Christophe Huygens
Christophe Huygens
Guest Professor of Computer Science, KULeuven
Verified email at cs.kuleuven.be - Homepage
TitleCited byYear
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
IFIP International Conference on Communications and Multimedia Security, 63-72, 2014
1822014
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
1782013
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
1082009
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
642008
Looci: The loosely-coupled component infrastructure
D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ...
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
522012
A middleware platform to support river monitoring using wireless sensor networks
D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ...
Journal of the Brazilian Computer Society 17 (2), 85-102, 2011
452011
Evolutionary algorithms for classification of malware families through different network behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
362014
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
arXiv preprint arXiv:1806.01156, 2018
352018
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
292016
A Dangerous Mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security, 354-363, 2015
282015
Federated and shared use of sensor networks through security middleware
C Huygens, W Joosen
2009 Sixth International Conference on Information Technology: New …, 2009
282009
Building wireless sensor network applications with LooCI
D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ...
Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012
252012
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
J Maerien, S Michiels, D Hughes, C Huygens, W Joosen
Ad Hoc Networks 25, 141-169, 2015
202015
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
192016
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks
J Maerien, S Michiels, C Huygens, W Joosen
2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010
192010
Fine-grained tailoring of component behaviour for embedded systems
N Matthys, D Hughes, S Michiels, C Huygens, W Joosen
IFIP International Workshop on Software Technolgies for Embedded and …, 2009
162009
Security Analysis of the Chinese Web: How well is it protected?
P Chen, N Nikiforakis, L Desmet, C Huygens
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
152014
Energy aware software evolution for wireless sensor networks
D Hughes, E Canete, W Daniels, RG Sankar, J Meneghello, N Matthys, ...
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
142013
Applying a multi-paradigm approach to implementing wireless sensor network based river monitoring
J Ueyama, D Hughes, KL Man, SU Guan, N Matthys, W Horré, S Michiels, ...
2010 First ACIS International Symposium on Cryptography, and Network …, 2010
142010
An event-based component model for wireless sensor networks: A case study for river monitoring
J Ueyama, DR Hughes, N Matthys, W Horré, W Joosen, C Huygens, ...
Proceedings of the 28th Brazilian Symposium on Computer Networks and …, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20