Filter your results
- 12
- 10
- 12
- 10
- 22
- 3
- 1
- 1
- 2
- 2
- 3
- 1
- 4
- 4
- 2
- 2
- 22
- 1
- 1
- 1
- 1
- 1
- 10
- 8
- 8
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers
hal-01768504v1
|
||
|
Towards Fully Automated Digital Alibis with Social Interaction10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers
hal-01393786v1
|
||
|
Availability, Reliability, and Security in Information SystemsSpringer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books
hal-01635010v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books
hal-02520036v1
|
||
|
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers
hal-01056386v1
|
||
|
Using Model Driven Security Approaches in Web Application Development2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers
hal-01397248v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books
hal-02060052v1
|
||
|
Availability, Reliability, and Security in Information SystemsStephanie Teufel; Tjoa A Min; IlsunYou; EdgarWeippl. Springer, LNCS-8708, 2014, Lecture Notes in Computer Science, 978-3-319-10974-9. ⟨10.1007/978-3-319-10975-6⟩
Books
hal-01404011v1
|
||
|
Availability, Reliability, and Security in Information Systems and HCISpringer, LNCS-8127, 2013, Lecture Notes in Computer Science, 978-3-642-40510-5. ⟨10.1007/978-3-642-40511-2⟩
Books
hal-01506805v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-10410, 2017, Lecture Notes in Computer Science, 978-3-319-66807-9. ⟨10.1007/978-3-319-66808-6⟩
Books
hal-01677131v1
|
||
|
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.1-8, ⟨10.1007/978-3-319-99740-7_1⟩
Conference papers
hal-02060058v1
|
||
|
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers
hal-01633686v1
|
||
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books
hal-03414737v1
|
|||
|
Multidisciplinary Research and Practice for Information SystemsSpringer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books
hal-01542459v1
|
||
|
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge BasesInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.251-266, ⟨10.1007/978-3-319-45507-5_17⟩
Conference papers
hal-01635002v1
|
||
|
Tor HTTP Usage and Information Leakage11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.245-255, ⟨10.1007/978-3-642-13241-4_22⟩
Conference papers
hal-01056375v1
|
||
|
Data Visualization for Social Network Forensics8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.115-126, ⟨10.1007/978-3-642-33962-2_8⟩
Conference papers
hal-01523701v1
|
||
|
Information and Communication TechnologySpringer, LNCS-7804, 2013, Lecture Notes in Computer Science, 978-3-642-36817-2. ⟨10.1007/978-3-642-36818-9⟩
Books
hal-01480217v1
|
||
|
Security Engineering and Intelligence InformaticsSpringer, LNCS-8128, 2013, Lecture Notes in Computer Science, 978-3-642-40587-7. ⟨10.1007/978-3-642-40588-4⟩
Books
hal-01506809v1
|
||
|
Quantifying Windows File Slack Size and Stability9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.183-193, ⟨10.1007/978-3-642-41148-9_13⟩
Conference papers
hal-01460605v1
|
||
|
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.179-194, ⟨10.1007/978-3-319-24123-4_11⟩
Conference papers
hal-01449058v1
|
||
|
Automated Analysis of Underground Marketplaces10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.31-42, ⟨10.1007/978-3-662-44952-3_3⟩
Conference papers
hal-01393757v1
|