Risk assessment plays a crucial role in ensuring the security and resili...
As the number of devices being interconnected increases, so does also th...
Third-party dongles for cars, e.g. from insurance companies, can extract...
The ubiquity and pervasiveness of modern Internet of Things (IoT) device...
The Open RAN architecture is a promising and future-oriented architectur...
In this work, we examine the potential of Physical Unclonable Functions
...
Timing-based side and covert channels in processor caches continue to be...
We present the proposed security architecture Deutsche Bahn plans to dep...
We propose a rule-based anomaly detection system for railway signalling ...
We consider the problem of securely computing the kth-ranked element in ...
Recent studies have shown that aggregate CPU usage and power consumption...
Physically Unclonable Functions (PUFs) have become an important and prom...
Crowdsourcing enables application developers to benefit from large and
d...
Mobile crowdsourcing (MCS) relies on users' devices as sensors to perfor...
While regulators advocate for higher cloud transparency, many Cloud Serv...
An increasing amount of information today is generated, exchanged, and s...