Expertises

  • Computer Science

    • Privacy Preserving
    • Attack
    • Homomorphic Encryption
    • Encryption
    • Building Automation
    • Wi-Fi
    • Models
    • Biometric Template Protection

Organisaties

Publicaties

2024
Inferring Recovery Steps from Cyber Threat Intelligence Reports. Kucsván, Z. L., Caselli, M., Peter, A. & Continella, A.ReplicaWatcher: Training-less Anomaly Detection in Containerized MicroservicesIn Proceedings of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024). Association for Computing Machinery. Khairi, A. E., Caselli, M., Peter, A. & Continella, A.https://doi.org/10.14722/ndss.2024.24286RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated AreaIn Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP 2024 (pp. 558-569). SCITEPRESS. Jakubeit, P., Peter, A. & van steen, M.https://doi.org/10.5220/0012437500003648
2023

Onderzoeksprofielen

Verbonden aan opleidingen

Vakken collegejaar 2023/2024

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.

Vakken collegejaar 2022/2023

Lopende projecten

SPA: Seamless Personal Authentication

PriFi: Privacy-Preserving WiFi Tracking for Crowd Management

EVIDENCE: EVolutionary Intrusion DEtectioN for dynamiC Environments

PriMa: Privacy Matters

Joint project with Raymond Veldhuis (UT)

SHARE: Sharing Data with Cryptographic and Differentially Private Guarantees

SeReNity: Evidence-Based Security Response Centers

INTERSECT: Towards an Internet of Secure Things

Coordinated by Sandro Etalle (TU/e)

ThreatMine: Cyber Threat Intelligence Data Mining

BASS: Building Automation Systems Security and Privacy

Voltooide projecten

PensionChain: Blockchain Applications for Pensions

THeCS: Trusted Healthcare Services

CRIPTIM: CRitical Infrastructure Protection Through cryptographic Incident Management

OBRE: Optimal Biometric Recognition under Encryption

#BREACHED: Determining and Reducing the Impact of Data Breaches

Scan de QR-code of
Download vCard