posters
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| posters [2025/04/13 17:23] – federico | posters [2025/09/01 15:20] (current) – federico | ||
|---|---|---|---|
| Line 11: | Line 11: | ||
| | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{: | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{: | ||
| | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{: | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | ? | portrait | paper | hanging in the hallway | {{: | + | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | 2024 | portrait | paper | hanging in the hallway | {{: |
| | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | ? | portrait | paper | hanging in the hallway | {{: | + | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | 2024 | portrait | paper | hanging in the hallway | {{: |
| | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | ? | portrait | paper | hanging in the hallway | {{: | + | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | 2023 | portrait | paper | hanging in the hallway | {{: |
| | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{: | | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{: | | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| Line 22: | Line 22: | ||
| | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{: | | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{: | | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{: | ||
| - | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | ? | portrait | paper | stored in Zi2042 | {{: | + | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | 2023 | portrait | paper | stored in Zi2042 | {{: |
| | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{: | | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{: | ||
| - | | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{: | + | | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{:poster:tuccr_-_twente_university_centre_for_cybersecurity_research.jpg? |
| - | | Defending Cloud Environments: | + | | Defending Cloud Environments: |
| - | | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{: | + | | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{:poster:a_national_portal_to_report_phishing_in_the_netherlands.jpg? |
| - | | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{: | + | | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{:poster:may_i_have_your_key.jpg? |
| - | | Indicators of Malicious SSL Connections | Riccardo Bortolameotti | ? | portrait | paper | stored in Zi2042 | {{: | + | | Indicators of Malicious SSL Connections | Riccardo Bortolameotti | ? | portrait | paper | stored in Zi2042 | {{:poster:indicators_of_malicious_ssl_connections.jpg? |
| - | | Privacy From Subjective Value To (Subjective) Value Object: An E3-Value Modeling In The Wake of Ethical Big Data Handling In Healthcare | Syeda Amna Sohail | ? | portrait | paper | stored in Zi2042 | {{: | + | | Privacy From Subjective Value To (Subjective) Value Object: An E3-Value Modeling In The Wake of Ethical Big Data Handling In Healthcare | Syeda Amna Sohail | ? | portrait | paper | stored in Zi2042 | {{:poster:privacy_from_subjective_value_to_subjective_value_object_-_an_e3-value_modeling_in_the_wake_of_ethical_big_data_handling_in_healthcare.jpg? |
| - | | OBRE: Optimal Biometric Recognition under Encryption | Amina Bassit | ? | portrait | paper | stored in Zi2042 | {{: | + | | OBRE: Optimal Biometric Recognition under Encryption | Amina Bassit | ? | portrait | paper | stored in Zi2042 | {{:poster:obre_-_optimal_biometric_recognition_under_encryption.jpg? |
| - | | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | + | | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:multi-client_predicate-only_encryption_for_conjunctive_equality_tests.jpg? |
| - | | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | + | | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:private_data_aggregation_using_multi-client_functional_encryption.jpg? |
| + | | Evaluating Membership Inference Attacks in heterogeneous-data setups | Bram van Dartel (+ Marc Damie) | 2025 | portrait | paper (damaged due to ICT.Open' | ||
| + | | Guard: Robust Detection of Ansible Security Smells | Matteo Grella | 2025 | portrait | paper | stored in Zi2042 | | | ||
| + | | Efficient Ranking, Order Statistics, and Sorting under CKKS | Federico Mazzone | 2025 | landscape | matte paper | hanging in the hallway | {{ : | ||
posters.1744565026.txt.gz · Last modified: 2025/04/13 17:23 by federico
