Loading…
Loading…
Deep learning for side-channel analysis and introduction to ASCAD database
Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi, Cagli, Eleonora, Dumas, Cécile
Published in Journal of cryptographic engineering (01.06.2020)
Published in Journal of cryptographic engineering (01.06.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Effects and solutions of Cover-Source Mismatch in image steganalysis
Giboulot, Quentin, Cogranne, Rémi, Borghys, Dirk, Bas, Patrick
Published in Signal processing. Image communication (01.08.2020)
Published in Signal processing. Image communication (01.08.2020)
Get full text
Journal Article
Loading…
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
Kiennert, Christophe, Ismail, Ziad, Debar, Herve, Leneutre, Jean
Published in ACM computing surveys (22.08.2018)
Published in ACM computing surveys (22.08.2018)
Get full text
Journal Article
Loading…
Analysis, prevention, and feasibility assessment of stealthy ageing attacks on dynamical systems
Escudero, Cédric, Massioni, Paolo, Zamaï, Eric, Raison, Bertrand
Published in IET control theory & applications (01.03.2022)
Published in IET control theory & applications (01.03.2022)
Get full text
Journal Article
Loading…
Digitally Assisted Mixed-Signal Circuit Security
Leonhard, Julian, Limaye, Nimisha, Turk, Shadi, Sayed, Alhassan, Rizo, Alan Rodrigo Diaz, Aboushady, Hassan, Sinanoglu, Ozgur, Stratigopoulos, Haralampos-G.
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.08.2022)
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.08.2022)
Get full text
Journal Article
Loading…
Loading…
Password-Based Authenticated Key Exchange in the Three-Party Setting
Abdalla, Michel, Fouque, Pierre-Alain, Pointcheval, David
Published in Lecture notes in computer science (2005)
Published in Lecture notes in computer science (2005)
Get full text
Book Chapter
Conference Proceeding
Loading…
RADS-Checker: Measuring Compliance with Right of Access by the Data Subject in Android Markets
Li, Zhenhua, Liang, Zhanpeng, Yao, Congcong, Hua, Jingyu, Zhong, Sheng
Year of Publication 16.10.2024
Year of Publication 16.10.2024
Get full text
Journal Article
Loading…
Evaluating Large Language Models' Capability to Launch Fully Automated Spear Phishing Campaigns: Validated on Human Subjects
Heiding, Fred, Lermen, Simon, Kao, Andrew, Schneier, Bruce, Vishwanath, Arun
Year of Publication 30.11.2024
Year of Publication 30.11.2024
Get full text
Journal Article
Loading…
Loading…
An advanced GRASP-HGA combination to solve a multi-period Pickup and Delivery Problem
Al Chami, Zaher, Manier, Hervé, Manier, Marie-Ange, Chebib, Elias
Published in Expert systems with applications (01.09.2018)
Published in Expert systems with applications (01.09.2018)
Get full text
Journal Article
Loading…
Loading…
Loading…