Follow
Christophe Huygens
Christophe Huygens
Guest Professor of Computer Science, KULeuven
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International …, 2014
4862014
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
3092013
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
1222009
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
932016
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
802008
Solid-state analysis of amorphous solid dispersions: Why DSC and XRPD may not be regarded as stand-alone techniques
S Dedroog, T Pas, B Vergauwen, C Huygens, G Van den Mooter
Journal of Pharmaceutical and Biomedical Analysis 178, 112937, 2020
772020
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
762016
Chemically identical but physically different: A comparison of spray drying, hot melt extrusion and cryo-milling for the formulation of high drug loaded amorphous solid …
S Dedroog, C Huygens, G Van den Mooter
European Journal of Pharmaceutics and Biopharmaceutics 135, 1-12, 2019
662019
A middleware platform to support river monitoring using wireless sensor networks
D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ...
Journal of the Brazilian Computer Society 17, 85-102, 2011
642011
Looci: The loosely-coupled component infrastructure
D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ...
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
622012
Evolutionary algorithms for classification of malware families through different network behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
612014
A dangerous mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
402015
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
J Maerien, S Michiels, D Hughes, C Huygens, W Joosen
Ad Hoc Networks 25, 141-169, 2015
262015
Federated and shared use of sensor networks through security middleware
C Huygens, W Joosen
2009 Sixth International Conference on Information Technology: New …, 2009
252009
Building wireless sensor network applications with LooCI
D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ...
Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012
212012
Astar: Sustainable battery free energy harvesting for heterogeneous platforms and dynamic environments
F Yang, AS Thangarajan, GS Ramachandran, B Krishnamachari, ...
Proceedings of the 2019 International Conference on Embedded Wireless …, 2019
202019
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks
J Maerien, S Michiels, C Huygens, W Joosen
2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010
192010
Network dialog minimization and network dialog diffing: two novel primitives for network security applications
MZ Rafique, J Caballero, C Huygens, W Joosen
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
182014
Security Analysis of the Chinese Web: How well is it protected?
P Chen, N Nikiforakis, L Desmet, C Huygens
Proceedings of the 2014 workshop on cyber security analytics, intelligence …, 2014
182014
A component and policy-based approach for efficient sensor network reconfiguration
N Matthys, C Huygens, D Hughes, S Michiels, W Joosen
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
162012
The system can't perform the operation now. Try again later.
Articles 1–20