Christophe Huygens
Christophe Huygens
Guest Professor of Computer Science, KULeuven
Verified email at - Homepage
Cited by
Cited by
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
IFIP International Conference on Communications and Multimedia Security, 63-72, 2014
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd {USENIX} Security Symposium ({USENIX} Security 13), 479-498, 2013
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
Looci: The loosely-coupled component infrastructure
D Hughes, K Thoelen, J Maerien, N Matthys, W Horre, J Del Cid, ...
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
A middleware platform to support river monitoring using wireless sensor networks
D Hughes, J Ueyama, E Mendiondo, N Matthys, W Horré, S Michiels, ...
Journal of the Brazilian Computer Society 17 (2), 85-102, 2011
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
Evolutionary algorithms for classification of malware families through different network behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
A dangerous mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security, 354-363, 2015
Chemically identical but physically different: A comparison of spray drying, hot melt extrusion and cryo-milling for the formulation of high drug loaded amorphous solid …
S Dedroog, C Huygens, G Van den Mooter
European Journal of Pharmaceutics and Biopharmaceutics 135, 1-12, 2019
Federated and shared use of sensor networks through security middleware
C Huygens, W Joosen
2009 Sixth International Conference on Information Technology: New …, 2009
Building wireless sensor network applications with LooCI
D Hughes, K Thoelen, W Horré, N Matthys, J Del Cid, S Michiels, ...
Advancing the Next-Generation of Mobile Computing: Emerging Technologies, 61-85, 2012
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
J Maerien, S Michiels, D Hughes, C Huygens, W Joosen
Ad Hoc Networks 25, 141-169, 2015
Solid-state analysis of amorphous solid dispersions: Why DSC and XRPD may not be regarded as stand-alone techniques
S Dedroog, T Pas, B Vergauwen, C Huygens, G Van den Mooter
Journal of pharmaceutical and biomedical analysis 178, 112937, 2020
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks
J Maerien, S Michiels, C Huygens, W Joosen
2010 IEEE 6th International Conference on Wireless and Mobile Computing …, 2010
Security Analysis of the Chinese Web: How well is it protected?
P Chen, N Nikiforakis, L Desmet, C Huygens
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
An event-based component model for wireless sensor networks: A case study for river monitoring
J Ueyama, DR Hughes, N Matthys, W Horré, W Joosen, C Huygens, ...
Proceedings of the 28th Brazilian Symposium on Computer Networks and …, 2010
Fine-grained tailoring of component behaviour for embedded systems
N Matthys, D Hughes, S Michiels, C Huygens, W Joosen
IFIP International Workshop on Software Technolgies for Embedded and …, 2009
Network dialog minimization and network dialog diffing: two novel primitives for network security applications
MZ Rafique, J Caballero, C Huygens, W Joosen
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20