Filter
Chapter

Search results

  • 2022

    Artificial Intelligence for the Design of Symmetric Cryptographic Primitives

    Mariot, L., Jakobovic, D., Bäck, T. & Hernandez-Castro, J. C., 2022, Security and Artificial Intelligence. Batina, L., Back, T. & Picek, S. (eds.). Cham: Springer Science+Business Media, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    1 Citation (Scopus)
  • Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis

    Perin, G., Wu, L. & Picek, S., 2022, Advances in Information Security. Stamp, M. (ed.). Springer Nature, p. 217-241 25 p. (Advances in Information Security; vol. 54).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

    Open Access
    File
    3 Downloads (Pure)
  • Intelligent Malware Defenses

    Nadeem, A., Rimmer, V., Wouter, J. & Verwer, S. E., 2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Science+Business Media, p. 217-253 37 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
    54 Downloads (Pure)
  • Open-World Network Intrusion Detection

    Rimmer, V., Nadeem, A., Verwer, S., Preuveneers, D. & Joosen, W., 2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, p. 254-283 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • 2021

    Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families

    Nadeem, A., Hammerschmidt, C. A., Hernandez Ganan, C. & Verwer, S. E., 2021, Malware Analysis using Artificial Intelligence and Deep Learning. Shalaginov, A., Stamp, M. & Alazab, M. (eds.). Cham: Springer Science+Business Media, p. 381-409 29 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
    175 Downloads (Pure)
  • 2020

    Preface Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security

    Chen, L., Li, N., Liang, K. & Schneider, S., 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Cham, Vol. 12309 LNCS. p. v-vi (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  • 2019

    Crime and Online Anonymous Markets

    Hartel, P. & van Wegberg, R., 2019, International and Transnational Crime and Justice . Natarajan, M. (ed.). Cambridge University Press, p. 67-72 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    1 Citation (Scopus)
    11 Downloads (Pure)
  • 2018

    A Scale-out Blockchain for Value Transfer with Spontaneous Sharding

    Ren, Z., Cong, K., Aerts, T. V., de Jonge, B. A. P., Morais, A. F. & Erkin, Z., 2018, Proceedings - 2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018. Los Alamitos, CA: IEEE , p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    13 Citations (Scopus)
  • Computer science

    Hartel, P. & Junger, M., 2018, Routledge Handbook of Crime Science. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1st ed. Routledge - Taylor & Francis Group, p. 179-189 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

    Open Access
    File
    193 Downloads (Pure)
  • Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms

    Ersoy, O., Ren, Z., Erkin, Z. & Lagendijk, R. L., 2018, Proceedings - 2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018. Los Alamitos, CA: IEEE , p. 20-30 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    31 Citations (Scopus)