The Automatic Dependant Surveillance-Broadcast (ADS-B) message scheme wa...
This work investigates the potential of Federated Learning (FL) for offi...
Probe requests help mobile devices discover active Wi-Fi networks. They ...
Case studies of application software data models indicate that timestamp...
During the training of machine learning models, they may store or "learn...
Cyber attacks in the maritime sector can have a major impact on world
ec...
In today's digital society, the Tor network has become an indispensable ...
Pseudonymisation provides the means to reduce the privacy impact of
moni...
A significant amount of connection establishments on the web require a p...
Small TCP flows make up the majority of web flows. For them, the TCP
thr...
QUIC is a secure transport protocol and aims to improve the performance ...
TLS can resume previous connections via abbreviated resumption handshake...
User tracking on the Internet can come in various forms, e.g., via cooki...
The AN.ON-Next project aims to integrate privacy-enhancing technologies ...