Ferrag, D.
27  results:
Search for persons X
?
1

Distance-Only Task Orchestration Algorithm for Energy Effic..:

, In: 2024 8th International Conference on Image and Signal Processing and their Applications (ISPA),
 
?
2

Proximity-Driven, Load-Balancing Task Offloading Algorithm ..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Wireless Internet,
 
?
3

Rapid Taint Assisted Concolic Execution (TACE):

, In: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering,
Jain, Ridhi ; Tihanyi, Norbert ; Ndhlovu, Mthandazo.. - p. 627-631 , 2024
 
?
4

Reliability Analysis of Fault Tolerant Memory Systems:

, In: 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM),
 
?
5

Generative Adversarial Networks-Driven Cyber Threat Intelli..:

, In: 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT),
 
?
6

Poisoning Attacks in Federated Edge Learning for Digital Tw..:

, In: 2023 IEEE International Conference on Communications Workshops (ICC Workshops),
 
?
7

Android Malware Detection Based on Network Analysis and Fed..:

, In: Security Informatics and Law Enforcement; Cyber Malware,
 
?
8

Authentication Schemes for Internet of Drones: Taxonomy, Th..:

, In: 2023 3rd International Conference on Computing and Information Technology (ICCIT),
 
?
9

Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Ne..:

, In: 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW),
 
?
10

Static Radio Transmission Power-Changing in Fog Computing: ..:

, In: 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM),
 
?
11

The FormAI Dataset: Generative AI in Software Security thro..:

, In: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering,
Tihanyi, Norbert ; Bisztray, Tamas ; Jain, Ridhi... - p. 33-43 , 2023
 
?
12

Security Revisited: Honeytokens meet Google Authenticator:

, In: 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM),
 
?
13

SAMA: Security-Aware Monitoring Approach for Location Abusi..:

, In: Cognitive Radio Oriented Wireless Networks and Wireless Internet; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
 
?
14

Deep Learning with Recurrent Expansion for Electricity Thef..:

, In: IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society,
 
?
15

Cyber Threats in the Healthcare Sector and Countermeasures:

, In: Research Anthology on Securing Medical Systems and Records,
 
1-15