1. 2017
  2. Published

    A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. / Meng, Weizhi; Li, Wenjuan; Xiang, Yang; Choo, Kim Kwang Raymond.

    In: Journal of Network and Computer Applications, Vol. 78, 2017, p. 162-169.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  3. Published

    A brief comparison of Simon and Simeck. / Kölbl, Stefan; Roy, Arnab.

    In: Lecture Notes in Computer Science, Vol. 10098, 2017, p. 69-88.

    Publication: Research - peer-reviewConference article – Annual report year: 2017

  4. Published

    A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. / Meng, Weizhi; Li, Wenjuan ; Lee, Wang; Jiang, Lijun; Zhou, Jianying.

    Applied Cryptography and Network Security. Vol. 10355 Springer, 2017. p. 145-162 (Lecture Notes in Computer Science, Vol. 10355).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  5. Published

    A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. / Wang, Yu; Xie, Lin; Li, Wenjuan; Meng, Weizhi; Li, Jin.

    Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings. Vol. 10581 1. ed. Springer, 2017. p. 267-279 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  6. Published

    Architecturally Significant Requirements Identification, Classification and Change Management for Multi-tenant Cloud-Based Systems. / Chauhan, Muhammad Aufeef; Probst, Christian W.

    Requirements Engineering for Service and Cloud Computing. Springer, 2017. p. 181-205 (Requirements Engineering for Service and Cloud Computing).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2017

  7. Submitted

    Authentication for E-Government in Developing Countries - With special focus on the North Africa Countries. / Elaswad, Othoman; Jensen, Christian D. (Main supervisor).

    DTU Compute, 2017. 130 p. (DTU Compute PHD-2017, Vol. 455).

    Publication: ResearchPh.D. thesis – Annual report year: 2017

  8. Published

    Cache timing attacks on recent microarchitectures. / Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang.

    Proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust. IEEE, 2017. p. 155-155 (2017 Ieee International Symposium on Hardware Oriented Security and Trust (host)).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  9. Published

    Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. / Meng, Weizhi; Li, Wenjuan; Wang, Yu; Au, Man.

    Cyberspace Safety and Security. 2017. p. 163-175 (Cyberspace Safety and Security, Vol. 10581).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2017

  10. Accepted/In press

    Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. / Li, Wenjuan ; Meng, Weizhi; Kwok, Lam-For ; IP, Horace H.S.

    In: Cluster Computing - The Journal of Networks Software Tools and Applications, 2017, p. 1-12.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  11. Published

    Efficient configurations for block ciphers with unified ENC/DEC paths. / Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco .

    Proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust. IEEE, 2017. p. 41-46 (2017 Ieee International Symposium on Hardware Oriented Security and Trust (host)).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

Previous 1 2 3 4 5 6 7 8 9 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word