TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Access | |
| Active Learning | |
| Adoption | |
| Adversarial Debiasing | |
| AI-Assistant | |
| AIS | |
| Alloy | |
| Android | |
| Anomaly detection | |
| attack path | |
| attribute-based access control | |
| Attribute-Based Encryption | |
| Authenticated data collection | |
| Authorization | |
| Automata | |
| Automatic Identification System | |
| B | |
| Balance scale | |
| Batteryless IoT | |
| Behavioral authentication system | |
| Behavioural Security Posture | |
| Benchmarking | |
| BERT | |
| binary vulnerability | |
| Blockchains | |
| C | |
| case study | |
| Chaos | |
| Client-work | |
| Cloud Computing | |
| Code Security | |
| Computational Efficiency | |
| Context-Awareness | |
| Control | |
| Control Selection | |
| Control Standards | |
| cryptanalysis | |
| Cryptographic Protocol Shapes Analyzer (CPSA) | |
| CVE report analysis | |
| CWE | |
| cyber risk | |
| Cyber Threat Intelligence | |
| Cyber Threat Intelligence (CTI) | |
| Cyber-Physical Systems | |
| Cybercrime | |
| Cybersecurity | |
| D | |
| Data Privacy | |
| Data traceability | |
| deep learning | |
| Deep Reinforcement Learning | |
| Deepfake | |
| detection | |
| Drone vulnerabilities | |
| Dynamic | |
| E | |
| Electric Vehicle Charging Stations | |
| Energy harvesting | |
| Enforcement | |
| Exploitability prediction | |
| F | |
| Fake News | |
| Fake News Detection | |
| Family Office | |
| Feature Selection | |
| Finance | |
| financial market | |
| Fine-Tuning | |
| Fingerprinting | |
| Formal Methods | |
| Formal Modeling | |
| Formal Verification | |
| Forward Privacy | |
| Fraud Detection | |
| Function Secret Sharing | |
| G | |
| Game theory | |
| Gender Bias | |
| Generative AI | |
| Green AI | |
| H | |
| Homomorphic Encryption | |
| Hyper-chaotic | |
| I | |
| IDS | |
| image recognition | |
| Information Disclosure | |
| Intermittent computing | |
| Internet of Things | |
| Intrusion Detection | |
| IoT | |
| IoT data privacy | |
| K | |
| Knapsack problem | |
| Knowledge and Skills Evaluation | |
| Knowledge Contextualization | |
| L | |
| Large Language Model (LLM) | |
| Large Language Models | |
| Large Language Models (LLM | |
| Latency | |
| Lightweight Cryptography | |
| LLM | |
| Logistic Map | |
| M | |
| Machine Learning | |
| Maritime Communication vulnerabilities | |
| Maritime Cybersecurity | |
| Maritime Simulator | |
| Measurement | |
| Membership Inference Attack | |
| MFBR schemes | |
| missing data | |
| MITRE ATT&CK | |
| Monitoring | |
| Multi-Domain Classification | |
| N | |
| NAS | |
| Natural Language Processing (NLP) | |
| non-SDK interfaces | |
| O | |
| ORAM | |
| P | |
| Parametric | |
| Pattern Matching | |
| Persistent MACs | |
| Privacy | |
| Privacy attacker | |
| Privacy Label | |
| Privacy Perceptions | |
| Privacy-preserving authentication | |
| Privacy-Preserving biometric systems | |
| Privacy-Preserving Machine Learning (PPML) | |
| Probe-requests | |
| Programming Languages | |
| Prompt Tuning | |
| Prompting Techniques | |
| Protocol Analysis | |
| Proxy Re-Encryption | |
| R | |
| Random projection | |
| ransomware | |
| reverse-engineering | |
| S | |
| SCADA | |
| Secure Hardware Components | |
| Secure multiparty computation | |
| Secure transport protocol | |
| Security and Privacy of AI | |
| Security controls | |
| Security Metrics | |
| Security Pattern | |
| security policy mining | |
| Security Protocols | |
| Security testing | |
| Self-Healing | |
| Semi-Supervised Learning | |
| Smart grid security | |
| Smart Speakers | |
| spillover | |
| Sticky Policies | |
| T | |
| Text encryption | |
| Threat Information Detection | |
| threat modeling | |
| Threat Patterns | |
| Transfer Learning | |
| Trusted Execution Environment | |
| Trusted Platform Module | |
| Twitter Data Analysis | |
| Two-Party Computation | |
| U | |
| UML Activity Diagrams | |
| Unsupervised Anomaly Detection | |
| Usable Privacy | |
| Usage Perceptions | |
| User Behaviour | |
| V | |
| Veridex | |
| Verifiable DSSE | |
| Voting | |
| Vulnerability | |
| Vulnerability assessment | |
| Vulnerability prioritization | |
| W | |
| Wi-Fi | |
| Wi-Fi based Drone | |