1 |
Isolation-based automated network hardening |
2 |
Distance Bounding in Aircraft Collision Avoidance Sytems |
3 |
Synthetic media disinformation: exploration and mitigation of deepfaked video content |
4 |
Building a tool for rapid image retrieval and annotation of internet memes |
5 |
An evaluation of machine learning methods for automated detection of hateful social media content |
6 |
NLP and Sentiment analysis applied to the technological landscape: capturing development risks, investment trends, technological emergence and adoption |
7 |
The technological landscape as a socio-technical complex system: capturing technological change through cascading processes of forking mechanisms |
8 |
A stochastic approach to technological development: applying Markov chains to the path dependency of cybersecurity-related technologies |
9 |
A network-analytics approach to technological development: centrality measures for capturing cascading processes of collective intelligence |
10 |
Link prediction as a survivability indicator of cybersecurity-related technologies and companies |
11 |
Follow the money: machine-learning approaches for identifying emerging cybersecurity-related technologies |
12 |
Longitudinal studies and causality testing: forecasting the development of cybersecurity-related technologies using a time series |
13 |
Technological landscape indicators for measuring the development of cybersecurity-related technologies: modelling the time gap between research and patents |
14 |
Assessing the lack of security-by-design of technology clusters: a delay-function approach applied to technological development and security considerations |
15 |
Technological convergence: a network-analytics approach for capturing common attributes of technological innovation |
16 |
Language detection on short texts and how to distinguish closely related languages |
17 |
Quantifying the impact of source language similarity in multilingual neural machine translation? |
18 |
Causality in social media analysis |
19 |
Tipping points: the cause of disruptive mega-trends? |
20 |
Attestation-based routing implementation |
21 |
Secure container virtualization for smartphone OS based on Linux and Android |
22 |
Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations |
23 |
Driver virtualisation multiplexing for a secure mobile operating system |
24 |
Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability) |
25 |
Security analysis of IoT systems (methodology, attack vectors, weaknesses) |
26 |
Deep learning computation speed-up using in-memory computing |
27 |
Evaluating privacy risks of wearable device data |
28 |
Data obfuscation for privacy-preserving machine learning |
29 |
Machine learning for security and privacy analysis |
30 |
Analysis of the effect of trust information on deep learning |
31 |
Developing models for trust computing based on sensor behavior |
32 |
Troll identification on social networks |
33 |
Sensor localization identification through ADS-B and LTE broadcasting |
34 |
Advanced GPS Attacks |
35 |
Micro UAV Security |
36 |
Security and Privacy of Satellite Communications |
37 |
Machine-Learning Based Localization Algorithms |
38 |
Security Analysis and Practical Attacks on Aircraft Avionics |
39 |
Adversarial Machine Learning in Real-World Systems |
40 |
Network traffic classification and continual learning in a real monitoring environment |
41 |
Intelligent decoys: dynamic containers for medium interacion decoys |
42 |
Cyber red team automation: automated reconnaissance, choice of attack path and system exploitation |
43 |
A software ciphering implementation for voice calls and voice conferences |
44 |
Automated COM/DCOM security testing |
45 |
ALPC Fuzzing and Security Testing Framework |
46 |
Small footprint datalink over audio interfaces for pentesting purposes (Microphone, Line.Out) |
47 |
Modular micro c2 framework for penetration testing |
48 |
Real-time application classification on encrypted traffic |
49 |
Automated network advertising protocol for privacy leakage |
50 |
Automatic decoding of unknown wireless signals with machine learning |
51 |
Privacy risks in mobile applications |
52 |
Topological data analysis for attack detection in energy systems |