Works Published in 2024

search works

Displaying all 11 works

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2024 conference paper

Examining Cryptography and Randomness Failures in Open-Source Cellular Cores

English, K. V., Bennett, N., Thorn, S., Butler, K. R. B., Enck, W., & Traynor, P. (2024, June 19).

By: K. English, N. Bennett, S. Thorn, K. Butler, W. Enck & P. Traynor

Source: ORCID
Added: June 15, 2024

2024 journal article

A Survey on Software Vulnerability Exploitability Assessment

ACM COMPUTING SURVEYS, 56(8).

By: S. Elder n, M. Rahman n, G. Fringer n, K. Kapoor n & L. Williams n

author keywords: Exploitability; software vulnerability
Source: Web Of Science
Added: June 11, 2024

2024 journal article

Development and validation of the online learner satisfaction instrument

Educational Technology Research and Development.

By: D. Bolliger, F. Martin & S. Kim

Source: ORCID
Added: June 8, 2024

2024 conference paper

Decomposing and Measuring Trust in Open-Source Software Supply Chains

Boughton, L., Miller, C., Acar, Y., Wermke, D., & Kästner, C. (2024, April 14).

Source: ORCID
Added: June 1, 2024

2024 article

The Efficacy of Artificial Intelligence-Enabled Adaptive Learning Systems From 2010 to 2022 on Learner Outcomes: A Meta-Analysis

Wang, X., Huang, R. T., Sommer, M., Pei, B., Shidfar, P., Rehman, M. S., … Martin, F. (2024, May 15). JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, Vol. 5.

By: X. Wang*, R. Huang*, M. Sommer*, B. Pei*, P. Shidfar*, M. Rehman*, A. Ritzhaupt*, F. Martin n

author keywords: adaptive learning; adaptive source; adaptive target; adaptive engine; meta-analysis
Sources: Web Of Science, NC State University Libraries
Added: May 28, 2024

2024 conference paper

5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions

Thorn, S., English, K. V., Butler, K. R. B., & Enck, W. (2024, May 27).

Source: ORCID
Added: May 22, 2024

2024 conference paper

GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies

Polinsky, I., Datta, P., Bates, A., & Enck, W. (2024, May 13).

Source: ORCID
Added: May 15, 2024

2024 conference paper

Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter

Schmüser, J., Ramulu, H. S., Wöhler, N., Stransky, C., Bensmann, F., Dimitrov, D., … Fahl, S. (2024, May 11).

Source: ORCID
Added: May 15, 2024

2024 journal article

Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough

IEEE SECURITY & PRIVACY, 22(2), 4–7.

By: L. Williams n

Source: Web Of Science
Added: April 22, 2024

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.

By: F. Aydin n & A. Aysu n

author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
TL;DR: This article demonstrates side-channel leakages of the Microsoft SEAL HE library and proposes two attacks that can steal encryption keys during the key generation phase by abusing the leakage of ternary value assignments that occurs during the number theoretic transform (NTT) algorithm. (via Semantic Scholar)
Source: Web Of Science
Added: January 29, 2024

2024 journal article

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage

IEEE Transactions on Dependable and Secure Computing.

By: Y. Lee*, H. Chen*, W. Enck n, H. Vijayakumar*, N. Li*, Z. Qian*, G. Petracca*, T. Jaeger*

UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: January 2, 2024

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.