Filter your results
- 5
- 5
- 5
- 1
- 5
- 5
- 5
- 1
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.381-393, ⟨10.1007/978-3-319-19578-0_31⟩
Conference papers
hal-01789978v1
|
||
|
A Survey on Wireless Sensors Networks Security Based on a Layered Approach13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩
Conference papers
hal-01728805v1
|
||
|
Heuristics for deriving adaptive homing and distinguishing sequences for nondeterministic finite state machines27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah And Dubai, United Arab Emirates. pp.243-248, ⟨10.1007/978-3-319-25945-1_15⟩
Conference papers
hal-01262740v1
|
||
|
Guiding testers' hands in monitoring tools : application of testing approaches on SIP27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.105-123, ⟨10.1007/978-3-319-25945-1_7⟩
Conference papers
hal-01263247v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|