Filter your results
- 2
- 1
- 2
- 1
- 3
- 1
- 1
- 1
- 3
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.160-172, ⟨10.1007/978-3-662-43862-6_19⟩
Conference papers
hal-01401302v1
|
||
|
Management and Security in the Age of HyperconnectivitySpringer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books
hal-01632740v1
|
||
|
Protocol-Independent Detection of Dictionary Attacks19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.304-309, ⟨10.1007/978-3-642-40552-5_30⟩
Conference papers
hal-01497030v1
|