.- Identity Management, Authentication, Access Control & Formal
Modeling.
.- Toward Secure and Trustworthy Identity Management Systems: A
Knowledge-base Driven Approach.
.- Always Authenticated, Never Exposed: Continuous Authentication via
Zero-Knowledge Proofs.
.- Pragmatic guidelines for formal modeling of security ceremonies.
.- Access Control Administration for Smart Homes.
.- AI & Machine Learning for Security.
.- Parameter-Efficient Fine-Tuning of LLMs for Intrusion Detection and
Firewall Rule Generation: A Comparative Study.
.- ABusing social media & sentiment analysis for stock market prediction.
.- DrATC+: A Divide et Impera Extension to Trust-Based Dynamic Routing.
.- Cybersecurity Strategies, Regulations, Privacy.
.- How to Train Your Guardian: Evaluating Cyber Security Exercises
Using Situation Awareness.
.- Towards an architecture for managing security under the EU Cyber
Resilience Act.
.- Google Tag Manager and its Privacy Issues.
.- Cryptography & Threat Analysis.
.- Measuring Modern Phishing Tactics: A Quantitative Study of Body
Obfuscation Prevalence, Co-occurrence, and Filter Impact.
.- Nicknames for Group Signatures.
.- The Impact of Filtering in Differential Cryptanalysis: A Case Study on
FEAL-8.