TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
Access | |
Active Learning | |
Adoption | |
Adversarial Debiasing | |
AI-Assistant | |
AIS | |
Alloy | |
Android | |
Anomaly detection | |
attack path | |
attribute-based access control | |
Attribute-Based Encryption | |
Authenticated data collection | |
Authorization | |
Automata | |
Automatic Identification System | |
B | |
Balance scale | |
Batteryless IoT | |
Behavioral authentication system | |
Behavioural Security Posture | |
Benchmarking | |
BERT | |
binary vulnerability | |
Blockchains | |
C | |
case study | |
Chaos | |
Client-work | |
Cloud Computing | |
Code Security | |
Computational Efficiency | |
Context-Awareness | |
Control | |
Control Selection | |
Control Standards | |
cryptanalysis | |
Cryptographic Protocol Shapes Analyzer (CPSA) | |
CVE report analysis | |
CWE | |
cyber risk | |
Cyber Threat Intelligence | |
Cyber Threat Intelligence (CTI) | |
Cyber-Physical Systems | |
Cybercrime | |
Cybersecurity | |
D | |
Data Privacy | |
Data traceability | |
deep learning | |
Deep Reinforcement Learning | |
Deepfake | |
detection | |
Drone vulnerabilities | |
Dynamic | |
E | |
Electric Vehicle Charging Stations | |
Energy harvesting | |
Enforcement | |
Exploitability prediction | |
F | |
Fake News | |
Fake News Detection | |
Family Office | |
Feature Selection | |
Finance | |
financial market | |
Fine-Tuning | |
Fingerprinting | |
Formal Methods | |
Formal Modeling | |
Formal Verification | |
Forward Privacy | |
Fraud Detection | |
Function Secret Sharing | |
G | |
Game theory | |
Gender Bias | |
Generative AI | |
Green AI | |
H | |
Homomorphic Encryption | |
Hyper-chaotic | |
I | |
IDS | |
image recognition | |
Information Disclosure | |
Intermittent computing | |
Internet of Things | |
Intrusion Detection | |
IoT | |
IoT data privacy | |
K | |
Knapsack problem | |
Knowledge and Skills Evaluation | |
Knowledge Contextualization | |
L | |
Large Language Model (LLM) | |
Large Language Models | |
Large Language Models (LLM | |
Latency | |
Lightweight Cryptography | |
LLM | |
Logistic Map | |
M | |
Machine Learning | |
Maritime Communication vulnerabilities | |
Maritime Cybersecurity | |
Maritime Simulator | |
Measurement | |
Membership Inference Attack | |
MFBR schemes | |
missing data | |
MITRE ATT&CK | |
Monitoring | |
Multi-Domain Classification | |
N | |
NAS | |
Natural Language Processing (NLP) | |
non-SDK interfaces | |
O | |
ORAM | |
P | |
Parametric | |
Pattern Matching | |
Persistent MACs | |
Privacy | |
Privacy attacker | |
Privacy Label | |
Privacy Perceptions | |
Privacy-preserving authentication | |
Privacy-Preserving biometric systems | |
Privacy-Preserving Machine Learning (PPML) | |
Probe-requests | |
Programming Languages | |
Prompt Tuning | |
Prompting Techniques | |
Protocol Analysis | |
Proxy Re-Encryption | |
R | |
Random projection | |
ransomware | |
reverse-engineering | |
S | |
SCADA | |
Secure Hardware Components | |
Secure multiparty computation | |
Secure transport protocol | |
Security and Privacy of AI | |
Security controls | |
Security Metrics | |
Security Pattern | |
security policy mining | |
Security Protocols | |
Security testing | |
Self-Healing | |
Semi-Supervised Learning | |
Smart grid security | |
Smart Speakers | |
spillover | |
Sticky Policies | |
T | |
Text encryption | |
Threat Information Detection | |
threat modeling | |
Threat Patterns | |
Transfer Learning | |
Trusted Execution Environment | |
Trusted Platform Module | |
Twitter Data Analysis | |
Two-Party Computation | |
U | |
UML Activity Diagrams | |
Unsupervised Anomaly Detection | |
Usable Privacy | |
Usage Perceptions | |
User Behaviour | |
V | |
Veridex | |
Verifiable DSSE | |
Voting | |
Vulnerability | |
Vulnerability assessment | |
Vulnerability prioritization | |
W | |
Wi-Fi | |
Wi-Fi based Drone |