


default search action
20th ARES 2025: Ghent, Belgium - Part I
- Mila Dalla Preda

, Sebastian Schrittwieser
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15992, Springer 2025, ISBN 978-3-032-00623-3
Privacy-Enhancing Technologies and Legal Compliance
- Sebastian Pape

, Anis Bkakria
, Badreddine Chah
, Maurice Heymann
, Sarah Syed-Winkler
:
A Framework for Supporting PET Selection Based on GDPR Principles. 3-23 - Philip Groneberg, Saskia Nuñez von Voigt

, Thomas Janke
, Louis Loechel
, Karl Wolf
, Elias Grünewald
, Frank Pallas
:
Prink: ks-Anonymization for Streaming Data in Apache Flink. 24-45 - Fatemeh Marzani, Thijs van Ede, Geert Heijenk, Maarten van Steen:

Stop Watching Me! Moving from Data Protection to Privacy Preservation in Crowd Monitoring. 46-67 - Xander Smeets

, Michele Campobasso
, Nicola Zannone
:
Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. 68-91
Network and Communication Security
- Cheng Tang, Diogo Barradas, Urs Hengartner, Yue Hu:

On the Feasibility of Fingerprinting Collaborative Robot Network Traffic. 95-117 - Denis Petrov

, Pascal Ruffing, Sebastian Zillien
, Steffen Wendzel
:
Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences. 118-140 - Aitor Landa-Arrue

, Jasone Astorga
, Iñaki Garitano
, Aitor Urbieta
:
Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense Through Moving Target Defense and Honeynets. 141-162 - Clément Parssegny, Johan Mazel, Olivier Levillain

, Pierre Chifflier:
Striking Back at Cobalt: Using Network Traffic Metadata to Detect Cobalt Strike Masquerading Command and Control Channels. 163-185 - Florian Frank

, Dominik Püllen
, Alexandru Kampmann, Stefan Katzenbeisser:
Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles. 186-208 - Michael Wrana, Uzma Maroof, Diogo Barradas:

TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting. 209-220 - Federica Bianchi

, Edoardo Di Paolo
, Angelo Spognardi
:
Generalized Encrypted Traffic Classification Using Inter-flow Signals. 221-231
IoT and Embedded Systems Security
- Jiali Xu, Aya Moheddine, Valeria Loscrì, Alessandro Brighente, Mauro Conti:

SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection. 235-256 - Christian Spinnler, Torsten Reißland

, Norman Franchi
:
AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors. 257-277 - Simon Schneider

, Komal Kashish, Katja Tuma
, Riccardo Scandariato
:
In Specs We Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks. 278-300 - Gabriele Magnani

, Isabella Piacentini, Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
:
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-profiled Side Channel Attacks. 301-321 - Francesco Marchiori

, Mauro Conti
:
Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. 322-333
Machine Learning and Privacy
- Chaoyi Zhu

, Jiayi Tang
, Juan F. Pérez
, Marten van Dijk
, Lydia Y. Chen
:
DP-TLDM: Differentially Private Tabular Latent Diffusion Model. 337-357 - Aditya Shankar

, Jérémie Decouchant
, Dimitra Gkorou, Rihan Hai
, Lydia Y. Chen
:
Share Secrets for Privacy: Confidential Forecasting with Vertical Federated Learning. 358-379 - Jiyue Huang, Chi Hong, Stefanie Roos, Lydia Y. Chen:

GIDM: Gradient Inversion of Federated Diffusion Models. 380-401 - Tim Piotrowski, Zoltán Nochta

, Manuel Karl
, Martin Johns
:
Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems. 402-424 - Shadi Farokhghate, Ali Abbasi Tadi, Dima Alhadidi:

BTDT: Membership Inference Attacks Against Large Language Models. 425-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














