Security Analysis

Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?

Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28
Security Analysis
User Authentication System
Dynamic Access Control

Attacking Machine Learning models as part of a cyber kill chain

Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07
Security Analysis
Detection of Model Extraction Attacks
Attack Detection

Intrusion Prevention and Detection in Grid Computing – The ALICE Case

Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20
Security Analysis
Proactive Defense
Machine Learning

Adversarial Source Identification Game with Corrupted Training

Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27
Security Analysis
Strategic Game
Attack Pattern Extraction

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10
Security Analysis
Performance Evaluation
Behavioral Authentication System