Filter
Conference contribution

Search results

  • 2018

    BAdASS: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, Provable Security: 12th International Conference, ProvSec 2018 - Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Cham: Springer, p. 397-405 9 p. (Lecture Notes in Computer Science; vol. 11192).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Crack me if you can: Hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: A Survey

    Khairallah, M., Najm, Z., Chattopadhyay, A. & Peyrin, T., 2018, Proceedings - 2018 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, SAMOS 2018. Mudge, T. & Pnevmatikatos, D. N. (eds.). Association for Computing Machinery (ACM), p. 167-172 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Cybercrime after the sunrise: A statistical analysis of DNS abuse in new gTLDs

    Korczyński, M., Wullink, M., Tajalizadehkhoob, S., Moura, G. C. M., Noroozian, A., Bagley, D. & Hesselman, C., 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 609-623 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

    Vos, D., Overweel, L., Raateland, W., Vos, J., Bijman, M., Pigmans, M. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-8 8 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 11).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • Efficient Index-based Search Protocols for Encrypted Databases

    Nateghizad, M., Erkin, Z. & Lagendijk, R., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 270-281 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE , p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE , p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date

    Ghiette, V. & Doerr, C., 2018, WTMC'18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity. New York, NY: Association for Computing Machinery (ACM), p. 8-13 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Learning fuzzy decision trees using integer programming

    Rhuggenaath, J. S., Zhang, Y., Akcay, A., Kaymak, U. & Verwer, S., 1 Feb 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). Piscataway: IEEE , p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware

    Pletinckx, S., Trap, C. & Doerr, C., 28 May 2018, 2018 IEEE Conference on Communications and Network Security (CNS). Piscataway, NJ: IEEE , p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    23 Citations (Scopus)
  • Mining Sequential Patterns from Outsourced Data via Encryption Switching

    Tillem, G., Erkin, Z. & Lagendijk, R. L., 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Piscataway, NJ: IEEE , p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

    Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE , p. 552-555 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • On the Performance of Convolutional Neural Networks for Side-Channel Analysis

    Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    66 Citations (Scopus)
  • Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Secure Equality Testing Protocols in the Two-Party Setting

    Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Secure Fixed-point Division for Homomorphically Encrypted Operands

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York: Association for Computer Machinery, p. 1-10 10 p. 33

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Security Vulnerabilities in LoRaWAN

    Yang, X., Karampatzakis, E., Doerr, C. & Kuipers, F., 19 Apr 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE , 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    88 Citations (Scopus)
    2002 Downloads (Pure)
  • Side-Channel Based Intrusion Detection for Industrial Control Systems

    Van Aubel, P., Papagiannopoulos, K., Chmielewski, Ł. & Doerr, C., 2018, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. D'Agostino, G. & Scala, A. (eds.). Cham: Springer, p. 207-224 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10707 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems

    Lin, Q., Adepu, S., Verwer, S. & Mathur, A., 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 525-536 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    103 Citations (Scopus)
  • The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

    Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • TRADE: A Transparent, Decentralized Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-6 6 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 4).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • Tutorials at PPSN 2018

    Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Vulnerability Detection on Mobile Applications Using State Machine Inference

    van der Lee, W. & Verwer, S., 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2018. Los Alamitos, CA: IEEE , p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    140 Downloads (Pure)
  • 2017

    A decentralised energy trading architecture for future smart grid load balancing

    Hijgenaar, S., Erkin, Z., Keviczky, T., Siemons, J., Bisschops, R. & Verbraeck, A., 2017, Proceedings 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). Piscataway, NJ, USA: IEEE , p. 77-82

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    129 Downloads (Pure)
  • An Experience Report on Applying Passive Learning in a Large-Scale Payment Company

    Wieman, R., Finavaro Aniche, M., Lobbezoo, W., Verwer, S. & van Deursen, A., 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Los Alamitos, CA: IEEE , p. 564-573 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    270 Downloads (Pure)
  • Applying Bayesian game theory to analyse cyber risks of bank transaction systems

    Van Der Veeken, P., Van Schooten, S., Shinde, R., Dunnewind, M. & Van Den Berg, J., 2017, Proceedings of International Conference on Computing, Analytics and Security Trends, CAST 2016. IEEE , p. 84-89 6 p. 7914945

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

    Bierens, R., Klievink, B. & van den Berg, J., 2017, Proceedings of International Conference on Electronic Government 2017. Springer, p. 166-176 (Lecture Notes in Computer Science; vol. 10428).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    246 Downloads (Pure)
  • Automatic Feature Construction for Network Intrusion Detection

    Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Car-following Behavior Model Learning Using Timed Automata

    Zhang, Y., Lin, Q., Wang, J. & Verwer, S., Jul 2017, IFAC-PapersOnLine. Dochain, D., Henrion, D. & Peaucelle, D. (eds.). Elsevier, p. 2353-2358 6 p. (IFAC-PapersOnLine; vol. 50, no. 1).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    55 Downloads (Pure)
  • DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    24 Citations (Scopus)
    156 Downloads (Pure)
  • DecReg: A Framework for Preventing Double-Financing using Blockchain Technology

    Lycklama à Nijeholt, H., Erkin, Z. & Oudejans, J., 2017, BCC'17 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York: Association for Computing Machinery (ACM), p. 29-34 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • Efficient and secure equality tests

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 7823915

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Evolutionary Computation and Cryptology

    Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE , p. 638-642 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    17 Citations (Scopus)
  • How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    71 Downloads (Pure)
  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems

    Luchs, M. & Doerr, C., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Polychronakis, M. & Meier, M. (eds.). Cham: Springer, p. 141-160 20 p. (Lecture Notes in Computer Science; vol. 10327).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Learning behavioral fingerprints from Netflows using Timed Automata

    Pellegrino, N., Lin, Q., Hammerschmidt, C. & Verwer, S., 24 Jul 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Chemouil, P., Monteiro, E., Charalambides, M., Madeira, E., Simoes, P., Secci, S., Gaspary, L. P. & dos Santos, C. R. P. (eds.). IEEE , p. 308-316 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization

    Verwer, S. & Zhang, Y., 2017, Integration of AI and OR Techniques in Constraint Programming: CPAIOR 2017. Salvagnin, D. & Lombardi, M. (eds.). Cham: Springer, p. 94-103 10 p. (Lecture Notes in Computer Science; vol. 10335).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    34 Citations (Scopus)
    353 Downloads (Pure)
  • Mining encrypted software logs using alpha algorithm

    Tillem, G., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, Vol. 4. p. 267-274 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    59 Downloads (Pure)
  • No domain left behind: Is Let's Encrypt democratizing encryption?

    Aertsen, M., Korczyński, M., Moura, G. C. M., Tajalizadehkhoob, S. & Van Den Berg, J., 2017, ANRW 2017 - Proceedings of the Applied Networking Research Workshop, Part of IETF-99 Meeting. Association for Computing Machinery (ACM), p. 48-57 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    22 Citations (Scopus)
    55 Downloads (Pure)
  • Popularity-Based Detection of Domain Generation Algorithms

    Abbink, J. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-8 8 p. 79

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    64 Downloads (Pure)
  • Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    59 Downloads (Pure)
  • Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE , p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

    Blenn, N., Ghiëtte, V. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 21

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    28 Citations (Scopus)