Export 106 results:
Author Title Type [ Year
Filters: First Letter Of Last Name is F [Clear All Filters]
"Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis",
IEEE Design & Test, 2018, In Press.
"Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis",
IEEE Design & Test, 2018, In Press.
"Power and Performance Optimized Hardware Classifiers for Eefficient On-device Malware Detection",
Cryptography and Security in Computing Systems, Valencia, Spain, ACM, 01/2019.
"Time, Accuracy and Power Consumption Tradeoff in Mobile Malware Detection Systems",
Computers & Security, vol. 82, pp. 314-328, 05/2019.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"Panel IoT and pervasive computing: are new definitions of security and privacy needed?",
Malicious Software and Hardware in Internet of Things Co-located with ACM International Conference on Computing Frontiers 2018, Ischia, Naples, Italy, 05/2018.
"Quantum Era Challenges for Classical Computers",
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, New York, NY, USA, ACM, 2018.
"Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs",
IJCNN 2018 : International Joint Conference on Neural Networks, Rio, Brazil, IEEE, 07/2018.
"Cross-layer Design of Reconfigurable Cyber-Physical Systems",
Proceedings of Design, Automation and Test in Europe (DATE) 2017, 2017.
"Detecting changes at the sensor level in cyber-physical systems: Methodology and technological implementation",
2017 International Joint Conference on Neural Networks (IJCNN), May, 2017.
"Runtime Classification of Mobile Malware for Resource-constrained Devices",
Lecture Notes in Communications in Computer and Information Science, vol. 764: Springer International Publishing AG, pp. 195-215, 2017.
"Adaptable AES implementation with power-gating support",
International Conference on Computing Frontiers CF'16, Como, Italy, ACM Ney York, NY, USA, pp. 331-334, 05/2016.
"A Cloud to the Ground: The New Frontier of Intelligent and Autonomous Networks of Things",
IEEE Communication Magazine, vol. 54, issue 12, pp. 14 - 20, 11/2016.
"Evaluating the Impact of Environmental Factors on Physically Unclonable Functions",
International Symposium on Field-Programmable Gate Arrays FPGA 2016, Monterey, CA, USA, ACM New York, NY, USA, pp. 279, 02/2016.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features",
SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"MalAware: Effective and Efficient Run-time Mobile Malware Detector",
The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, IEEE Computer Society Press, 08/2016.
"Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features",
2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 08/2016.
"Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers",
24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products", Nuremberg, Germany, EICAR, 10/2016.
"What Does the Memory Say? Towards the most indicative features for efficient malware detection",
CCNC 2016, The 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, NV, USA, IEEE Communication Society, 01/2016.