1. A novel trust taxonomy for shared cyber threat intelligence;Abdallah;Sec. Commun. Netw.,2018
2. Aciiçmez, O., Yet another Microarchitectural Attack: Exploiting I-Cache. In Proceedings of the 2007 ACM workshop on Computer security architecture. ACM, Fairfax, Virginia, USA .11-18. (2007). doi: 10.1145/1314466.1314469.
3. Adve, V., Criswell, J., Dautenhahn, N., Practical timing side channel attacks against kernel space ASLR. In 2013 IEEE Symposium on Security and Privacy. IEEE, Berkeley, CA, USA. 191-205.(2013).DOI: http://doi.ieeecomputersociety.org/10.1109/SP.2013.23.
4. Adve, V., Criswell, J., Dautenhahn, N., Last-Level Cache Side-Channel Attacks are Practical. In Proceedings of 2015 IEEE Symposium on Security and Privacy.IEEE, San Jose, CA, USA . 605-622. (2015). doi: 10.1109/SP.2015.43.
5. Breaking RSA generically is equivalent to factoring;Aggarwal;IEEE Trans. Inform. Theory,2016