Export 106 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is F [Clear All Filters]
"Detecting changes at the sensor level in cyber-physical systems: Methodology and technological implementation",
2017 International Joint Conference on Neural Networks (IJCNN), May, 2017.
"Development cost and size estimation starting from high-level specifications",
CODES '01: Proceedings of the ninth international symposium on Hardware/software codesign, Copenhagen, Denmark, ACM Press, New York, USA, pp. 86-91, 2001.
"Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes",
e-Business and Telecommunications, vol. 222, Berlin Heidelberg, Springer, pp. 243-258, 2012.
"Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes",
e-Business and Telecommunications, vol. 222, Berlin Heidelberg, Springer, pp. 243-258, 2012.
"Efficient C implementation of the ECC and AES cryptographic systems",
Technology Leadership Day - organized by the MicroSwiss Network, Fribourg, October 10, 2001.
"Efficient Software Implementation of AES on 32-Bit Platforms",
CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, London, UK, Springer-Verlag, pp. 159–171, 2003.
"Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis",
IEEE Design & Test, 2018, In Press.
"Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis",
IEEE Design & Test, 2018, In Press.
"Enabling Self-adaptivity in Component-based Streaming Applications",
ACM SIGBED Review - Special Issue on the 2nd International Workshop on Adaptive and Reconfigurable Embedded Systems, vol. 6, no. {3}: ACM SIGBED, pp. 14:1-14:4, 10/2009.
"Evaluating the Impact of Environmental Factors on Physically Unclonable Functions",
International Symposium on Field-Programmable Gate Arrays FPGA 2016, Monterey, CA, USA, ACM New York, NY, USA, pp. 279, 02/2016.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Fault-Tolerant Network Interfaces for Networks-on-Chip",
IEEE Trans. Dependable Secur. Comput., vol. 11, issue 1, pp. 16–29, 01/2014.
"A Framework for Security and Workload Gradual Adaptation",
SECRYPT, Seville, Spain, ICETE, 07/2011.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features",
SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"A General Practitioner or a Specialist for Your Infected Smartphone?",
36th IEEE Symposium on Security and Privacy , San Jose, CA, USA, IEEE Computer Society Technical Committee on Security and Privacy, 05/2015.
"Gradual Adaptation of Security for Sensor Networks",
IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Montreal, Canada, June 13, 2010.
"Hardware-assisted Security Enhanced Linux in Embedded Systems: a Proposal",
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010), Scottsdale, Arizona, USA, October 24, 2010.
"Hardware-assisted Security Enhanced Linux in Embedded Systems: a Proposal",
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010), Scottsdale, Arizona, USA, October 24, 2010.
"Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags",
Springer Journal of Cryptographic Engineering, vol. 1, issue 1, 2011.