Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
hal_authIdPerson_i : 993479
Image document

Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices

Vasily Desnitsky , Igor Kotenko
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers hal-01403995v1
Image document

Security Assessment of Computer Networks Based on Attack Graphs and Security Events

Igor Kotenko , Elena Doynikova
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.462-471, ⟨10.1007/978-3-642-55032-4_47⟩
Conference papers hal-01397255v1
Image document

Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services

Evgenia Novikova , Igor Kotenko
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.63-78, ⟨10.1007/978-3-319-10975-6_5⟩
Conference papers hal-01403986v1