Filter
Conference contribution

Search results

  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    525 Downloads (Pure)
  • Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    261 Downloads (Pure)
  • Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    71 Downloads (Pure)
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 12727. p. 79-98 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12727 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    1058 Downloads (Pure)
  • Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain

    Hendriks, R. C., Erkin, Z. & Gerkmann, T., 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 7005-7009 5 p. 6639020. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    60 Downloads (Pure)
  • Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE, p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    25 Downloads (Pure)
  • Pushing Alias Resolution to the Limit

    Albakour, T., Gasser, O. & Smaragdakis, G., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 584–590 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    23 Downloads (Pure)
  • Quality Evaluation of Cyber Threat Intelligence Feeds

    Griffioen, H., Booij, T. & Doerr, C., 2020, Applied Cryptography and Network Security. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Part II ed. Cham: Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12147 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    23 Citations (Scopus)
  • Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

    Blenn, N., Ghiëtte, V. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 21

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    28 Citations (Scopus)
  • Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

    Herrera Semenets, V., Hernández-León, R., Bustio-Martínez, L. & van den Berg, J., 2022, Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II. Pichardo Laguna, O., Martínez-Miranda, J. & Martínez Seis, B. (eds.). Springer, p. 316-327 12 p. (Lecture Notes in Computer Science; no. 13613).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    16 Downloads (Pure)
  • Reinforcement Learning-Based Design of Side-Channel Countermeasures

    Rijsdijk, J., Wu, L. & Perin, G., 2022, Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Proceedings. Batina, L., Picek, S., Picek, S. & Mondal, M. (eds.). 1 ed. Cham: Springer, p. 168-187 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13162 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    39 Downloads (Pure)
  • Reliable Machine Learning for Networking: Key Issues and Approaches

    Hammerschmidt, C. A., Garcia, S., Verwer, S. & State, R., 2017, 2017 IEEE 42nd conference on Local Computer Networks, LCN 2017. IEEE, p. 167-170 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Remote Identification of Port Scan Toolchains

    Ghiëtte, V., Blenn, N. & Doerr, C., 2016, IFIP International Conference on New Technologies, Mobility and Security. Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway, NJ: IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    332 Downloads (Pure)
  • Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Li, M., Zhang, M., Gao, J., Lal, C., Conti, M. & Alazab, M., 2022, Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings. Alcaraz, C., Chen, L., Li, S. & Samarati, P. (eds.). Springer, p. 261-280 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13407 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    68 Downloads (Pure)
  • ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility

    Yildiz, B., Hung, H., Krijthe, J. H., Liem, C. C. S., Loog, M., Migut, G., Oliehoek, F. A., Panichella, A., Pawełczak, P., Picek, S., de Weerdt, M. & van Gemert, J., 2021, Reproducible Research in Pattern Recognition - 3rd International Workshop, RRPR 2021, Revised Selected Papers. Kerautret, B., Colom, M., Krähenbühl, A., Lopresti, D., Monasse, P. & Talbot, H. (eds.). Springer, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12636 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    84 Downloads (Pure)
  • Rethinking the Trigger-injecting Position in Graph Backdoor Attack

    Xu, J., Abad, G. & Picek, S., 2023, Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN). Piscataway: IEEE, p. 1-8 8 p. (Proceedings of the International Joint Conference on Neural Networks; vol. 2023-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • SAGE: Intrusion Alert-driven Attack Graph Extractor

    Nadeem, A., Verwer, S. E. & Yang, S. J., 2021, 18th IEEE Symposium on Visualization for Cyber Security. IEEE, p. 36-41 6 p. 9629418

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    10 Downloads (Pure)
  • Scaling website fingerprinting

    Ghiette, V. & Doerr, C., 2020, 2020 IFIP Networking Conference (Networking): Proceedings. IEEE, p. 199-207 9 p. 9142795

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

    Griffioen, H., Oosthoek, K., van der Knaap, P. & Doerr, C., 2021, CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 940-954 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    116 Downloads (Pure)
  • Scan Prediction and Reconnaissance Mitigation through Commodity Graphics Cards

    Doerr, C., El Maouchi, M., Kamoen, S. & Moree, J., 2016, IEEE Conference on Communications and Network Security. IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting

    Nadeem, A. & Verwer, S., 2023, Machine Learning and Knowledge Discovery in Databases.: European Conference, ECML PKDD 2022, Proceedings. Amini, M-R., Canu, S., Fischer, A., Guns, T., Kralj Novak, P. & Tsoumakas, G. (eds.). Part 1 ed. Cham: Springer, p. 157-173 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13713 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    14 Downloads (Pure)
  • Secure Equality Testing Protocols in the Two-Party Setting

    Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Secure Fixed-point Division for Homomorphically Encrypted Operands

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York: Association for Computer Machinery, p. 1-10 10 p. 33

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Citations (Scopus)
  • Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE, p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Secure public-auditing cloud storage enabling data dynamics in the standard model

    Ma, M., Weber, J. & Van Den Berg, J., 2016, Proceedings - 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, DIPDMWC 2016. Piscataway, NJ: IEEE, p. 170-175 6 p. 7529384

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Securing Federated Sensitive Topic Classification against Poisoning Attacks

    Chu, T., Garcia-Recuero, A., Iordanou, C., Smaragdakis, G. & Laoutaris, N., 2023, Securing Federated Sensitive Topic Classification against Poisoning Attacks. 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • Security Vulnerabilities in LoRaWAN

    Yang, X., Karampatzakis, E., Doerr, C. & Kuipers, F., 19 Apr 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    100 Citations (Scopus)
    2044 Downloads (Pure)
  • SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer

    Karakoç, F., Nateghizad, M. & Erkin, Z., 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019: Proceedings of the 14th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), p. 1-9 9 p. 3339264. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Seven years in the life of Hypergiants' off-nets

    Gigis, P., Calder, M., Manassakis, L., Nomikos, G., Kotronis, V., Dimitropoulos, X., Katz-Bassett, E. & Smaragdakis, G., 2021, SIGCOMM 2021 : Proceedings of the ACM SIGCOMM 2021 Conference. New York: Association for Computing Machinery (ACM), p. 516-533 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Citations (Scopus)
    124 Downloads (Pure)
  • Side-Channel Based Intrusion Detection for Industrial Control Systems

    Van Aubel, P., Papagiannopoulos, K., Chmielewski, Ł. & Doerr, C., 2018, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. D'Agostino, G. & Scala, A. (eds.). Cham: Springer, p. 207-224 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10707 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Simple Systematic Pearson Coding

    Weber, J., Swart, T. & Schouhamer Immink, KA., 2016, Proceedings ISIT 2016: 2016 IEEE International Symposium on Information Theory. IEEE, p. 385-389 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    38 Downloads (Pure)
  • Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages

    Bardi, S., Conti, M., Pajola, L. & Tricomi, P. P., 2023, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. Tibouchi, M. & Wang, X. (eds.). Springer, p. 309-336 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13905 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    22 Downloads (Pure)
  • SoK: ATT&CK techniques and trends in windows malware

    Oosthoek, K. & Doerr, C., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 406-425 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    25 Citations (Scopus)
  • SoK: On DFA Vulnerabilities of Substitution-Permutation Networks

    Khairallah, M., Hou, X., Najm, Z., Breier, J., Bhasin, S. & Peyrin, T., 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 403-414 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • SoK: Explainable Machine Learning for Computer Security Applications

    Nadeem, A., Vos, D., Cao, C., Pajola, L., Dieck, S., Baumgartner, R. & Verwer, S., 2023, Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). O’Conner, L. (ed.). Piscataway: IEEE, p. 221-240 20 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    23 Downloads (Pure)
  • SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

    Apruzzese, G., Conti, M. & Yuan, Y., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 171-185 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    82 Downloads (Pure)
  • TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems

    Lin, Q., Adepu, S., Verwer, S. & Mathur, A., 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 525-536 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    114 Citations (Scopus)
  • TaleBox: A mobile game for mixed-initiative story creation

    Castaño Pérez, O., Kybartas, B. & Bidarra, R., 2016, Proceedings of DiGRA-FDG 2016: First Joint International Conference of DiGRA and FDG. p. 1-2 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

    File
    40 Downloads (Pure)
  • Taxonomy and adversarial strategies of random subdomain attacks

    Griffioen, H. & Doerr, C., 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop: Proceedings. Piscataway: IEEE, p. 1-5 5 p. 8763820. (2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • The curious case of port 0

    Luchs, M. & Doerr, C., 1 May 2019, 2019 IFIP Networking Conference, IFIP Networking 2019. IEEE, p. 1-9 9 p. 8816853. (2019 IFIP Networking Conference, IFIP Networking 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

    Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • The More You Know: Improving Laser Fault Injection with Prior Knowledge

    Krcek, M., Ordas, T., Fronte, D. & Picek, S., 2022, Proceedings of the 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC). Trinh, L. (ed.). Piscataway: IEEE, p. 18-29 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    13 Downloads (Pure)
  • The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit Search

    Verwer, S. E., Nadeem, A., Hammerschmidt, C. A., Bliek, L., Al-Dujaili, A. & O’Reilly, U-M., 2020, Workshop on artificial intelligence and security. New York: Association for Computing Machinery (ACM), p. 61-70 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Citations (Scopus)
    196 Downloads (Pure)
  • Third time's not a charm: Exploiting SNMPv3 for router fingerprinting

    Albakour, T., Gasser, O., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 150-164 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    89 Downloads (Pure)