FPS-2024: 17TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS & PRACTICE OF SECURITY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
Access
Active Learning
Adoption
Adversarial Debiasing
AI-Assistant
AIS
Alloy
Android
Anomaly detection
attack path
attribute-based access control
Attribute-Based Encryption
Authenticated data collection
Authorization
Automata
Automatic Identification System
B
Balance scale
Batteryless IoT
Behavioral authentication system
Behavioural Security Posture
Benchmarking
BERT
binary vulnerability
Blockchains
C
case study
Chaos
Client-work
Cloud Computing
Code Security
Computational Efficiency
Context-Awareness
Control
Control Selection
Control Standards
cryptanalysis
Cryptographic Protocol Shapes Analyzer (CPSA)
CVE report analysis
CWE
cyber risk
Cyber Threat Intelligence
Cyber Threat Intelligence (CTI)
Cyber-Physical Systems
Cybercrime
Cybersecurity
D
Data Privacy
Data traceability
deep learning
Deep Reinforcement Learning
Deepfake
detection
Drone vulnerabilities
Dynamic
E
Electric Vehicle Charging Stations
Energy harvesting
Enforcement
Exploitability prediction
F
Fake News
Fake News Detection
Family Office
Feature Selection
Finance
financial market
Fine-Tuning
Fingerprinting
Formal Methods
Formal Modeling
Formal Verification
Forward Privacy
Fraud Detection
Function Secret Sharing
G
Game theory
Gender Bias
Generative AI
Green AI
H
Homomorphic Encryption
Hyper-chaotic
I
IDS
image recognition
Information Disclosure
Intermittent computing
Internet of Things
Intrusion Detection
IoT
IoT data privacy
K
Knapsack problem
Knowledge and Skills Evaluation
Knowledge Contextualization
L
Large Language Model (LLM)
Large Language Models
Large Language Models (LLM
Latency
Lightweight Cryptography
LLM
Logistic Map
M
Machine Learning
Maritime Communication vulnerabilities
Maritime Cybersecurity
Maritime Simulator
Measurement
Membership Inference Attack
MFBR schemes
missing data
MITRE ATT&CK
Monitoring
Multi-Domain Classification
N
NAS
Natural Language Processing (NLP)
non-SDK interfaces
O
ORAM
P
Parametric
Pattern Matching
Persistent MACs
Privacy
Privacy attacker
Privacy Label
Privacy Perceptions
Privacy-preserving authentication
Privacy-Preserving biometric systems
Privacy-Preserving Machine Learning (PPML)
Probe-requests
Programming Languages
Prompt Tuning
Prompting Techniques
Protocol Analysis
Proxy Re-Encryption
R
Random projection
ransomware
reverse-engineering
S
SCADA
Secure Hardware Components
Secure multiparty computation
Secure transport protocol
Security and Privacy of AI
Security controls
Security Metrics
Security Pattern
security policy mining
Security Protocols
Security testing
Self-Healing
Semi-Supervised Learning
Smart grid security
Smart Speakers
spillover
Sticky Policies
T
Text encryption
Threat Information Detection
threat modeling
Threat Patterns
Transfer Learning
Trusted Execution Environment
Trusted Platform Module
Twitter Data Analysis
Two-Party Computation
U
UML Activity Diagrams
Unsupervised Anomaly Detection
Usable Privacy
Usage Perceptions
User Behaviour
V
Veridex
Verifiable DSSE
Voting
Vulnerability
Vulnerability assessment
Vulnerability prioritization
W
Wi-Fi
Wi-Fi based Drone