Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
Deposit type : Fulltext
labStructName_s : Computer Security Division
labStructName_s : Laboratoire de Méthodes de Conception de Systèmes
Image document

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs

Chen Cao , Lun-Pin Yuan , Anoop Singhal , Peng Liu , Xiaoyan Sun , et al.
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.330-348, ⟨10.1007/978-3-319-95729-6_21⟩
Conference papers hal-01954421v1
Image document

Conjugate Gradient Method for Brain Magnetic Resonance Images Segmentation

El-Hachemi Guerrout , Samy Ait-Aoudia , Dominique Michelucci , Ramdane Mahiou
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.561-572, ⟨10.1007/978-3-319-89743-1_48⟩
Conference papers hal-01913885v1
Image document

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia , Anoop Singhal
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers hal-01954402v1
Image document

Crowdsourced Collaborative Decision Making in Crisis Management: Application to Desert Locust Survey and Control

Mohammed Benali , Abdessamed Réda Ghomari , Leila Zemmouchi-Ghomari
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.533-545, ⟨10.1007/978-3-319-89743-1_46⟩
Conference papers hal-01913921v1