Christophe Huygens
Christophe Huygens
Guest Professor of Computer Science, KULeuven
Verified email at - Homepage
Cited by
Cited by
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International …, 2014
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
A middleware platform to support river monitoring using wireless sensor networks
D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ...
Journal of the Brazilian Computer Society 17, 85-102, 2011
Looci: The loosely-coupled component infrastructure
D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ...
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
Evolutionary algorithms for classification of malware families through different network behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
A dangerous mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
J Maerien, S Michiels, D Hughes, C Huygens, W Joosen
Ad Hoc Networks 25, 141-169, 2015
Federated and shared use of sensor networks through security middleware
C Huygens, W Joosen
2009 Sixth International Conference on Information Technology: New …, 2009
Building wireless sensor network applications with LooCI
D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ...
Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012
Astar: Sustainable battery free energy harvesting for heterogeneous platforms and dynamic environments
F Yang, AS Thangarajan, GS Ramachandran, B Krishnamachari, ...
Proceedings of the 2019 International Conference on Embedded Wireless …, 2019
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks
J Maerien, S Michiels, C Huygens, W Joosen
2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010
Network dialog minimization and network dialog diffing: two novel primitives for network security applications
MZ Rafique, J Caballero, C Huygens, W Joosen
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Security Analysis of the Chinese Web: How well is it protected?
P Chen, N Nikiforakis, L Desmet, C Huygens
Proceedings of the 2014 workshop on cyber security analytics, intelligence …, 2014
A component and policy-based approach for efficient sensor network reconfiguration
N Matthys, C Huygens, D Hughes, S Michiels, W Joosen
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
An event-based component model for wireless sensor networks: A case study for river monitoring
J Ueyama, DR Hughes, N Matthys, W Horré, W Joosen, C Huygens, ...
Anais do 28o Simpósito Brasileiro de Redes de Computadores, 2010
Longitudinal study of the use of client-side security mechanisms on the european web
P Chen, L Desmet, C Huygens, W Joosen
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20