Search results

  • Conference contribution

    Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    97 Downloads (Pure)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Evolutionary Computation and Cryptology

    Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    145 Downloads (Pure)
  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    196 Downloads (Pure)
  • Exploring Semi-bent Boolean Functions Arising from Cellular Automata

    Mariot, L., Saletta, M., Leporati, A. & Manzoni, L., 2021, Cellular Automata : 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Proceedings. Gwizdałła, T. M., Manzoni, L., Sirakoulis, G. C., Bandini, S. & Podlaski, K. (eds.). Cham: Springer, p. 56-66 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12599 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Extras and Premiums: Local PCN Routing with Redundancy and Fees

    Shen, Y., Ersoy, O. & Roos, S., 2024, Financial Cryptography and Data Security - 27th International Conference, FC 2023, Revised Selected Papers. Baldimtsi, F. & Cachin, C. (eds.). Springer, p. 110-127 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13951).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    57 Downloads (Pure)
  • Falcon: Malware Detection and Categorization with Network Traffic Images

    Xu, P., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning : ICANN 2021 - 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Part 1 ed. Cham: Springer, Vol. 12891. p. 117-128 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12891 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Federated Synthetic Data Generation with Stronger Security Guarantees

    Ghavamipour, A. R., Turkmen, F., Wang, R. & Liang, K., 2023, SACMAT 2023 - Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 31-42 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    61 Downloads (Pure)
  • Fifteen Months in the Life of a Honeyfarm

    Munteanu, C., Saidi, S. J., Gasser, O., Smaragdakis, G. & Feldmann, A., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 282-296 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    22 Downloads (Pure)
  • Fingerprinting of Cellular Infrastructure Based on Broadcast Information

    Bhattacharjee, A. K., Cecconello, S., Kuipers, F. & Smaragdakis, G., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer, p. 81-101 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14345 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Fingerprinting tooling used for SSH compromisation attempts

    Ghiëtte, V., Griffioen, H. & Doerr, C., 2019, RAID 2019 Proceedings : 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 61-71 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    52 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    32 Downloads (Pure)
  • FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

    Li, H., Rieger, P., Zeitouni, S., Picek, S. & Sadeghi, A. R., 2023, Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL). O’Conner, L. (ed.). Piscataway: IEEE, p. 271-276 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Downloads (Pure)
  • flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE, p. 638-642 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    22 Citations (Scopus)
  • Flexible State-Merging for learning (P)DFAs in Python

    Hammerschmidt, C., Loos, B., State, R., Engel, T. & Verwer, S., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 154-159 6 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    74 Downloads (Pure)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    23 Downloads (Pure)
  • From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges

    Oosthoek, K. & Doerr, C., 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, p. 1-9 9 p. 9169412

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol

    Ersoy, O., Moreno-Sanchez, P. & Roos, S., 2024, Financial Cryptography and Data Security - 27th International Conference, FC 2023, Revised Selected Papers. Baldimtsi, F. & Cachin, C. (eds.). Springer, p. 92-109 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13951).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

    Agiollo, A., Bardhi, E., Conti, M., Lazzeretti, R., Losiouk, E. & Omicini, A., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 615-630 16 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    11 Downloads (Pure)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    32 Downloads (Pure)
  • Graph Encryption for Shortest Path Queries with k Unsorted Nodes

    Li, M., Gao, J., Zhang, Z., Fu, C., Lal, C. & Conti, M., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 89-96 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    36 Downloads (Pure)
  • HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

    Xu, P., Zhang, Y., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 : 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Cham: Springer, Vol. 12893. p. 127-138 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12893 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • HeadPrint: Detecting anomalous communications through header-based application fingerprinting

    Bortolameotti, R., Van Ede, T., Continella, A., Hupperich, T., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 2020, SAC 2020: Proceedings of the 35th Annual ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    53 Downloads (Pure)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata

    Mariot, L., 2021, 2021 Ninth International Symposium on Computing and Networking (CANDAR): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 29-37 9 p. 9643876

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    75 Downloads (Pure)
  • How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date

    Ghiette, V. & Doerr, C., 2018, WTMC'18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity. New York, NY: Association for Computing Machinery (ACM), p. 8-13 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • How to Operate a Meta-Telescope in your Spare Time

    Wagner, D., Ranadive, S. A., Griffioen, H., Kallitsis, M., Dainotti, A., Smaragdakis, G. & Feldmann, A., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 328-343 16 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    150 Downloads (Pure)
  • How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. Bonneau, J. & Heninger, N. (eds.). Cham: Springer, Vol. 12059. p. 284-303 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    15 Citations (Scopus)
    135 Downloads (Pure)
  • Hybrid connection and host clustering for community detection in spatial-temporal network data

    Roeling, M. P., Nadeem, A. & Verwer, S. E., 2020, ECML PKDD 2020 Workshops - Workshops of the European Conference on Machine Learning and Knowledge Discovery in Databases ECML PKDD 2020: SoGood 2020, PDFL 2020, MLCS 2020, NFMCP 2020, DINA 2020, EDML 2020, XKDD 2020 and INRA 2020, Proceedings. Koprinska, I., Appice, A., Antonie, L., Guidotti, R., Ribeiro, R. P., Gama, J., Krishnamurthy, Y., Malerba, D., Ceci, M., Masciari, E., Christen, P., Schubert, E., Monreale, M., Rinzivillo, S., Lommatzsch, A., Kamp, M., Loglisci, C., Zimmermann, A., Özgöbek, Ö., Gavaldà, R., Adilova, L., Ferreira, P. M., Medeiros, I., Manco, G., Ras, Z. W., Ntoutsi, E., Zimek, A., Biecek, P., Kille, B. & Gulla, J. A. (eds.). Vol. 1323. p. 178-204 27 p. (Communications in Computer and Information Science; vol. 1323).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    120 Downloads (Pure)
  • Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

    Norouzian, M. R., Xu, P., Eckert, C. & Zarras, A., 2021, Information Security - 24th International Conference, ISC 2021, Proceedings. Liu, J. K., Katsikas, S., Meng, W., Susilo, W. & Intan, R. (eds.). Springer, p. 259-278 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13118 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract

    Grishkov, I., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 3-18 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Illuminating Router Vendor Diversity Within Providers and Along Network Paths

    Albakour, T., Gasser, O., Beverly, R. & Smaragdakis, G., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 89-103 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Downloads (Pure)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Improved Wordpcfg for Passwords with Maximum Probability Segmentation

    Li, W., Yang, J., Cheng, H., Wang, P. & Liang, K., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Improving the Resiliency of Decentralized Crowdsourced Blockchain Oracles

    Blanco, A. F., Shi, Z., Roy, D. & Zhao, Z., 2023, Computational Science – ICCS 2023 - 23rd International Conference, Proceedings. Mikyška, J., de Mulatier, C., Krzhizhanovskaya, V. V., Sloot, P. M. A., Paszynski, M. & Dongarra, J. J. (eds.). Springer, p. 3-17 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14073 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1627-1644 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    37 Citations (Scopus)
    318 Downloads (Pure)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    153 Downloads (Pure)