1. 2019
  2. A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018. Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway, NJ, USA: Institute of Electrical and Electronics Engineers Inc., 6 p. 8630769

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Cellular automata based S-boxes

    Mariot, L., Picek, S., Leporati, A. & Jakobovic, D., 2019, In : Cryptography and Communications. 11, 1, p. 41-62 22 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming - 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Lourenço, N., Hu, T., Richter, H., Sekanina, L. & García-Sánchez, P. (eds.). Springer Verlag, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Learning optimal classification trees using a binary linear program formulation

    Verwer, S. & Zhang, Y., 2019, (Accepted/In press) 33rd AAAI Conference on Artificial Intelligence. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. Lightweight Ciphers and their Side-channel Resilience

    Heuser, A., Picek, S., Guilley, S. & Mentens, N., 2019, (Accepted/In press) In : IEEE Transactions on Computers. PP, 99, p. 1-16 16 p.

    Research output: Contribution to journalArticleScientificpeer-review

  7. MOHA: A Multi-Mode Hybrid Automaton Model for Learning Car-Following Behaviors

    Lin, Q., Zhang, Y., Verwer, S. & Wang, J., 2019, In : IEEE Transactions on Intelligent Transportation Systems. 20, 2, p. 790-796 7 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

    Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. & Roppelt, J. C., 2019, (Accepted/In press) In : Telematics and Informatics. p. 1-15 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  9. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

    Barth, S., Hartel, P., Junger, M. & Montoya, L., 2019, In : IEEE Security & Privacy Magazine: building confidence in a networked world. 17, 3, p. 8-16 9 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. 2018
  11. Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware

    Pletinckx, S., Trap, C. & Doerr, C., 28 May 2018, 2018 IEEE Conference on Communications and Network Security (CNS). Piscataway, NJ: IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. Security Vulnerabilities in LoRaWAN

    Yang, X., Karampatzakis, E., Doerr, C. & Kuipers, F., 19 Apr 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 3 4 5 6 7 8 ...12 Next

ID: 20504