Export 106 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is F [Clear All Filters]
"Towards a Reliability-aware Design Flow for Kahn Process Networks on NoC-based Multiprocessors",
10th Workshop on Dependability and Fault Tolerance (ARCS/VERFE'14), Lübeck, Germany, Springer, 2014.
"Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?",
1st Interdisciplinary Cyber Research Workshop 2015, Tallin, Estona, Tallinn University of Technology, 07/2015.
"Challenges in designing trustworthy cryptographic co-processors",
IEEE International Symposium on Circuits and Systems (ISCAS) 2015, Lisbon, Portugal, IEEE, pp. 2009-2012, 09/2015.
"Design methodologies for securing cyber-physical systems",
2015 International Conference on Hardware/Software Codesign and System Synthesis CODES+ISSS, Amsterdam, Netherlands, IEEE, pp. 30-36, 10/2015.
"A General Practitioner or a Specialist for Your Infected Smartphone?",
36th IEEE Symposium on Security and Privacy , San Jose, CA, USA, IEEE Computer Society Technical Committee on Security and Privacy, 05/2015.
"Security Challenges for Hardware Designers of Mobile Systems",
2015 Mobile Systems Technologies Workshop (MST), May, 2015.
"Adaptable AES implementation with power-gating support",
International Conference on Computing Frontiers CF'16, Como, Italy, ACM Ney York, NY, USA, pp. 331-334, 05/2016.
"A Cloud to the Ground: The New Frontier of Intelligent and Autonomous Networks of Things",
IEEE Communication Magazine, vol. 54, issue 12, pp. 14 - 20, 11/2016.
"Evaluating the Impact of Environmental Factors on Physically Unclonable Functions",
International Symposium on Field-Programmable Gate Arrays FPGA 2016, Monterey, CA, USA, ACM New York, NY, USA, pp. 279, 02/2016.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features",
SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"MalAware: Effective and Efficient Run-time Mobile Malware Detector",
The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, IEEE Computer Society Press, 08/2016.
"Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features",
2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 08/2016.
"Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers",
24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products", Nuremberg, Germany, EICAR, 10/2016.
"What Does the Memory Say? Towards the most indicative features for efficient malware detection",
CCNC 2016, The 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, NV, USA, IEEE Communication Society, 01/2016.
"Cross-layer Design of Reconfigurable Cyber-Physical Systems",
Proceedings of Design, Automation and Test in Europe (DATE) 2017, 2017.
"Detecting changes at the sensor level in cyber-physical systems: Methodology and technological implementation",
2017 International Joint Conference on Neural Networks (IJCNN), May, 2017.
"Runtime Classification of Mobile Malware for Resource-constrained Devices",
Lecture Notes in Communications in Computer and Information Science, vol. 764: Springer International Publishing AG, pp. 195-215, 2017.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Panel IoT and pervasive computing: are new definitions of security and privacy needed?",
Malicious Software and Hardware in Internet of Things Co-located with ACM International Conference on Computing Frontiers 2018, Ischia, Naples, Italy, 05/2018.