posters
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| posters [2025/04/13 17:26] – federico | posters [2025/09/01 15:20] (current) – federico | ||
|---|---|---|---|
| Line 11: | Line 11: | ||
| | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{: | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{: | ||
| | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{: | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | ? | portrait | paper | hanging in the hallway | {{: | + | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | 2024 | portrait | paper | hanging in the hallway | {{: |
| | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | ? | portrait | paper | hanging in the hallway | {{: | + | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | 2024 | portrait | paper | hanging in the hallway | {{: |
| | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{: | ||
| - | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | ? | portrait | paper | hanging in the hallway | {{: | + | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | 2023 | portrait | paper | hanging in the hallway | {{: |
| | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{: | | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{: | | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| Line 22: | Line 22: | ||
| | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{: | | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{: | ||
| | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{: | | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{: | ||
| - | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | ? | portrait | paper | stored in Zi2042 | {{: | + | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | 2023 | portrait | paper | stored in Zi2042 | {{: |
| | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{: | | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{: | ||
| | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{: | | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{: | ||
| - | | Defending Cloud Environments: | + | | Defending Cloud Environments: |
| | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{: | | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{: | ||
| | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{: | | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{: | ||
| Line 33: | Line 33: | ||
| | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | ||
| | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{: | ||
| + | | Evaluating Membership Inference Attacks in heterogeneous-data setups | Bram van Dartel (+ Marc Damie) | 2025 | portrait | paper (damaged due to ICT.Open' | ||
| + | | Guard: Robust Detection of Ansible Security Smells | Matteo Grella | 2025 | portrait | paper | stored in Zi2042 | | | ||
| + | | Efficient Ranking, Order Statistics, and Sorting under CKKS | Federico Mazzone | 2025 | landscape | matte paper | hanging in the hallway | {{ : | ||
posters.1744565201.txt.gz · Last modified: 2025/04/13 17:26 by federico
