Skip to content
About
Vision
Objectives
Methodology
Architecture
Newsletters
Results
Publications
Blog Posts
Demos
Deliverables
Events
Consortium
Contact
Navigation Menu
Navigation Menu
About
Vision
Objectives
Methodology
Architecture
Newsletters
Results
Publications
Blog Posts
Demos
Deliverables
Events
Consortium
Contact
Blog Posts
Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
ADMM-Based Training for Spiking Neural Networks
A Comparative Study of DDoS Attack Detection in Traditional Networks and SDN Using Time and Frequency Domain Features
Impact of Residual Hardware Impairments on RIS-aided Authentication
Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum
Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation
A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions
A Generalized Multi-Layer IDS for Smart Buildings
High-accuracy AoA-based Localization using Hierarchical ML Classifiers in Outdoor Environments
Leveraging Angle of Arrival Estimation against Impersonation Attacks in Physical Layer Authentication