Showing 1–20 of 54 results
/ Date/ Name
Dec 21, 2021Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research ChallengesOct 12, 2020PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep LearningJun 18, 2020GNSS Spoofing Detection via Opportunistic IRIDIUM SignalsFeb 14, 2020MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic EmissionsApr 23, 2019Foundations, Properties, and Security Applications of Puzzles: A SurveyFeb 10, 2025Hallucination Detection: A Probabilistic Framework Using Embeddings Distance AnalysisJul 18, 2025Stablecoins: Fundamentals, Emerging Issues, and Open ChallengesSep 24, 2018SOS - Securing Open SkiesJul 8, 2021Serverless Computing: A Security PerspectiveMay 16, 2022Metaverse: Security and Privacy IssuesOct 9, 2019BrokenStrokes: On the (in)Security of Wireless KeyboardsAug 2, 2022Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary FindingsJun 7, 2022Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future DirectionsMay 31, 2013CUDA Leaks: Information Leakage in GPU ArchitecturesJan 22, 2016HyBIS: Windows Guest Protection through Advanced Memory IntrospectionMar 30, 2023Demystifying Misconceptions in Social Bots ResearchOct 20, 2025The Hidden Dangers of Public Serverless Repositories: An Empirical Security AssessmentApr 12, 2026COD-ssi: Enforcing Mutual Privacy for Credential Oblivious Disclosure in Self Sovereign IdentityJul 29, 2018Virtualization Technologies and Cloud Security: advantages, issues, and perspectivesJul 10, 2018BAD: Blockchain Anomaly Detection