Filter your results
- 5
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.392-402, ⟨10.1007/978-3-030-45778-5_27⟩
Conference papers
hal-03266457v1
|
||
|
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.290-302, ⟨10.1007/978-3-319-59105-6_25⟩
Conference papers
hal-01656241v1
|
||
|
Preserving Privacy of Co-occurring Keywords over Encrypted Data35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.157-168, ⟨10.1007/978-3-030-81242-3_9⟩
Conference papers
hal-03677031v1
|
||
|
Disease Identification in Tomato Leaf Using Pre-trained ResNet and Deformable Inception5th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2022, Virtual, India. pp.221-234, ⟨10.1007/978-3-031-16364-7_17⟩
Conference papers
hal-04381303v1
|
||
|
Assessing the Effects of a Soft Cut-Off in the Twitter Social Network10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.288-300, ⟨10.1007/978-3-642-20798-3_22⟩
Conference papers
hal-01597983v1
|