Filter your results
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 1
- 1
- 1
|
|
sorted by
|
|
Expert Knowledge Based Design and Verification of Secure Systems with Embedded DevicesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers
hal-01403995v1
|
||
|
Security Assessment of Computer Networks Based on Attack Graphs and Security Events2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.462-471, ⟨10.1007/978-3-642-55032-4_47⟩
Conference papers
hal-01397255v1
|
||
|
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer ServicesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.63-78, ⟨10.1007/978-3-319-10975-6_5⟩
Conference papers
hal-01403986v1
|