posters
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| posters [2025/04/13 16:53] – federico | posters [2025/09/01 15:20] (current) – federico | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Posters ====== | ====== Posters ====== | ||
| - | ^ Title ^ Author ^ Year ^ Orientation ^ Type ^ Status ^ Thumbnail ^ | + | ^ Title ^ Author ^ Year ^ Orientation ^ Material |
| | Models for Risk Assessment of Socio-Technical Systems | Dan Ionita | ? | landscape | paper | hanging in the hallway | {{: | | Models for Risk Assessment of Socio-Technical Systems | Dan Ionita | ? | landscape | paper | hanging in the hallway | {{: | ||
| | The Personal Information Security Assistant | Roeland Kegel | ? | portrait | cardboard | hanging in the hallway | {{: | | The Personal Information Security Assistant | Roeland Kegel | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | Developing Situation-Aware Applications for Disaster Management with a Distributed Rule-Based Platform | João Moreira | ? | portrait | cardboard | hanging in the hallway | {{: | | Developing Situation-Aware Applications for Disaster Management with a Distributed Rule-Based Platform | João Moreira | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | SMART LOGISTICS - An enterprise architecture perspective | Prince Singh | ? | portrait | cardboard | hanging in the hallway | {{: | | SMART LOGISTICS - An enterprise architecture perspective | Prince Singh | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| - | | A domain specific language for context-aware well-being systems | Steven Bosems | ? | ? | ? | ? | {{: | + | | A domain specific language for context-aware well-being systems | Steven Bosems | ? | portrait |
| - | | FAIR Data Management for Explainable Machine Learning | Donika Xhani | ? | ? | ? | ? | ? | {{: | + | | FAIR Data Management for Explainable Machine Learning | Donika Xhani | 2024 | portrait |
| - | | Understanding Phishing Victimization from Literature: A Data-Driven Meta-Analysis | Javara Allah Bukhsh | ? | ? | ? | ? | ? | {{: | + | | Understanding Phishing Victimization from Literature: A Data-Driven Meta-Analysis | Javara Allah Bukhsh | ? | portrait |
| - | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | ? | ? | ? | ? | {{: | + | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape |
| - | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | ? | ? | ? | ? | {{: | + | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait |
| - | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | ? | ? | ? | ? | ? | {{: | + | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | 2024 | portrait |
| - | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | ? | ? | ? | ? | {{: | + | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait |
| - | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | ? | ? | ? | ? | ? | {{: | + | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | 2024 | portrait |
| - | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | ? | ? | ? | ? | {{:poster:dynamic_detection_and_classification_of_persistence_in_windows_malware.jpg? | + | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: |
| + | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | 2023 | portrait | paper | hanging in the hallway | {{: | ||
| + | | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| + | | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | ||
| + | | SOFIR: Securely Outsourced Forensic Image Recognition | Christoph Bösch | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| + | | Specification-based Intrusion Detection in the BACnet Protocol | Herson Esquivel-Vargas | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| + | | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| + | | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{: | ||
| + | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | 2023 | portrait | paper | stored in Zi2042 | {{: | ||
| + | | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Defending Cloud Environments: | ||
| + | | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Indicators of Malicious SSL Connections | Riccardo Bortolameotti | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Privacy From Subjective Value To (Subjective) Value Object: An E3-Value Modeling In The Wake of Ethical Big Data Handling In Healthcare | Syeda Amna Sohail | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | OBRE: Optimal Biometric Recognition under Encryption | Amina Bassit | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Evaluating Membership Inference Attacks in heterogeneous-data setups | Bram van Dartel (+ Marc Damie) | 2025 | portrait | paper (damaged due to ICT.Open' | ||
| + | | Guard: Robust Detection of Ansible Security Smells | Matteo Grella | 2025 | portrait | paper | stored in Zi2042 | | | ||
| + | | Efficient Ranking, Order Statistics, and Sorting under CKKS | Federico Mazzone | 2025 | landscape | matte paper | hanging in the hallway | {{ : | ||
posters.1744563192.txt.gz · Last modified: 2025/04/13 16:53 by federico
