Seguir
Christophe Huygens
Christophe Huygens
Guest Professor of Computer Science, KULeuven
Dirección de correo verificada de cs.kuleuven.be - Página principal
Título
Citado por
Citado por
Año
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International …, 2014
4882014
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
3102013
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
1222009
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
932016
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
802008
Solid-state analysis of amorphous solid dispersions: Why DSC and XRPD may not be regarded as stand-alone techniques
S Dedroog, T Pas, B Vergauwen, C Huygens, G Van den Mooter
Journal of Pharmaceutical and Biomedical Analysis 178, 112937, 2020
792020
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
762016
Chemically identical but physically different: A comparison of spray drying, hot melt extrusion and cryo-milling for the formulation of high drug loaded amorphous solid …
S Dedroog, C Huygens, G Van den Mooter
European Journal of Pharmaceutics and Biopharmaceutics 135, 1-12, 2019
662019
A middleware platform to support river monitoring using wireless sensor networks
D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ...
Journal of the Brazilian Computer Society 17, 85-102, 2011
642011
Looci: The loosely-coupled component infrastructure
D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ...
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
622012
Evolutionary algorithms for classification of malware families through different network behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
612014
A dangerous mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
402015
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
J Maerien, S Michiels, D Hughes, C Huygens, W Joosen
Ad Hoc Networks 25, 141-169, 2015
262015
Federated and shared use of sensor networks through security middleware
C Huygens, W Joosen
2009 Sixth International Conference on Information Technology: New …, 2009
252009
Building wireless sensor network applications with LooCI
D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ...
Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012
212012
Astar: Sustainable battery free energy harvesting for heterogeneous platforms and dynamic environments
F Yang, AS Thangarajan, GS Ramachandran, B Krishnamachari, ...
Proceedings of the 2019 International Conference on Embedded Wireless …, 2019
202019
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks
J Maerien, S Michiels, C Huygens, W Joosen
2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010
192010
Network dialog minimization and network dialog diffing: two novel primitives for network security applications
MZ Rafique, J Caballero, C Huygens, W Joosen
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
182014
Security Analysis of the Chinese Web: How well is it protected?
P Chen, N Nikiforakis, L Desmet, C Huygens
Proceedings of the 2014 workshop on cyber security analytics, intelligence …, 2014
182014
A component and policy-based approach for efficient sensor network reconfiguration
N Matthys, C Huygens, D Hughes, S Michiels, W Joosen
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
162012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20