Filter your results
- 3
- 1
- 3
- 1
- 4
- 4
- 1
- 2
- 1
- 1
- 5
- 4
- 5
- 4
- 1
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
Anycast and Its Potential for DDoS Mitigation10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.147-151, ⟨10.1007/978-3-319-39814-3_16⟩
Conference papers
hal-01632736v1
|
||
|
Management and Security in the Age of HyperconnectivitySpringer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books
hal-01632740v1
|