ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
Latest Publications
TOTAL DOCUMENTS
11
(FIVE YEARS 11)
H-INDEX
0
(FIVE YEARS 0)
Published By Internet Society
1891562649
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23007
◽
2020
◽
Author(s):
Yuming Wu
◽
Phuong M. Cao
◽
Alexander Withers
◽
Zbigniew T. Kalbarczyk
◽
Ravishankar K. Iyer
Keyword(s):
Brute Force
◽
Threat Intelligence
Download Full-text
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23003
◽
2020
◽
Author(s):
Thien Duc Nguyen
◽
Phillip Rieger
◽
Markus Miettinen
◽
Ahmad-Reza Sadeghi
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
Download Full-text
UIDS: Unikernel-based Intrusion Detection System for the Internet of Things
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23008
◽
2020
◽
Author(s):
Vittorio Cozzolino
◽
Nikolai Schwellnus
◽
Jöšrg Ott
◽
Aaron Yi Ding
Keyword(s):
Internet Of Things
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
The Internet
◽
The Internet Of Things
Download Full-text
ADROIT: Detecting Spatio-Temporal Correlated Attack-Stages in IoT Networks
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23006
◽
2020
◽
Author(s):
Dinil Mon Divakaran
◽
Rhishi Pratap Singh
◽
Kalupahana Liyanage Kushan Sudheera
◽
Mohan Gurusamy
◽
Vinay Sachidananda
Keyword(s):
Spatio Temporal
Download Full-text
Security Analysis against Spoofing Attacks for Distributed UAVs
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23011
◽
2020
◽
Author(s):
Kyo Kim
◽
Siddhartha Nalluri
◽
Ashish Kashinath
◽
Yu Wang
◽
Sibin Mohan
◽
...
Keyword(s):
Security Analysis
Download Full-text
Defending Against Consumer Drone Privacy Attacks: A Blueprint for a Counter Autonomous Drone Tool
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23010
◽
2020
◽
Author(s):
Lanier Watkins
◽
Shane Sartalamacchia
◽
Richard Bradt
◽
Karan Dhareshwar
◽
Harsimar Bagga
◽
...
Download Full-text
Towards Securing the Internet of Things with QUIC
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23001
◽
2020
◽
Author(s):
Lars Eggert
Keyword(s):
Internet Of Things
◽
The Internet
◽
The Internet Of Things
Download Full-text
Sharing Economy in Future Peer-to-peer Electricity Trading Markets: Security and Privacy Analysis
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23005
◽
2020
◽
Author(s):
Mehdi Montakhabi
◽
Akash Madhusudan
◽
Shenja van der Graaf
◽
Aysajan Abidin
◽
Pietr Ballon
◽
...
Keyword(s):
Sharing Economy
◽
Peer To Peer
◽
Security And Privacy
◽
Electricity Trading
◽
Privacy Analysis
Download Full-text
Information Leaks in Federated Learning
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23004
◽
2020
◽
Author(s):
Anastassiya Pustozerova
◽
Rudolf Mayer
Download Full-text
OAuth 2.0 Authorization using Blockchain-based Tokens
Proceedings 2020 Workshop on Decentralized IoT Systems and Security
◽
10.14722/diss.2020.23002
◽
2020
◽
Author(s):
Nikos Fotiou
◽
Iakovos Pittaras
◽
Vasilios A. Siris
◽
Spyros Voulgaris
◽
George C. Polyzos
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close