Filter
Conference contribution

Search results

  • On the Energy Benefit of Compute-and-forward for Multiple Unicasts

    Ren, Z., Goseling, J., Weber, J. & Gastpar, M., 2016, Proceedings ISIT 2016: 2016 IEEE International Symposium on Information Theory. Piscataway, NJ: IEEE, p. 2334-2338 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    42 Downloads (Pure)
  • On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection

    Koffas, S. & Vadnala, P. K., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • On the design of S-box constructions with genetic programming

    Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On Reverse Engineering Neural Network Implementation on GPU

    Chmielewski, Ł. & Weissbart, L., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 96-113 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • One trace is all it takes: machine learning-based side-channel attack on EDDSA

    Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • One property to rule them all? On the limits of trade-offs for S-boxes

    Djurasevic, M., Jakobovic, D. & Picek, S., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 1064-1072 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    50 Downloads (Pure)
  • On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

    Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE, p. 552-555 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast

    Moura, G. C. M., Heidemann, J., Hardaker, W., Charnsethikul, P., Bulten, J., Ceron, J. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 264-292 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    28 Downloads (Pure)
  • No-hop: In-network Distributed Hash Tables

    Hügerich, L., Shukla, A. & Smaragdakis, G., 2021, ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems. Association for Computing Machinery (ACM), p. 80-87 8 p. (ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • No domain left behind: Is Let's Encrypt democratizing encryption?

    Aertsen, M., Korczyński, M., Moura, G. C. M., Tajalizadehkhoob, S. & Van Den Berg, J., 2017, ANRW 2017 - Proceedings of the Applied Networking Research Workshop, Part of IETF-99 Meeting. Association for Computing Machinery (ACM), p. 48-57 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    26 Citations (Scopus)
    62 Downloads (Pure)
  • No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

    Chen, H., Fu, S. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Part 1 ed. Cham: Springer, p. 387-407 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    15 Downloads (Pure)
  • Mutation testing of smart contracts at scale

    Hartel, P. & Schumi, R., 2020, Tests and Proofs - 14th International Conference, TAP 2020, held as part of STAF 2020, Proceedings. Ahrendt, W. & Wehrheim, H. (eds.). SpringerOpen, p. 23-42 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12165 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    11 Citations (Scopus)
  • MUSCLE: Authenticated External Data Retrieval from Multiple Sources for Smart Contracts

    van der Laan, B., Ersoy, O. & Erkin, Z., 2019, Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC '19. Hung, C-C. & Papadopoulos, G. A. (eds.). New York, NY: Association for Computing Machinery (ACM), Vol. F147772. p. 382-391 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Multi-party private set intersection protocols for practical applications

    Bay, A., Erkin, Z., Alishahi, M. & Vos, J., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 515-522 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    123 Downloads (Pure)
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Wang, R., Koffas, S., Liang, K. & Picek, S., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 684–698 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    43 Downloads (Pure)
  • Modeling Strong Physically Unclonable Functions with Metaheuristics

    Coello, C. C., Krcek, M., Durasevic, M., Mariot, L., Jakobovic, D. & Picek, S., 2023, GECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 719-722 4 p. (GECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • Mining Sequential Patterns from Outsourced Data via Encryption Switching

    Tillem, G., Erkin, Z. & Lagendijk, R. L., 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Piscataway, NJ: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Mining encrypted software logs using alpha algorithm

    Tillem, G., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, Vol. 4. p. 267-274 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    62 Downloads (Pure)
  • Measuring Web Cookies in Governmental Websites

    Gotze, M., Matic, S., Iordanou, C., Smaragdakis, G. & Laoutaris, N., 2022, WebSci 2022 - Proceedings of the 14th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 44-54 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    77 Downloads (Pure)
  • Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions

    Li, H., Mentens, N. & Picek, S., 2023, Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE). Piscataway: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware

    Pletinckx, S., Trap, C. & Doerr, C., 28 May 2018, 2018 IEEE Conference on Communications and Network Security (CNS). Piscataway, NJ: IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    29 Citations (Scopus)
  • Longitudinal Analysis of Inter-City Network Delays

    Ozcan, S., Livadariu, I., Smaragdakis, G. & Griwodz, C., 2023, Proceedings of the 2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Downloads (Pure)
  • LogoMotive: Detecting Logos on Websites to Identify Online Scams - A TLD Case Study

    van den Hout, T., Wabeke, T., Moura, G. C. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 3-29 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    12 Downloads (Pure)
  • Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Wang, X., Cao, Z., Liu, Z. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 105-125 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    15 Downloads (Pure)
  • Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

    Perin, G., Buhan, I. & Picek, S., 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer, p. 53-81 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

    Cao, C., Blaise, A., Verwer, S. & Rebecchi, F., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 9 p. 117. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    68 Downloads (Pure)
  • Learning state machines from data streams: A generic strategy and an improved heuristic

    Baumgartner, R. & Verwer, S. E., 2023, Proceedings of Machine Learning Research. Coste, F. C., Ouardi, F. & Rabusseau, G. (eds.). Vol. 217. 25 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    36 Downloads (Pure)
  • Learning optimal classification trees using a binary linear program formulation

    Verwer, S. & Zhang, Y., 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence . Palo ALto: Association for the Advancement of Artificial Intelligence (AAAI), Vol. 33. p. 1625-1632 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Downloads (Pure)
  • Learning fuzzy decision trees using integer programming

    Rhuggenaath, J. S., Zhang, Y., Akcay, A., Kaymak, U. & Verwer, S., 1 Feb 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). Piscataway: IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE, p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Learning Deterministic Finite Automata from Innite Alphabets

    Pellegrino, N., Hammerschmidt, C., Verwer, S. & Lin, Q., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 69-72 5 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization

    Verwer, S. & Zhang, Y., 2017, Integration of AI and OR Techniques in Constraint Programming: CPAIOR 2017. Salvagnin, D. & Lombardi, M. (eds.). Cham: Springer, p. 94-103 10 p. (Lecture Notes in Computer Science; vol. 10335).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    39 Citations (Scopus)
    368 Downloads (Pure)
  • Learning Complex Uncertain States Changes via Asymmetric Hidden Markov Models: An Industrial Case

    Bueno, M. L. P., Hommersom, A., Lucas, P. J. F., Verwer, S. & Linard, A., 2016, Proceedings of the Eighth International Conference on Probabilistic Graphical Models : The JMLR Workshop and Conference PGM 2016. Antonucci, A., Corani, G. & de Campos, C. P. (eds.). JMLR, Vol. 52. p. 50-61 12 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning behavioral fingerprints from Netflows using Timed Automata

    Pellegrino, N., Lin, Q., Hammerschmidt, C. & Verwer, S., 24 Jul 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Chemouil, P., Monteiro, E., Charalambides, M., Madeira, E., Simoes, P., Secci, S., Gaspary, L. P. & dos Santos, C. R. P. (eds.). IEEE, p. 308-316 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Learning Algorithms for Digital Reconstruction of Van Gogh’s Drawings

    Zeng, Y., Tang, J., van der Lubbe, J. & Loog, M., 2016, EuroMed 2016 - 6th International Conference - Proceedings: Digital Heritage - Progress in Cultural Heritage: Documentation, Preservation, and Protection. Ioannides, M., Vink, E., Moropoulou, A., Hagedorn-Saupe, M., Fresa, A., Liestøl, G., Rajcic, V. & Grussenmeyer, P. (eds.). Cham: Springer, Vol. 1. p. 322-333 12 p. (Lecture Notes in Computer Science; vol. 10058).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Latin Hypercubes and Cellular Automata

    Gadouleau, M. & Mariot, L., 2020, Cellular Automata and Discrete Complex Systems : 26th IFIP WG 1.5 International Workshop, AUTOMATA 2020, Proceedings. Zenil, H. (ed.). Cham: Springer, p. 139-151 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12286 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems

    Luchs, M. & Doerr, C., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Polychronakis, M. & Meier, M. (eds.). Cham: Springer, p. 141-160 20 p. (Lecture Notes in Computer Science; vol. 10327).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Large scale outage visibility on the control plane

    Becker, L., Hohlfeld, O. & Smaragdakis, G., 2021, CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery (ACM), p. 13-14 2 p. (CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    45 Downloads (Pure)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, CCS'19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 449-464 16 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • Intercept and Inject: DNS Response Manipulation in the Wild

    Nosyk, Y., Lone, Q., Zhauniarovich, Y., Gañán, C. H., Aben, E., Moura, G. C. M., Tajalizadehkhoob, S., Duda, A. & Korczyński, M., 2023, Passive and Active Measurement - 24th International Conference, PAM 2023, Proceedings. Brunstrom, A., Flores, M. & Fiore, M. (eds.). Springer, p. 461-478 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13882 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    614 Downloads (Pure)
  • Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    158 Downloads (Pure)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1627-1644 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    37 Citations (Scopus)
    321 Downloads (Pure)
  • Improving the Resiliency of Decentralized Crowdsourced Blockchain Oracles

    Blanco, A. F., Shi, Z., Roy, D. & Zhao, Z., 2023, Computational Science – ICCS 2023 - 23rd International Conference, Proceedings. Mikyška, J., de Mulatier, C., Krzhizhanovskaya, V. V., Sloot, P. M. A., Paszynski, M. & Dongarra, J. J. (eds.). Springer, p. 3-17 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14073 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Improved Wordpcfg for Passwords with Maximum Probability Segmentation

    Li, W., Yang, J., Cheng, H., Wang, P. & Liang, K., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Illuminating Router Vendor Diversity Within Providers and Along Network Paths

    Albakour, T., Gasser, O., Beverly, R. & Smaragdakis, G., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 89-103 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Downloads (Pure)