Filter your results
- 6
- 6
- 6
- 6
- 6
- 6
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
End-to-End Delay Performance for VoIP on LTE System in Access Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers
hal-01480171v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
A Proposal on Security Case Based on Common Criteria1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers
hal-01480190v1
|
||
|
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers
hal-01480185v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
Architecture of Network Environment for High-Risk Security Experimentation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers
hal-01480206v1
|