Filter your results
- 5
- 5
- 5
- 2
- 1
- 1
- 1
- 5
- 1
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Making Flow-Based Security Detection Parallel11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.3-15, ⟨10.1007/978-3-319-60774-0_1⟩
Conference papers
hal-01806062v1
|
||
|
Hunting SIP Authentication Attacks Efficiently11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.125-130, ⟨10.1007/978-3-319-60774-0_9⟩
Conference papers
hal-01806064v1
|
||
|
Network Anomaly Detection: Comparison and Real-Time Issues6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.118-121, ⟨10.1007/978-3-642-30633-4_15⟩
Conference papers
hal-01529795v1
|
||
|
Analysis of Vertical Scans Discovered by Naive Detection10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.165-169, ⟨10.1007/978-3-319-39814-3_19⟩
Conference papers
hal-01632742v1
|
||
|
Using Application-Aware Flow Monitoring for SIP Fraud Detection9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.87-99, ⟨10.1007/978-3-319-20034-7_10⟩
Conference papers
hal-01410154v1
|