User Tools

Site Tools


posters

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
posters [2025/04/13 17:07] federicoposters [2025/09/01 15:20] (current) federico
Line 11: Line 11:
 | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{:poster:honeykube_-_microservices-based_web_honeypot.jpg?direct&100|}} | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{:poster:honeykube_-_microservices-based_web_honeypot.jpg?direct&100|}} |
 | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{:poster:sok_-_iot_device_identification_under_realistic_conditions.jpg?direct&100|}} | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{:poster:sok_-_iot_device_identification_under_realistic_conditions.jpg?direct&100|}} |
-| Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | | portrait | paper | hanging in the hallway | {{:poster:inferring_recovery_steps_from_cyber_threat_intelligence_reports.jpg?direct&100|}} |+| Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | 2024 | portrait | paper | hanging in the hallway | {{:poster:inferring_recovery_steps_from_cyber_threat_intelligence_reports.jpg?direct&100|}} |
 | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:framed_-_toward_automated_identification_of_embedded_frameworks_in_firmware_images.jpg?direct&100|}} | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:framed_-_toward_automated_identification_of_embedded_frameworks_in_firmware_images.jpg?direct&100|}} |
-| I Still Know What You Watched Last Sunday | Carlotta Tagliaro | | portrait | paper | hanging in the hallway | {{:poster:i_still_know_what_you_watched_last_sunday.jpg?direct&100|}} |+| I Still Know What You Watched Last Sunday | Carlotta Tagliaro | 2024 | portrait | paper | hanging in the hallway | {{:poster:i_still_know_what_you_watched_last_sunday.jpg?direct&100|}} |
 | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:dynamic_detection_and_classification_of_persistence_in_windows_malware.jpg?direct&100|}} | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:dynamic_detection_and_classification_of_persistence_in_windows_malware.jpg?direct&100|}} |
-| Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | | portrait | paper | hanging in the hallway |  +| Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | 2023 | portrait | paper | hanging in the hallway | {{:poster:integration_of_biometric_recognition_and_homomorphic_encryption.jpg?direct&100|}} 
-| Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway |  +| Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{:poster:privacy-preserving_verification_of_clinical_research.jpg?direct&100|}} 
-| DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway |  +| DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{:poster:demo_-_privacy-preserving_telehomecare.jpg?direct&100|}} 
-| SOFIR: Securely Outsourced Forensic Image Recognition | Christoph Bösch | ? | portrait | cardboard | hanging in the hallway |  +| SOFIR: Securely Outsourced Forensic Image Recognition | Christoph Bösch | ? | portrait | cardboard | hanging in the hallway | {{:poster:sofir_-_securely_outsourced_forensic_image_recognition.jpg?direct&100|}} 
-| Specification-based Intrusion Detection in the BACnet Protocol | Herson Esquivel-Vargas | ? | portrait | cardboard | hanging in the hallway |  +| Specification-based Intrusion Detection in the BACnet Protocol | Herson Esquivel-Vargas | ? | portrait | cardboard | hanging in the hallway | {{:poster:specification-based_intrusion_detection_in_the_bacnet_protocol.jpg?direct&100|}} 
-| Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway |  +| Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{:poster:publicly_verifiable_private_aggregation_of_time-series_data.jpg?direct&100|}} 
-| The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 |  +| The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{:poster:the_role_of_tangibility_and_iconicity_in_collaborative_modelling_tasks.jpg?direct&100|}} 
-| What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | | portrait | paper | stored in Zi2042 |  +| What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | 2023 | portrait | paper | stored in Zi2042 | {{:poster:what_do_you_host_-_a_brief_overview_of_self-hosting_technologies_and_services.jpg?direct&100|}} 
-| DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 |  |+| DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{:poster:deepcase_semi-supervised_contextual_analysis_of_security_events.jpg?direct&100|}} | 
 +| TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{:poster:tuccr_-_twente_university_centre_for_cybersecurity_research.jpg?direct&100|}} | 
 +| Defending Cloud Environments: Integrating Static and Runtime Security Measures | Matteo Grella | ? | landscape | paper | stored in Zi2042 | {{:poster:defending_cloud_environments_-_integrating_static_and_runtime_security_measures.jpg?direct&100|}} | 
 +| A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{:poster:a_national_portal_to_report_phishing_in_the_netherlands.jpg?direct&100|}} | 
 +| May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{:poster:may_i_have_your_key.jpg?direct&100|}} | 
 +| Indicators of Malicious SSL Connections | Riccardo Bortolameotti | ? | portrait | paper | stored in Zi2042 | {{:poster:indicators_of_malicious_ssl_connections.jpg?direct&100|}} | 
 +| Privacy From Subjective Value To (Subjective) Value Object: An E3-Value Modeling In The Wake of Ethical Big Data Handling In Healthcare | Syeda Amna Sohail | ? | portrait | paper | stored in Zi2042 | {{:poster:privacy_from_subjective_value_to_subjective_value_object_-_an_e3-value_modeling_in_the_wake_of_ethical_big_data_handling_in_healthcare.jpg?direct&100|}} | 
 +| OBRE: Optimal Biometric Recognition under Encryption | Amina Bassit | ? | portrait | paper | stored in Zi2042 | {{:poster:obre_-_optimal_biometric_recognition_under_encryption.jpg?direct&100|}} | 
 +| Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:multi-client_predicate-only_encryption_for_conjunctive_equality_tests.jpg?direct&100|}} | 
 +| Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:private_data_aggregation_using_multi-client_functional_encryption.jpg?direct&100|}} | 
 +| Evaluating Membership Inference Attacks in heterogeneous-data setups | Bram van Dartel (+ Marc Damie) | 2025 | portrait | paper (damaged due to ICT.Open's strong tape) | stored in Zi2042  | {{:poster:poster_ict_open_mia_and_data_heterogeneity.pdf|view the pdf}} | 
 +| Guard: Robust Detection of Ansible Security Smells | Matteo Grella | 2025 | portrait | paper | stored in Zi2042 | | 
 +| Efficient Ranking, Order Statistics, and Sorting under CKKS | Federico Mazzone | 2025 | landscape | matte paper | hanging in the hallway | {{ :poster:efficient_ranking_order_statistics_and_sorting_under_ckks.pdf|view the pdf}} |
posters.1744564036.txt.gz · Last modified: 2025/04/13 17:07 by federico