ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05 Privacy Enhancing ProtocolDiscussion on Protocol Vulnerabilities and Attack ScenariosPerformance Evaluation 2019.12.05 2025.05.28 Literature Database
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13 Backdoor AttackDiscussion on Protocol Vulnerabilities and Attack ScenariosAttacker Behavior Analysis 2019.11.13 2025.05.28 Literature Database
Advanced Analytics for Connected Cars Cyber Security Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08 HMM Model GenerationML-Based IDSDiscussion on Protocol Vulnerabilities and Attack Scenarios 2017.11.06 2025.05.28 Literature Database