User Tools

Site Tools


researchareas

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
researchareas [2021/12/30 07:43]
ggankhuyag
researchareas [2022/02/01 09:20] (current)
zannonen [Research output]
Line 9: Line 9:
  
 ^ Research Area ^ Staff member(s) ^ Sample of output ^ ^ Research Area ^ Staff member(s) ^ Sample of output ^
-| Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] | <WRAP>+| Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] [[https://research.tue.nl/en/persons/emmanuele-zambon-mazzocato| Emmanuele Zambon-Mazzocato]]| <WRAP>
   * [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | (slides) ]]   * [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | (slides) ]]
   * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017)   * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017)
   * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017.   * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017.
 +  * [[https://scholar.google.com/citations?view_op=view_citation&hl=nl&user=28P--UkAAAAJ&sortby=pubdate&citation_for_view=28P--UkAAAAJ:kRWSkSYxWN8C | Similarity-Based Clustering For IoT Device Classification.]] G Dupont, C Leite, DR dos Santos, E Costante, J den Hartog, S Etalle. 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)
 </WRAP> |   </WRAP> |  
 | Software security | Wil Michiels | | | Software security | Wil Michiels | |
Line 44: Line 45:
   * [[http://www.win.tue.nl/~lallodi/allodi-13-iwcc.pdf| Quantitative assessment of risk reduction with cybercrime black market monitoring.]] Luca Allodi, Woohyun Shim, Fabio Massacci. Proceedings of IEEE S&P 2013 International Workshop on Cyber Crime.    * [[http://www.win.tue.nl/~lallodi/allodi-13-iwcc.pdf| Quantitative assessment of risk reduction with cybercrime black market monitoring.]] Luca Allodi, Woohyun Shim, Fabio Massacci. Proceedings of IEEE S&P 2013 International Workshop on Cyber Crime. 
 </WRAP> </WRAP>
-| Identification and Authentication | Boris Skoric |  +| Identification and Authentication | Boris Skoric | <WRAP> 
-| Information-theoretic security | Boris Skoric | +  * [[ https://ieeexplore.ieee.org/document/8332526 | Decay-Based DRAM PUFs in Commodity Devices. ]] André Schaller; Wenjie Xiong; Nikolaos Athanasios Anagnostopoulos; Muhammad Umair Saleem; Sebastian Gabmeyer; Boris Škorić; Stefan Katzenbeisser; Jakub Szefer. IEEE Transactions on Dependable and Secure Computing Volume: 16, Issue: 3, May-June 1 2019. 
 +  * [[ https://iopscience.iop.org/article/10.1088/2058-9565/ab479f/pdf | Asymmetric cryptography with physical unclonable keys. ]] Ravitej Uppu, Tom A W Wolterink, Sebastianus A Goorden, Bin Chen, Boris Škorić, Allard P Mosk,and Pepijn W H Pinkse. Quantum Science and Technology, Volume 4, Number 4, 2019.  
 +  * [[ https://www.osapublishing.org/optica/fulltext.cfm?uri=optica-1-6-421&id=306292 | Quantum-secure authentication of a physical unclonable key. ]] Sebastianus A. Goorden, Marcel Horstmann, Allard P. Mosk, Boris Škorić, and Pepijn W. H. Pinkse. Optica Vol. 1, Issue 6, 2014 
 +  * [[ https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-019-0096-0 | Fingerprint template protection using minutia-pair spectral representations. ]] Taras Stanko, Bin Chen & Boris Škorić. EURASIP Journal on Information Security volume 2019 
 +  * [[ https://ieeexplore.ieee.org/document/7041187 | Tally-Based Simple Decoders for Traitor Tracing and Group Testing. ]] Boris Škorić. IEEE Transactions on Information Forensics and Security, Volume: 10, Issue: 6, June 2015 
 +</WRAP> |  
 +| Information-theoretic security | Boris Skoric | <WRAP> 
 +  * [[ https://arxiv.org/abs/2012.15493 | Quantum digital signatures with smaller public keys. ]] Boris Škorić. 2021 
 +  * [[ https://arxiv.org/abs/2006.02476 | Can't Touch This: unconditional tamper evidence from short keys. ]] Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric. 2020 
 +  * [[ https://arxiv.org/abs/2010.10827 | Two-way Unclonable Encryption with a vulnerable sender. ]] Daan Leermakers, Boris Skoric. 2020 
 +  * [[https://www.rintonpress.com/journals/doi/QIC21.11-12-1.html | Qubit-based Unclonable Encryption with Key Recycling.]] Daan Leermakers and Boris Skoric. Quantum Information and Computation, Vol.21 No.11&12 September 2021 
 +  * [[https://arxiv.org/abs/2008.13151 | Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees.]] Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Škorić. Fourteenth International Conference on the Digital Society, 2020   
 +</WRAP>
 +| IoT Security and Privacy | [[https://ssciancalepore.win.tue.nl/|Savio Sciancalepore]]| <WRAP> 
 +  * [[https://cri-lab.net/wp-content/uploads/2021/08/Mitigating-Energy-Depletion-Attacks-in-IoT.pdf | Mitigating Energy Depletion Attacks in IoT Networks via Random Time-Slotted Channel Access.]] Savio Sciancalepore, Pietro Tedeschi, Usman Riasat, and Roberto Di Pietro. 2021 IEEE Conference on Communications and Network Security (CNS), October 4-6, 2021. 
 +  * [[https://cri-lab.net/wp-content/uploads/2021/11/Tedeschi2021_ACSAC21.pdf | ARID - Anonymous Remote Identification of Unmanned Aerial Vehicles.]] Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. 2021 ACM Annual Computer Security Applications Conference (ACSAC) (ACSAC), December 6-10, 2021. 
 +  * [[https://cri-lab.net/wp-content/uploads/2020/11/pprq_scianca2020.pdf | PPRQ: Privacy-Preserving MAX/MIN Range 
 +Queries in IoT Networks.]] Savio Sciancalepore, Roberto Di Pietro. IEEE Internet of Things Journal (IOT-J), November 2020. doi: 10.1109/JIOT.2020.3037115. 
 +  * [[https://intersct.nl/wp-content/uploads/2022/01/iot_ac_uncertainty-1.pdf | PICO: Privacy-Preserving Access Control in IoT Scenarios through Incomplete Information.]] Savio Sciancalepore, Nicola Zannone. SAC ’22, April 25–29, 2022, Virtual Event. 
 +</WRAP> |  
 +| Social engineering | [[https://lallodi.github.io|Luca Allodi]], [[http://zannone.win.tue.nl/|Nicola Zannone]] | <WRAP> 
 +  * [[https://dl.acm.org/doi/10.1145/3407023.3409178 | Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment.]] Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone. ARES 2020: 3:1-3:10 
 +  * [[https://doi.org/10.1109/EuroSPW54576.2021.00024 | Dissecting Social Engineering Attacks Through the Lenses of Cognition.]] Pavlo Burda, Luca Allodi, Nicola Zannone. EuroS&P Workshops 2021: 149-160 
 +  * [[https://doi.org/10.1109/MSEC.2019.2940952 |The Need for New Antiphishing Measures Against Spear-Phishing Attacks.]] Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone.  IEEE Security & Privacy 18(2): 23-34 (2020) 
 +  * [[https://doi.org/10.1007/978-3-030-65610-2_9 |A Toolkit for Security Awareness Training Against Targeted Phishing.]] Simone Pirocca, Luca Allodi, Nicola Zannone. ICISS 2020: 137-159 
 +</WRAP> |
researchareas.1640846602.txt.gz · Last modified: 2021/12/30 07:43 by ggankhuyag