|
4
|
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project, file dfe4d05c-91a8-eb50-e053-6605fe0a26fa
|
4
|
Advanced SIEM Technology for Critical Infrastructure Protection, file dfe4d05c-91e5-eb50-e053-6605fe0a26fa
|
4
|
My smart home is under attack, file dfe4d05c-a8fa-eb50-e053-6605fe0a26fa
|
4
|
Efficient Supply Chain Management via federation-based integration of legacy ERP systems, file dfe4d05c-8a59-eb50-e053-6605fe0a26fa
|
3
|
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems, file dfe4d05d-2a76-eb50-e053-6605fe0a26fa
|
3
|
An abstract reasoning architecture for privacy policies monitoring, file dfe4d05d-7a5e-eb50-e053-6605fe0a26fa
|
3
|
Privacy-Preserving Credit Scoring via Functional Encryption, file dfe4d05d-bb7d-eb50-e053-6605fe0a26fa
|
3
|
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project, file dfe4d05d-c17b-eb50-e053-6605fe0a26fa
|
3
|
A DBSCAN based approach for jointly segment and classify brain MR images, file dfe4d05c-893f-eb50-e053-6605fe0a26fa
|
2
|
Distributed Framework for Cybersecurity of Critical Infrastructures, file dfe4d05c-8e96-eb50-e053-6605fe0a26fa
|
2
|
Network Resilience, file dfe4d05c-93fc-eb50-e053-6605fe0a26fa
|
2
|
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study, file dfe4d05d-948c-eb50-e053-6605fe0a26fa
|
2
|
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids, file 53d011a7-3223-47ff-85a4-f9437fcd9f02
|
1
|
TrustedSIM: Towards Unified Mobile Security, file dfe4d05b-cabf-eb50-e053-6605fe0a26fa
|
1
|
Dependability and resilience of computer networks (SCADA / cyber-security), file dfe4d05c-3cb0-eb50-e053-6605fe0a26fa
|
1
|
Trust establishment in cooperating cyber-physical systems, file dfe4d05c-95c7-eb50-e053-6605fe0a26fa
|
1
|
Adaptable parsing of real-time data streams, file dfe4d05c-9866-eb50-e053-6605fe0a26fa
|
1
|
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks, file dfe4d05c-a2dc-eb50-e053-6605fe0a26fa
|
1
|
Web Services Workflow Reliability Estimation Through Reliability Patterns, file dfe4d05c-a8f3-eb50-e053-6605fe0a26fa
|
1
|
SIL2 assessment of an Active/Standby COTS-based Safety-Related system, file dfe4d05d-32e0-eb50-e053-6605fe0a26fa
|
1
|
Totale |
326 |