Related publications (8)

A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

Jan Van Herle, Hossein Pourrahmani

The current advances in the Internet of Things (IoT) and the solutions being offered by this technology have accounted IoT among the top ten technologies that will transform the global economy by 2030. IoT is a state-of-the-art paradigm that has developed ...
2023

Machine Learning Security in Industry: A Quantitative Survey

Kathrin Grosse

Despite the large body of academic work on machine learning security, little is known about the occurrence of attacks on machine learning systems in the wild. In this paper, we report on a quantitative study with 139 industrial practitioners. We analyze at ...
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC2023

Digital Information Asset Evaluation: A Case Study in Manufacturing

Gianluigi Viscusi

The article discusses a model for information value assessment based on the concepts of information capacity, information utility, and information management costs. Notwithstanding that both state-of-the-art researchers and practitioners consider informati ...
2018

Information Production and Social Value for Public Policy: A Conceptual Modeling Perspective

Gianluigi Viscusi

The article investigates the potential role of conceptual modeling for policymaking. It argues that the use of conceptual schemas may provide an effective understanding of public sector information assets, and how they might be used to satisfy the needs of ...
Wiley-Blackwell2016

Governing Cyber Security Risks and Benefits of the Internet of Things: Application to Connected Vehicles and Medical Devices

Marie-Valentine Renée Agnès Florin

Creating trust in connectivity including confidentiality, integrity and availability will be key to achieving the promises of the IoT, at least in the automotive and medical sector. Assessing vulnerability, implementing and assessing security controls, des ...
International Risk Governance Center (IRGC)2016

Assessment of Environmental Impacts Related to Shale Gas Extraction in the Polish Contex

Nicolas Füllemann

In the last decade, the exponential development of shale gas activities in United States resulted in a real revolution both in terms of gas prices and energy security. However, next to these positive effects, many risks and impacts for the environment and ...
2012

Stability of a leakage pathway in a cemented annulus

Brice Tanguy Alphonse Lecampion

The risk minimization of carbon dioxide (CO2) storage relies to some extent on well integrity assurance. While chemical reactions between the constitutive materials of the wellbore - such as cement - and stored CO 2 do not jeopardize the efficiency of a de ...
2011

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards

Martin Vuagnoux, Sylvain Pasini

Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The techni ...
USENIX Association2009

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.