Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Reconstructing Interactions with Rich Internet Applications from HTTP Traces12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.147-164, ⟨10.1007/978-3-319-46279-0_8⟩
Conference papers
hal-01758682v1
|