default search action
Carlo Harpes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j3]Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin:
A training-resistant anomaly detection system. Comput. Secur. 76: 1-11 (2018) - 2017
- [j2]Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin:
Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Comput. Secur. 64: 59-68 (2017) - 2016
- [c8]Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann:
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. CRITIS 2016: 163-175 - [c7]Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. GraMSec@CSF 2016: 80-93 - [c6]Steve Muller, Carlo Harpes, Cédric Muller:
Fast and Optimal Countermeasure Selection for Attack Defence Trees. RISK 2016: 53-65 - 2013
- [c5]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [i1]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - 2012
- [j1]Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci, Paolo Capodieci:
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 5(2): 86-97 (2012) - 2010
- [c4]Paolo Capodieci, Stefano Diblasi, Ester Ciancamerla, Michele Minichino, Chiara Foglietta, Davide Lefevre, Gabriele Oliva, Stefano Panzieri, Roberto Setola, Stefano De Porcellinis, Francesco Delli Priscoli, Marco Castrucci, Vincenzo Suraci, Leonid Lev, Yosi Shneck, Djamel Khadraoui, Jocelyn Aubert, Serguei Iassinovski, Jianmin Jiang, Paulo Simões, Filipe Caldeira, Agnieszka Spronska, Carlo Harpes, Matthieu Aubigny:
Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System. COMPENG 2010: 88-90 - [c3]Matthieu Aubigny, Carlo Harpes, Marco Castrucci:
Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures. CRITIS 2010: 157-160
1990 – 1999
- 1997
- [c2]Carlo Harpes, James L. Massey:
Partitioning Cryptanalysis. FSE 1997: 13-27 - 1996
- [b1]Carlo Harpes:
Cryptanalysis of iterated block ciphers. ETH Zurich, Zürich, Switzerland, Hartung-Gorre 1996, ISBN 978-3-89649-079-7, pp. 1-196 - 1995
- [c1]Carlo Harpes, Gerhard Kramer, James L. Massey:
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. EUROCRYPT 1995: 24-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint