BenchIoT: A Security Benchmark for the Internet of Things
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this work, we present eXtendible Heterogeneous Energy-Efficient Platform (X-HEEP), an open-source, configurable, and extendible RISC-V microcontroller to support the integration of ultra-low-power edge accelerators natively. ...
Public policy evaluation has traditionally been conducted in a context constrained by legal, institutional and political red tape. The arrival of digitalisation adds a new layer to public policy evaluation processes. Assessing the quality of technologies, ...
Edward Elgar Publishing2023
, , , ,
File formats are described in read_me files in the concerning folder. For plotting and data evaluation, Python 2.7 was used. Example scripts for plotting are provided. ...
Zenodo2023
,
SwissCovid is the Swiss digital contact tracing app, which was deployed to help fighting against the COVID-19 pandemic. After a year of activity, it is high time to evaluate how effective it has been in its mission. At the highest peak, about 22% of the Sw ...
In this lesson you will learn about text reuse detection – the automatic identification of reused passages in texts – and why you might want to use it in your research. Through a detailed installation guide and two case studies, this lesson will teach you ...
Following up mass surveillance and privacy issues, modern secure communication protocols now seek strong security, such as forward secrecy and post-compromise security, in the face of state exposures. To address this problem, ratcheting was thereby introdu ...
Bluetooth is a pervasive wireless technology specified in an open standard. The standard defines Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low Energy (BLE) very low-power ones. The standard also specifies security mechanism ...
The design and development of future smart city services will usher with unprecedented creativity, a plethora of functionalities and conveniences to the urban communities. The success of smart city services depends on the assurance that security is maintai ...
Embedded systems are deployed in security critical environments and have become a prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly vulnerable due to a combination of limited resources and low level programming whic ...
We present an analysis of the SwissCovid application which is currently being tested. We observe that the essential part of SwissCovid is under the control of Apple and Google. Outsourcing the heart of SwissCovid to Apple and Google has apparent benefits i ...