Filter your results
- 8
- 2
- 8
- 2
- 10
- 1
- 1
- 2
- 1
- 1
- 2
- 2
- 10
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 results
|
|
sorted by
|
|
On Practical Aspects of PCFG Password Cracking33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.43-60, ⟨10.1007/978-3-030-22479-0_3⟩
Conference papers
hal-02384606v1
|
||
|
Traffic Classification and Application Identification in Network Forensics14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.161-181, ⟨10.1007/978-3-319-99277-8_10⟩
Conference papers
hal-01988838v1
|
||
|
Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.297-308, ⟨10.1007/978-3-319-33936-8_23⟩
Conference papers
hal-01434859v1
|
||
|
Evaluating Reputation of Internet Entities10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.132-136, ⟨10.1007/978-3-319-39814-3_13⟩
Conference papers
hal-01632738v1
|
||
|
Using Application-Aware Flow Monitoring for SIP Fraud Detection9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.87-99, ⟨10.1007/978-3-319-20034-7_10⟩
Conference papers
hal-01410154v1
|
||
|
Detecting IP Spoofing by Modelling History of IP Address Entry Points7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.73-83, ⟨10.1007/978-3-642-38998-6_9⟩
Conference papers
hal-01489972v1
|
||
|
Practical Revocable Anonymous Credentials13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers
hal-01540883v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Service-Based Realization of Business Processes Driven by Control-Flow Patterns3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.91-102, ⟨10.1007/978-3-642-22386-0_7⟩
Conference papers
hal-01572549v1
|
||
|
Software Engineering TechniquesSpringer, LNCS-4980, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-22386-0⟩
Books
hal-01572533v1
|