Skip to content
About
Vision
Objectives
Methodology
Architecture
Newsletters
Results
Publications
Blog Posts
Demos
Deliverables
Events
Consortium
Contact
Navigation Menu
Navigation Menu
About
Vision
Objectives
Methodology
Architecture
Newsletters
Results
Publications
Blog Posts
Demos
Deliverables
Events
Consortium
Contact
Blog Posts
Impact of Residual Hardware Impairments on RIS-aided Authentication
Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum
Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation
A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions
A Generalized Multi-Layer IDS for Smart Buildings
High-accuracy AoA-based Localization using Hierarchical ML Classifiers in Outdoor Environments
Leveraging Angle of Arrival Estimation against Impersonation Attacks in Physical Layer Authentication
DRACO: Decentralized Asynchronous Federated Learning over Row-Stochastic Wireless Networks
S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning
HyperDtct: Hypervisor-Based Ransomware Detection using System Calls