TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
$ | |
$\varepsilon$-Differential Privacy | |
$k$-Anonymity | |
$Pk$-Anonymity | |
A | |
accountability | |
ADB | |
Additional: | |
AI safety | |
ALPHV Blackcat | |
android | |
anonymity | |
anonymization | |
APTs | |
artificial intelligence | |
Attack Model | |
attack-aware | |
attribute-based | |
Audio Authentication | |
Authentication | |
Automatic target recognition (ATR) | |
automotive | |
Automotive Security | |
Autonomous Vehicles | |
B | |
backdoor | |
backup | |
Benchmark | |
Benchmarks | |
blockchain | |
Bloom filters | |
bot detection | |
Brute-force Guessing Attack | |
C | |
Certificate | |
Code Patterns | |
collaborative system | |
Communication Protocol | |
Compositionality | |
consumption | |
Context-sharing Platforms | |
controller area network | |
Cooperative Intelligent Transport Systems | |
Countermeasure | |
Countermeasures | |
cyber security | |
cyber-physical systems | |
Cyberattacks | |
cybercrime | |
Cybersecurity | |
D | |
data exposure minimization | |
data scarcity | |
data streaming | |
Decentralized Identifiers | |
deduplication | |
Deep Learning | |
Deepfake | |
DevSecOps | |
Differential Privacy | |
diffusion | |
Digital trust | |
Dilithium | |
distributed ledger technology | |
domain generation algorithm (DGA) | |
downgrade attack | |
E | |
encryption | |
Ensemble models | |
EV charging | |
Evasion Attack | |
F | |
fairness | |
false positive | |
feature engineering | |
feature selection | |
Federated Learning | |
file availability | |
free rider attacks | |
Fuzzy Deduplication | |
G | |
Generative Adversarial Networks | |
generative AI attack | |
group signature | |
H | |
Healthcare Systems | |
Horizontal hiding | |
human | |
human-computer interaction | |
hybrid | |
Hybrid Cryptosystems | |
I | |
Identity and Access Management | |
Index Terms—CCS Concepts: | |
Industrial Control Systems | |
Industrial Frameworks | |
Industry 5.0 | |
infostealer malware | |
initial access brokers | |
insider threat | |
Integrity | |
Internet Key Exchange | |
Internet of Things | |
intrusion detection | |
intrusion detection system | |
IoT | |
IoT Security | |
IPSec | |
ISO 15118-20 | |
K | |
kidney exchange | |
Kyber | |
L | |
Large Language Models | |
Lightweight vision transformer (LViT) | |
Location Privacy | |
M | |
machine learning | |
Machine unlearning | |
malware | |
MBSE | |
MGM Cyber Attack | |
MITRE ATT&CK | |
mobile and wireless | |
modeling | |
multi-task learning | |
Multicategory learning | |
N | |
Network Intrusion Detection | |
network security | |
Network Traffic Classification | |
NTT/INTT | |
O | |
Open set recognition (OSR) | |
Operational Technology | |
operations | |
optimization | |
Orange Espana Attack | |
P | |
parameter-efficient fine-tuning | |
partial masking | |
patient privacy | |
PE vulnerabilities | |
Pen Testing | |
Penetration Testing | |
Poisoning attack | |
portability | |
post-quantum | |
Post-Quantum Cryptography | |
PQC Migration | |
pre-trained models | |
prediction | |
privacy | |
privacy communication | |
Privacy Embedded Learning (PEL) | |
Privacy Quantification | |
Privacy-Preserving | |
Privacy-Preserving Algorithms | |
Probabilistic Anonymization | |
protocol extension | |
R | |
raccoon infostealer | |
Random number generator | |
ransomware | |
Record-Independence | |
Red Teaming | |
RISC-V SoC | |
S | |
sanitizing | |
Scattered Spider | |
script kiddies | |
secure multi-party computation | |
Security | |
security and privacy | |
Security Smells | |
self-disclosure | |
self-sovereign identity | |
sensitivity detection | |
service operations | |
Side-channel attacks | |
Speech | |
standards | |
SW/HW | |
Synthetic aperture radar (SAR | |
T | |
Tag Consistency | |
Threat Analysis and Risk Assessment | |
Threat Modelling | |
ticketing system | |
time delta | |
timestamp | |
TLS | |
token | |
traceability | |
Trajectory Privacy | |
Trajectory Reconstruction | |
transfer learning | |
Tree-based algorithms | |
Trust | |
V | |
VANETs | |
Verifiable Credentials | |
W | |
Watermark | |
wearable device security | |
web metrics | |
X | |
X.509 | |
• | |
• Human-centered computing: Empirical studies in HCI | |
• Security and privacy: Usability in security and privacy |