Abstract Online Social Networks (OSNs) have become a primary area of interest for cutting- edge cybersecurity applications, due to their ever increasing popularity and to the variety of …
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus …
Vulnerability analysis has long been used to evaluate the security posture of a system. Different approaches, including vulnerability graphs and various vulnerability metrics, have …
S Helmer, F Persia - … Journal of Multimedia Data Engineering and …, 2016 - igi-global.com
The authors propose ISEQL, a language based on relational algebra extended by intervals for detecting high-level surveillance events from a video stream. The operators they …
Many different techniques and tools have been proposed to prevent and detect malicious activities by means of a very challenging data analysis task. The main sources for data …
In this paper, we present an overview of video surveillance approaches that are more related to the Internet-of-things (IoT) paradigm. We describe the first model-based …
For more than a decade, the notion of attack surface has been used to define the set of vulnerable assets that an adversary may exploit to penetrate a system, and various metrics …
In numerous security scenarios, given a sequence of logged activities, it is necessary to look for all subsequences that represent an intrusion, which can be meant as any “improper” use …
S Helmer, F Persia - 2016 IEEE Tenth International Conference …, 2016 - ieeexplore.ieee.org
We propose a language based on relational algebra extended by intervals for detecting high- level surveillance events from a video stream. The operators we introduce for describing …