Filter your results
- 5
- 5
- 5
- 4
- 3
- 2
- 5
- 2
- 1
- 5
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
New Steganographic Techniques for the OOXML File Format1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.344-358, ⟨10.1007/978-3-642-23300-5_27⟩
Conference papers
hal-01590389v1
|
||
|
Automated Construction of a False Digital Alibi1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.359-373, ⟨10.1007/978-3-642-23300-5_28⟩
Conference papers
hal-01590408v1
|
||
|
Analyzing the Internet Stability in Presence of Disasters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.253-268
Conference papers
hal-01506694v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|