A study on advanced persistent threats P Chen, L Desmet, C Huygens Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International …, 2014 | 488 | 2014 |
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ... 22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013 | 310 | 2013 |
LooCI: a loosely-coupled component infrastructure for networked embedded systems D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ... Proceedings of the 7th International Conference on Advances in Mobile …, 2009 | 122 | 2009 |
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware P Chen, C Huygens, L Desmet, W Joosen ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 93 | 2016 |
Solid-state analysis of amorphous solid dispersions: Why DSC and XRPD may not be regarded as stand-alone techniques S Dedroog, T Pas, B Vergauwen, C Huygens, G Van den Mooter Journal of Pharmaceutical and Biomedical Analysis 178, 112937, 2020 | 80 | 2020 |
Using security patterns to combine security metrics T Heyman, R Scandariato, C Huygens, W Joosen 2008 Third International Conference on Availability, Reliability and …, 2008 | 80 | 2008 |
It's free for a reason: Exploring the ecosystem of free live streaming services MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016 | 76 | 2016 |
Chemically identical but physically different: A comparison of spray drying, hot melt extrusion and cryo-milling for the formulation of high drug loaded amorphous solid … S Dedroog, C Huygens, G Van den Mooter European Journal of Pharmaceutics and Biopharmaceutics 135, 1-12, 2019 | 66 | 2019 |
A middleware platform to support river monitoring using wireless sensor networks D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ... Journal of the Brazilian Computer Society 17, 85-102, 2011 | 64 | 2011 |
Looci: The loosely-coupled component infrastructure D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ... 2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012 | 62 | 2012 |
Evolutionary algorithms for classification of malware families through different network behaviors MZ Rafique, P Chen, C Huygens, W Joosen Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014 | 61 | 2014 |
A dangerous mix: Large-scale analysis of mixed-content websites P Chen, N Nikiforakis, C Huygens, L Desmet Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015 | 40 | 2015 |
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks J Maerien, S Michiels, D Hughes, C Huygens, W Joosen Ad Hoc Networks 25, 141-169, 2015 | 26 | 2015 |
Federated and shared use of sensor networks through security middleware C Huygens, W Joosen 2009 Sixth International Conference on Information Technology: New …, 2009 | 25 | 2009 |
Building wireless sensor network applications with LooCI D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ... Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012 | 21 | 2012 |
Astar: Sustainable battery free energy harvesting for heterogeneous platforms and dynamic environments F Yang, AS Thangarajan, GS Ramachandran, B Krishnamachari, ... Proceedings of the 2019 International Conference on Embedded Wireless …, 2019 | 20 | 2019 |
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks J Maerien, S Michiels, C Huygens, W Joosen 2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010 | 19 | 2010 |
Network dialog minimization and network dialog diffing: two novel primitives for network security applications MZ Rafique, J Caballero, C Huygens, W Joosen Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 18 | 2014 |
Security Analysis of the Chinese Web: How well is it protected? P Chen, N Nikiforakis, L Desmet, C Huygens Proceedings of the 2014 workshop on cyber security analytics, intelligence …, 2014 | 18 | 2014 |
A component and policy-based approach for efficient sensor network reconfiguration N Matthys, C Huygens, D Hughes, S Michiels, W Joosen 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 16 | 2012 |