All Stories

  1. Poster
  2. Poster
  3. Attributes and Dimensions of Trust in Secure Systems
  4. Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
  5. Trust assessment in 32 KiB of RAM
  6. A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks
  7. Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
  8. Security-Minded Verification of Space Systems
  9. Privacy Challenges With Protecting Live Vehicular Location Context
  10. A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
  11. Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation
  12. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks
  13. Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks
  14. The impact of decreasing transmit power levels on FlockLab to achieve a sparse network
  15. Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
  16. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
  17. A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
  18. Hybrid online protocols for source location privacy in wireless sensor networks
  19. A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks
  20. Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks
  21. Understanding source location privacy protocols in sensor networks via perturbation of time series
  22. Deconstructing source location privacy-aware routing protocols
  23. Phantom walkabouts in wireless sensor networks
  24. Towards fake sources for source location privacy in wireless sensor networks with multiple sources
  25. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks
  26. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
  27. Fake source-based source location privacy in wireless sensor networks
  28. Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
  29. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy
  30. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources