The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for danger with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1990 (15) 1991-1996 (17) 1997-1998 (22) 1999-2000 (19) 2001 (22) 2002 (16) 2003 (29) 2004 (47) 2005 (51) 2006 (51) 2007 (73) 2008 (73) 2009 (56) 2010 (38) 2011 (32) 2012 (49) 2013 (42) 2014 (52) 2015 (49) 2016 (31) 2017 (21) 2018 (41) 2019 (33) 2020 (48) 2021 (53) 2022 (48) 2023 (35) 2024 (14)
Publication types (Num. hits)
article(358) book(1) incollection(10) inproceedings(700) phdthesis(4) proceedings(4)
Venues (Conferences, Journals, ...)
CoRR(52) IACR Cryptol. ePrint Arch.(31) ICARIS(15) DATE(14) HOST(13) DSD(11) Remote. Sens.(11) COSADE(9) FDTC(9) ICRA(8) IGARSS(8) ReConFig(8) Sensors(8) HICSS(7) J. Cryptogr. Eng.(7) SPACE(7) More (+10 of total 656)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 473 occurrences of 377 keywords

Results
Found 1083 publication records. Showing 1077 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
107Steve Cayzer, Julie Sullivan Modelling danger and anergy in artificial immune systems. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anergy, danger, modelling, AIS, immune, danger theory
62Sanjay Rawat 0001, Ashutosh Saxena Danger theory based SYN flood attack detection in autonomic network. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory
62Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang A Computer Forensics Model Based On Danger Theory. Search on Bibsonomy IITA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic computer forensics, intrusion detection, artificial immune system, danger theory
62Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed 0001, Stephen Hailes Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. Search on Bibsonomy ICARIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Interest Cache Poisoning Attack, Sensor Networks, Artificial Immune Systems, Danger Theory
58Daniela E. Popescu, Marcela F. Prada About the Buildings' Danger Control Systems Vulnerabilities. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF programmable outputs, testability, vulnerabilities, security system
58Anjum Iqbal, Mohd Aizaini Maarof Polymorphism and Danger Susceptibility of System Call DASTONs. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Qiao Liu, Egil Pedersen Direct perception of collision danger information for safe marine navigation. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
58Andrew Secker, Alex Alves Freitas, Jon Timmis A Danger Theory Inspired Approach to Web Mining. Search on Bibsonomy ICARIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Anjum Iqbal, Mohd Aizaini Maarof Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons. Search on Bibsonomy ICARIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Suwichai Phunsa, Suwich Tirakoat A case study of developing game edutainment: "addictive danger". Search on Bibsonomy DIMEA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF addictive danger, game, edutainment
48Chung-Ming Ou, Chung-Ren Ou Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Young Choon Lee, Albert Y. Zomaya Resource-centric task allocation in grids with artificial danger model support. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Nauman Mazhar, Muddassar Farooq A sense of danger: dendritic cells inspired artificial immune system for manet security. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells
48Kohyu Satoh, Song Weiguo, K. T. Yang A Study of Forest Fire Danger Prediction System in Japan. Search on Bibsonomy DEXA Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho Generic Danger Detection for Mission Continuity. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, MANETs, Mobile Ad-hoc Networks, Danger Theory, Damage Detection
41Hiroyuki Mikuri, Naoto Mukai, Toyohide Watanabe R-Tree Representations of Disaster Areas Based on Probabilistic Estimation. Search on Bibsonomy IEA/AIE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Yujia Cao, Angela Mahr, Sandro Castronovo, Mariët Theune, Christoph Stahl, Christian A. Müller Local danger warnings for drivers: the effect of modality and level of assistance on driver reaction. Search on Bibsonomy IUI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF car2car communication, multimodal intefaces, automotive
38Xue Li, Haidong Fu, Siliang Huang Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Slavisa Sarafijanovic, Jean-Yves Le Boudec An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors. Search on Bibsonomy ICARIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod Danger Theory: The Link between AIS and IDS? Search on Bibsonomy ICARIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Jorge Sampaio Silveira Junior, João Ruivo Paulo, Jérôme Mendes, Daniela Alves, Luís Mário Ribeiro, Carlos Viegas 0001 Automatic forest fire danger rating calibration: Exploring clustering techniques for regionally customizable fire danger classification. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Chao Yang, Tao Li 0017 计算机免疫危险理论中危险信号的提取方法研究 (Research of Danger Signal Extraction Based on Changes in Danger Theory). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  BibTeX  RDF
35Delphine Paquereau Gestion de procédures et prise en compte du danger lors de l'occurrence d'incidents combinés : Application à la supervision d'une ligne de métro. (Procedures management and danger consideration when combined incidents occur : Application to metro line supervision). Search on Bibsonomy 2015   RDF
35Brian Wentz, Jonathan Lazar, Michael Stein, Oluwadamilola Gbenro, Edwin Holandez, Andrew Ramsey Danger, danger! Evaluating the accessibility of Web-based emergency alert sign-ups in the northeastern United States. Search on Bibsonomy Gov. Inf. Q. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Daniele Ruscio Simulating real danger?: validation of driving simulator test and psychological factors in brake response time to danger. Search on Bibsonomy ICMI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Adel Torkaman Rahmani, B. Hoda Helmi EIN-WUM: an AIS-based algorithm for web usage mining. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF artificial immune system, web usage mining, danger theory, directed mutation
35Caixia Zhang, Zhanyi Hu A General Sufficient Condition of Four Positive Solutions of the P3P Problem. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF P3P (Perspective-3-Point) problem, danger cylinder, multiple solutions
35Julie Greensmith, Uwe Aickelin, Steve Cayzer Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly detection, artificial immune systems, Danger Theory, dendritic cells
35Miroslav Svéda Embedded system design: a case study. Search on Bibsonomy ECBS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF pumps, embedded distributed systems, dispenser control, local time concept, system-wide global clock, environment specification, system functional specification, logical structure description, petrol pumping station, explosion danger, uncontrolled petrol flow, real-time systems, formal specification, prototyping, distributed processing, controller, implementation, systems analysis, synchronisation, flow control, safety critical system, clocks, distributed control, software prototyping, safety-critical software, embedded system design, counter, control system CAD
31Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford Risking Communications Security: Potential Hazards of the Protect America Act. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Huazhong Ning, Wei Xu 0007, Yue Zhou, Yihong Gong, Thomas S. Huang Temporal difference learning to detect unsafe system states. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Michaela Kinberger, Karel Kriz, Patrick Nairz LWD-Infosystem Tirol - visual information about the current avalanche situation via mobile devices. Search on Bibsonomy Location Based Services and TeleCartography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Arnaud Clerentin, Eric Brassart, Laurent Delahoche, Bruno Marhic, Sonia Izri A Data Fusion Architecture for the Dynamic Follow-up of Vehicles. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Lin-hui Zhao, Yumin Wang, Jing Xiao, Ya-Ping Dai, Fang-yan Dong, Hai-le Liu A Three-Level-Module Adaptive Intrusion Detection System. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Katherine Hoffman, Attila Ondi, Richard Ford, Marco M. Carvalho, Derek Brown, William H. Allen, Gerald A. Marin Danger theory and collaborative filtering in MANETs. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Yujia Cao, Sandro Castronovo, Angela Mahr, Christian A. Müller On timing and modality choice with local danger warnings for drivers. Search on Bibsonomy AutomotiveUI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modality choice, timing, automotive
28Xiuying Wang, Lizhong Xiao, Zhiqing Shao A Danger-Theory-Based Abnormal Traffic Detection Model in Local Network. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Alexander Krizhanovsky, Alexander Marasanov An Approach for Adaptive Intrusion Prevention Based on The Danger. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28José Carlos L. Pinto, Fernando J. Von Zuben Fault Detection Algorithm for Telephone Systems Based on the Danger Theory. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Emma Hart, Peter Ross Improving SOSDM: Inspirations from the Danger Theory. Search on Bibsonomy ICARIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera 0001, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. Search on Bibsonomy COSADE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Pierre-Augustin Berthet, Cédric Tavernier, Jean-Luc Danger, Laurent Sauvage Quasi-linear Masking to Protect Kyber against both SCA and FIA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Roukoz Nabhan, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger, Laurent Sauvage Highlighting Two EM Fault Models While Analyzing a Digital Sensor Limitations. Search on Bibsonomy DATE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Quentin Forcioli, Jean-Luc Danger, Sumanta Chaudhuri A gem5 based Platform for Micro-Architectural Security Analysis. Search on Bibsonomy HASP@MICRO The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Arnaud Varillon, Laurent Sauvage, Jean-Luc Danger High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA. Search on Bibsonomy SPACE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger Here comes SAID: A SOME/IP Attention-based mechanism for Intrusion Detection. Search on Bibsonomy ICUFN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Roukoz Nabhan, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger, Laurent Sauvage A Tale of Two Models: Discussing the Timing and Sampling EM Fault Injection Models. Search on Bibsonomy FDTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Julien Béguinot, Wei Cheng 0003, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry Reliability of Ring Oscillator PUFs with Reduced Helper Data. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Javad Bahrami, Jean-Luc Danger, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks. Search on Bibsonomy ICICDT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Aging-Induced Failure Prognosis via Digital Sensors. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Special Session: Security Verification & Testing for SR-Latch TRNGs. Search on Bibsonomy VTS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Trevor Kroeger, Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Lars Tebelmann, Jean-Luc Danger, Michael Pehl Interleaved Challenge Loop PUF: A Highly Side-Channel Protected Oscillator-Based PUF. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Farzad Niknia, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Trevor Kroeger, Wei Cheng 0003, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. Search on Bibsonomy J. Electron. Test. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in Automotive Ethernet Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
24Roxana Dánger Differential Privacy: What is all the noise about? Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks. Search on Bibsonomy IV The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Leakage Power Analysis in Different S-Box Masking Protection Schemes. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera 0001, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. Search on Bibsonomy HOST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. Search on Bibsonomy AICCSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley Detecting faults in inner product masking scheme. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Hervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne Side channel attacks for architecture extraction of neural networks. Search on Bibsonomy CAAI Trans. Intell. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Manisha Luthra, Boris Koldehofe, Niels Danger, Pascal Weisenburger, Guido Salvaneschi, Ioannis Stavrakakis TCEP: Transitions in operator placement to adapt to dynamic network environments. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Detecting Failures and Attacks via Digital Sensors. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. Search on Bibsonomy J. Electron. Test. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Natasha Alkhatib, Hadi Ghauch, Jean-Luc Danger SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Manisha Luthra, Boris Koldehofe, Niels Danger, Pascal Weisenburger, Guido Salvaneschi, Ioannis Stavrakakis TCEP: Transitions in Operator Placement to Adapt to Dynamic Network Environments. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Ville Yli-Mäyry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger Optimizing Inner Product Masking Scheme by a Coding Theory Approach. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager Information Leakages in Code-based Masking: A Unified Quantification Approach. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager Information Leakages in Code-based Masking: A Unified Quantification Approach. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
24Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley Security evaluation against side-channel analysis at compilation time. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
24Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl Analysis and Protection of the Two-metric Helper Data Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
24Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. Search on Bibsonomy NCA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Trevor Kroeger, Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. Search on Bibsonomy DATE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Trevor Kroeger, Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. Search on Bibsonomy COSADE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl Analysis and Protection of the Two-Metric Helper Data Scheme. Search on Bibsonomy COSADE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Jean-Luc Danger RSM Protection of the PRESENT Lightweight Cipher as a RISC-V Extension. Search on Bibsonomy DSD The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Vanthanh Khuat, Jean-Max Dutertre, Jean-Luc Danger Analysis of a Laser-induced Instructions Replay Fault Model in a 32-bit Microcontroller. Search on Bibsonomy DSD The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Hervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks. Search on Bibsonomy SPACE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Hervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks. Search on Bibsonomy ACNS (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Vanthanh Khuat, Jean-Luc Danger, Jean-Max Dutertre Laser Fault Injection in a 32-bit Microcontroller: from the Flash Interface to the Execution Pipeline. Search on Bibsonomy FDTC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt Testing and Reliability Enhancement of Security Primitives. Search on Bibsonomy DFT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Alexander Schaub 0001, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Rei Ueno, Naofumi Homma, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger High Throughput/Gate AES Hardware Architectures Based on Datapath Compression. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Lars Tebelmann, Jean-Luc Danger, Michael Pehl Self-Secured PUF: Protecting the Loop PUF by Masking. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Wei Cheng 0003, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger Optimizing Inner Product Masking Scheme by A Coding Theory Approach. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Trevor Kroeger, Wei Cheng 0003, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. Search on Bibsonomy DATE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Lars Tebelmann, Jean-Luc Danger, Michael Pehl Self-secured PUF: Protecting the Loop PUF by Masking. Search on Bibsonomy COSADE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. Search on Bibsonomy COSADE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Jean-Luc Danger RISC-V Extension for Lightweight Cryptography. Search on Bibsonomy DSD The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1077 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license