1. Anurag Agarwal Jaspinder Kaur and Shirshendu Das. 2021. Exploiting secrets by leveraging dynamic cache partitioning of last level cache. In 2021 Design Automation & Test in Europe Conference & Exhibition (DATE) . IEEE 1691–1696.
2. Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic side-channel attacks on additive manufacturing systems. In 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS). 1–10. 10.1109/ICCPS.2016.7479068
3. Z. Allaf, M. Adda, and A. Gegov. 2018. ConfMVM: A hardware-assisted model to confine malicious VMs. In UKSim-AMSS 20th International Conference on Computer Modelling and Simulation. 49–54.
4. Z. Allaf, M. Adda, and A. Gegov. 2019. Malicious loop detection using support vector machine. In International Symposium on INnovations in Intelligent SysTems and Applications. 1–6.
5. Mohammad-Mahdi Bazm, Thibaut Sautereau, Marc Lacoste, Mario Sudholt, and Jean-Marc Menaud. 2018. Cache-based side-channel attacks detection through Intel cache monitoring technology and hardware performance counters. In 3rd International Conference on Fog and Mobile Edge Computing. 7–12.