Search results

  • Conference contribution

    BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

    Lotto, A., Singh, V., Ramasubramanian, B., Brighente, A., Conti, M. & Poovendran, R., 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 133-144 12 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • Behavioral Clustering of Non-Stationary IP Flow Record Data

    Hammerschmidt, C., Marchal, S., State, R. & Verwer, S., Nov 2016, 12th International Conference on Network and Service Management CNSM 2016. Piscataway, NJ: IEEE, p. 253-257 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints

    Bliek, L., Guijt, A., Verwer, S. & De Weerdt, M., 2021, GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1851-1859 9 p. (GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    91 Downloads (Pure)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    95 Downloads (Pure)
  • Car-following Behavior Model Learning Using Timed Automata

    Zhang, Y., Lin, Q., Wang, J. & Verwer, S., Jul 2017, IFAC-PapersOnLine. Dochain, D., Henrion, D. & Peaucelle, D. (eds.). Elsevier, p. 2353-2358 6 p. (IFAC-PapersOnLine; vol. 50, no. 1).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    61 Downloads (Pure)
  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates

    Ghiette, V. & Dörr, C., 2022, Proceedings of the 2022 IFIP Networking Conference (IFIP Networking). IEEE, p. 1-9 9 p. 9829757. (2022 IFIP Networking Conference, IFIP Networking 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Combining ID’s, Attributes, and Policies in Hyperledger Fabric

    Gordijn, D., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 32-48 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    37 Downloads (Pure)
  • Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE, p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    22 Downloads (Pure)
  • Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems

    Karlsson, R., Bliek, L., Verwer, S. & de Weerdt, M., 2021, Artificial Intelligence and Machine Learning - 32nd Benelux Conference, BNAIC/Benelearn 2020, Revised Selected Papers. Baratchi, M., Cao, L., Kosters, W. A., Lijffijt, J., van Rijn, J. N. & Takes, F. W. (eds.). Springer, p. 48-63 16 p. (Communications in Computer and Information Science; vol. 1398 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    97 Downloads (Pure)
  • Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

    Wabeke, T., Moura, G. C. M., Franken, N. & Hesselman, C., 2020, Passive and Active Measurement : 21st International Conference, PAM 2020, Proceedings. Sperotto, A., Dainotti, A. & Stiller, B. (eds.). SpringerOpen, Vol. 12048. p. 158-174 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12048 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Crack me if you can: Hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: A Survey

    Khairallah, M., Najm, Z., Chattopadhyay, A. & Peyrin, T., 2018, Proceedings - 2018 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, SAMOS 2018. Mudge, T. & Pnevmatikatos, D. N. (eds.). Association for Computing Machinery (ACM), p. 167-172 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Cryptographically secure pseudo-random bit generator for RFID tags

    Peris-Lopez, P., San Millan, E., Van Der Lubbe, J. C. A. & Entrena, L. A., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678035

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

    Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., Palomar, E. & Van Der Lubbe, J. C. A., 2010, RFID 2010: International IEEE Conference on RFID. Piscataway, NJ: IEEE, p. 45-52 8 p. 5467258

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

    Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    100 Downloads (Pure)
  • Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs

    Korczyński, M., Wullink, M., Tajalizadehkhoob, S., Moura, G. C. M., Noroozian, A., Bagley, D. & Hesselman, C., 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 609-623 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    32 Citations (Scopus)
  • Cyber Weapons: a Profiling Framework

    Maathuis, C., Pieters, W. & van den Berg, J., 2016, Proceedings of International conference on cyber conflict: Protecting the future. IEEE

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    27 Citations (Scopus)
    161 Downloads (Pure)
  • Decentralized Private Freight Declaration & Tracking with Data Validation

    Li, T., Vos, J. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). Danvers: IEEE, p. 267-272 6 p. 9767444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    36 Downloads (Pure)
  • Decouples: A Decentralized, Unlinkable and Privacy-preserving Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2019, Proceedings of the ACM Symposium on Applied Computing: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing . New York, NY, USA: Association for Computing Machinery (ACM), Vol. F147772. p. 364-373 10 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    17 Citations (Scopus)
  • DecReg: A Framework for Preventing Double-Financing using Blockchain Technology

    Lycklama à Nijeholt, H., Erkin, Z. & Oudejans, J., 2017, BCC'17 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York: Association for Computing Machinery (ACM), p. 29-34 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • Deep Dive into the IoT Backend Ecosystem

    Saidi, S. J., Matic, S., Gasser, O., Smaragdakis, G. & Feldmann, A., 2022, Proceedings of the 22nd ACM Internet Measurement Conference. New York, NY, USA: Association for Computing Machinery (ACM), p. 488–503 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    54 Downloads (Pure)
  • Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds

    Swaminathan, S., Chmielewski, Ł., Perin, G. & Picek, S., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 165-182 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    43 Downloads (Pure)
  • Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    Băcuieți, N., Batina, L. & Picek, S., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer, p. 809-829 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

    Zhao, Z., Chen, X., Xuan, Y., Dong, Y., Wang, D. & Liang, K., 2022, Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, p. 15192-15201 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Citations (Scopus)
    26 Downloads (Pure)
  • DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

    Vos, D., Overweel, L., Raateland, W., Vos, J., Bijman, M., Pigmans, M. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-8 8 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 11).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay

    Zheng, Y., Xu, P., Wang, W., Chen, T., Susilo, W., Liang, K. & Jin, H., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 86-104 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    21 Downloads (Pure)
  • Designing a Cognitive Agent Connector for Complex Environments: A Case Study with StarCraft

    Koeman, V. J., Griffioen, H. J., Plenge, D. C. & Hindriks, K. V., 2019, Engineering Multi-Agent Systems : 6th International Workshop, EMAS 2018, Revised Selected Papers. Mascardi, V., Weyns, D. & Ricci, A. (eds.). Cham: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11375 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Detecting and categorizing Android malware with graph neural networks

    Xu, P., Eckert, C. & Zarras, A., 2021, Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery (ACM), p. 409-412 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • Digital analysis of papers for the authentication and dating of art

    Pourebrahimi, B., Van Der Lubbe, J. C. A. & Dietz, G., 2010, Proceedings of the 12th IASTED International Conference on Signal and Image Processing, SIP 2010. p. 93-100 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Digital Forgetting Using Key Decay

    Darwish, M. A. & Zarras, A., 2023, Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, SAC 2023. Association for Computing Machinery (ACM), p. 34-41 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Downloads (Pure)
  • Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns

    Griffioen, H. & Doerr, C., 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium: Proceedings. IEEE, p. 1-9 9 p. 9110444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • DNS Observatory: The big picture of the DNS

    Foremski, P., Gasser, O. & Moura, G. C. M., 21 Oct 2019, IMC'19 : Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 87-100 14 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    19 Citations (Scopus)
  • dnstracker: Measuring Centralization of DNS Infrastructure in the Wild

    Zembruzki, L., Jacobs, A. S., Landtreter, G. S., Granville, L. Z. & Moura, G. C. M., 2020, Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications, AINA 2020. Barolli, L., Amato, F., Moscato, F., Enokido, T. & Takizawa, M. (eds.). Cham: Springer, p. 871-882 12 p. (Advances in Intelligent Systems and Computing; vol. 1151 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Do Bayesian Variational Autoencoders Know What They Don't Know?

    Glazunov, M. & Zarras, A., 2022, Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022. Association For Uncertainty in Artificial Intelligence (AUAI), p. 718-727 10 p. (Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    17 Downloads (Pure)
  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • ECONoMy: Ensemble collaborative learning using masking

    Van De Kamp, L., Ugwuoke, C. & Erkin, Z., 1 Sept 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019. Institute of Electrical and Electronics Engineers (IEEE), 7 p. 8880822. (2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Efficient and secure equality tests

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 7823915

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts

    Vos, J., Vos, D. & Erkin, Z., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 408-423 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    34 Downloads (Pure)
  • Efficient Index-based Search Protocols for Encrypted Databases

    Nateghizad, M., Erkin, Z. & Lagendijk, R., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 270-281 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Efficient joint random number generation for secure multi-party computation

    Hoogerwerf, E., van Tetering, D., Bay, A. & Erkin, Z., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 436-443 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Efficient Learning of Communication Profiles from IP Flow Records

    Hammerschmidt, C., Marchal, S., State, R., Pellegrino, N. & Verwer, S., 2016, Proceedings - 2016 IEEE 41st Conference on Local Computer Networks, LCN 2016. Kellenberger, P. (ed.). Los Alamitos, CA: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    41 Downloads (Pure)
  • Efficient Training of Robust Decision Trees Against Adversarial Examples

    Vos, D. A. & Verwer, S. E., 2021, BNAIC/BeneLearn 2021: 33rd Benelux Conference on Artificial Intelligence and 30th Belgian-Dutch Conference on Machine Learning. Leiva, E. L. A., Pruski, C., Markovich, R., Najjar, A. & Schommer, C. (eds.). p. 702-703

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    45 Downloads (Pure)
  • Enabling Multi-Hop ISP-Hypergiant Collaboration

    Munteanu, C., Gasser, O., Poese, I., Smaragdakis, G. & Feldmann, A., 2023, Proceedings of the Applied Networking Research Workshop. New York, NY, USA: Association for Computing Machinery (ACM), p. 54–59 6 p. (ANRW '23).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    29 Downloads (Pure)
  • Enabling Visual Analytics via Alert-driven Attack Graphs

    Nadeem, A., Verwer, S. E., Moskal, S. & Yang, S. J., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2420-2422 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    131 Downloads (Pure)
  • Enhancing privacy of users in eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 158-165 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    61 Downloads (Pure)
  • Enhancing user privacy in federated eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 22 Dec 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security ( NTMS). Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway: IEEE, p. 1-5 5 p. 7792448

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)