Cybercrimes, Secure Emerging Web Environments, and Digital Forensics
Get full text
Conference Proceeding
An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense
Charitoudi, Konstantinia, Blyth, Andrew J. C.
Published in Information security journal. (04.07.2014)
Published in Information security journal. (04.07.2014)
Get full text
Journal Article
Conference Proceeding
Proposed Methodology for Cyber Criminal Profiling
Get full text
Journal Article
Conference Proceeding
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICES
DUPUIS, Sophie, DI NATALE, Giorgio, FLOTTES, Marie-Lise, ROUZEYRE, Bruno
Published in Information security journal (Print) (2013)
Get full text
Published in Information security journal (Print) (2013)
Conference Proceeding
Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICES
FEITEN, Linus, SPILLA, Andreas, SAUER, Matthias, SCHUBERT, Tobias, BECKER, Bernd
Published in Information security journal (Print) (2013)
Get full text
Published in Information security journal (Print) (2013)
Conference Proceeding
Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICES
PLATONOV, Mikhail, HLAVAC, Josef, LORENCZ, Róbert
Published in Information security journal (Print) (2013)
Get full text
Published in Information security journal (Print) (2013)
Conference Proceeding
Classification of Clickjacking Attacks and Detection Techniques
SHAHRIAR, Hossain, VAMSHEE KRISHNA DEVENDRAN
Published in Information security journal. (04.07.2014)
Published in Information security journal. (04.07.2014)
Get full text
Conference Proceeding
Journal Article