Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

10 results
Image document

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Irina Krivtsova , Ilya Lebedev , Mikhail Sukhoparov , Nurzhan Bazhayev , Igor Zikratov , et al.
14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.297-308, ⟨10.1007/978-3-319-33936-8_23⟩
Conference papers hal-01434859v1
Image document

Detecting IP Spoofing by Modelling History of IP Address Entry Points

Michal Kováčik , Michal Kajan , Martin Žádník
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.73-83, ⟨10.1007/978-3-642-38998-6_9⟩
Conference papers hal-01489972v1

Advances in Software Engineering Techniques

David Hutchison , Takeo Kanade , Josef Kittler , Jon M. Kleinberg , Friedemann Mattern , et al.
Springer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books hal-01527391v1
Image document

Using Application-Aware Flow Monitoring for SIP Fraud Detection

Tomas Cejka , Vaclav Bartos , Lukas Truxa , Hana Kubatova
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.87-99, ⟨10.1007/978-3-319-20034-7_10⟩
Conference papers hal-01410154v1
Image document

Practical Revocable Anonymous Credentials

Jan Hajny , Lukas Malina
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers hal-01540883v1
Image document

Service-Based Realization of Business Processes Driven by Control-Flow Patterns

Petr Weiss
3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.91-102, ⟨10.1007/978-3-642-22386-0_7⟩
Conference papers hal-01572549v1
Image document

Traffic Classification and Application Identification in Network Forensics

Jan Pluskal , Ondrej Lichtner , Ondrej Rysavy
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.161-181, ⟨10.1007/978-3-319-99277-8_10⟩
Conference papers hal-01988838v1
Image document

Evaluating Reputation of Internet Entities

Václav Bartoš , Jan Kořenek
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.132-136, ⟨10.1007/978-3-319-39814-3_13⟩
Conference papers hal-01632738v1

Software Engineering Techniques

Zbigniew Huzar , Radek Koci , Bertrand Meyer , Bartosz Walter , Jaroslav Zendulka
Springer, LNCS-4980, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-22386-0⟩
Books hal-01572533v1
Image document

On Practical Aspects of PCFG Password Cracking

Radek Hranický , Filip Lištiak , Dávid Mikuš , Ondřej Ryšavý
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.43-60, ⟨10.1007/978-3-030-22479-0_3⟩
Conference papers hal-02384606v1