Security Evaluation of Pattern Classifiers under Attack

Security Evaluation of Pattern Classifiers under Attack Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose […]


Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a […]