Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_1
Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis
{"title":"PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks","authors":"Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis","doi":"10.1007/978-3-030-45371-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_3
H. Shirazi, I. Ray, Charles Anderson
{"title":"Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles","authors":"H. Shirazi, I. Ray, Charles Anderson","doi":"10.1007/978-3-030-45371-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_3","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_26
Lalia Saoudi, K. Adi, Younes Boudraa
{"title":"A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications","authors":"Lalia Saoudi, K. Adi, Younes Boudraa","doi":"10.1007/978-3-030-45371-8_26","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_26","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_15
Daniel Servos, M. Bauer
{"title":"Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control","authors":"Daniel Servos, M. Bauer","doi":"10.1007/978-3-030-45371-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_8
Meng Yang, G. Gong
{"title":"Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS","authors":"Meng Yang, G. Gong","doi":"10.1007/978-3-030-45371-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_13
Peter Amthor, M. Rabe
{"title":"Command Dependencies in Heuristic Safety Analysis of Access Control Models","authors":"Peter Amthor, M. Rabe","doi":"10.1007/978-3-030-45371-8_13","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121657652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1007/978-3-030-45371-8_18
P. Lafourcade, Mike Nopere, Jérémy Picot, D. Pizzuti, Etienne Roudeix
{"title":"Security Analysis of Auctionity: A Blockchain Based E-Auction","authors":"P. Lafourcade, Mike Nopere, Jérémy Picot, D. Pizzuti, Etienne Roudeix","doi":"10.1007/978-3-030-45371-8_18","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-30DOI: 10.1007/978-3-030-45371-8_9
S. Avizheh, R. Safavi-Naini, Shuai Li
{"title":"Secure Logging with Security against Adaptive Crash Attack","authors":"S. Avizheh, R. Safavi-Naini, Shuai Li","doi":"10.1007/978-3-030-45371-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_10
Erick Martínez, Bella Oh, Feng Li, Xiao Luo
{"title":"Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples","authors":"Erick Martínez, Bella Oh, Feng Li, Xiao Luo","doi":"10.1007/978-3-030-18419-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_16
Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet
{"title":"When Fault Injection Collides with Hardware Complexity","authors":"Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet","doi":"10.1007/978-3-030-18419-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}