Filter your results
- 3
- 2
- 1
- 3
- 3
- 3
- 2
- 1
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
A Study of RPL DODAG Version Attacks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers
hal-01090993v1
|
||
|
Outsourcing Mobile Security in the Cloud8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers
hal-01092239v1
|
||
|
Model-based Testing from Input Output Symbolic Transition Systems Enriched by Program Calls and ContractsTesting Software and Systems , 9447), pp.35-51, 2014, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-25945-1_3⟩
Book sections
hal-01470156v1
|