1 |
5G Security investigation in a realistic 5G Lab |
2 |
Distance Bounding in Aircraft Collision Avoidance Sytems |
3 |
Measuring innovation structures and dynamics of cyber-related technologies: a knowledge-graph approach |
4 |
Measuring risks and benefits of emerging cyber-related technologies: a knowledge-graph approach |
5 |
Exploring production-capability networks of cyber-related technologies: a forecast by analogy approach |
6 |
ICT innovation as a cascading process of collective intelligence: a network approach |
7 |
Capturing innovation dynamics through cascading processes: a non-linear dynamic approach |
8 |
Modelling portfolios of cyber-related emerging technologies: a complex-system approach |
9 |
Capturing the net-present value of cyber-related technologies: a real-option approach |
10 |
Mapping the (swiss) cyber-security research landscape using dynamic network analysis |
11 |
A life-course perspective of technology development |
12 |
Unsupervised learning for international cluster detection in technology development |
13 |
Data visualization: presenting complex data from TMM interactively in an effective manner for decision-makers using JavaScript (e.g. dashboards, interactive infographics, “real-time” radar, etc.) |
14 |
Follow the money: automatically identifying emerging (security) technologies using financial open data (e.g. from the stock market, business models, deal sourcing, fundamental and technical analysis, etc.) |
15 |
Automatically detecting knowledge transfer and procurement opportunities for armasuisse using open data |
16 |
Sentiment analysis: automatically identifying emerging (security) technologies using natural language processing on social media open data (e.g. Twitter, LinkedIn, etc.) |
17 |
Longitudinal studies: forecasting (security) technologies trends using time series / panel data for causality testing |
18 |
Automatic scoring of technology uniqueness using machine learning |
19 |
Data mining: automatically identifying emerging (security) technologies by extracting strategic insights from patent data |
20 |
Automatically identifying Swiss high-value targets (firms, individuals) at high-risk for industrial espionage using open data |
21 |
Automatically assessing emerging (security) technologies for risks (and opportunities) using threat intelligence platforms open data (e.g. OTX, MISP, etc.) |
22 |
Taxonomies, ontologies and knowledge graphs: how to systemically and automatically cluster emerging (security) technologies using open data (e.g. Wikipedia, NOGA, etc.) |
23 |
Language detection on short texts and how to distinguish closely related languages |
24 |
Quantifying the impact of source language similarity in multilingual neural machine translation? |
25 |
Causality in social media analysis |
26 |
Tipping points: the cause of disruptive mega-trends? |
27 |
Explicit path routing in untrusted inter-domain networks |
28 |
Secure container virtualization for smartphone OS based on Linux and Android |
29 |
Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations |
30 |
Driver virtualisation multiplexing for a secure mobile operating system |
31 |
Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability) |
32 |
Security analysis of IoT systems (methodology, attack vectors, weaknesses) |
33 |
Deep learning computation speed-up using in-memory computing |
34 |
Evaluating privacy risks of wearable device data |
35 |
Data obfuscation for privacy-preserving machine learning |
36 |
Machine learning for security and privacy analysis |
37 |
Analysis of the effect of trust information on deep learning |
38 |
Developing models for trust computing based on sensor behavior |
39 |
Deep learning models for sensor behavior profiling |
40 |
Sensor location identification through ADS-B and LTE broadcasting |
41 |
Advanced GPS Attacks |
42 |
Micro UAV Security |
43 |
Security and Privacy of Satellite Communications |
44 |
Machine-Learning Based Localization Algorithms |
45 |
Security Analysis and Practical Attacks on Aircraft Avionics |
46 |
Adversarial Machine Learning in Real-World Systems |
47 |
Network traffic classification and continual learning in a real monitoring environment |
48 |
Intelligent decoys: dynamic containers for medium interacion decoys |
49 |
Cyber red team automation: automated reconnaissance, choice of attack path and system exploitation |
50 |
A software ciphering implementation for voice calls and voice conferences |
51 |
Automated input generation to reach certain code parts in a binary |
52 |
Improved symbolic exection for complex binaries |
53 |
Automated COM/DCOM security testing |
54 |
Security of contact tracing applications |
55 |
Privacy leaks in IoT wireless communication protocols |
56 |
Unsupervised learning for radio signal decoding |
57 |
Privacy risks in mobile applications |
58 |
Machine Learning Techniques for Similarity Estimation of Vulnerable Binary Code |