Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

16 results
Image document

Methods for Live Testing of Cloud Services

Oussama Jebbar , Ferhat Khendek , Maria Toeroe
32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.201-216, ⟨10.1007/978-3-030-64881-7_13⟩
Conference papers hal-03239818v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers hal-01684351v1
Image document

On Understanding Permission Usage Contextuality in Android Apps

Md Zakir Hossen , Mohammad Mannan
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.232-242, ⟨10.1007/978-3-319-95729-6_15⟩
Conference papers hal-01954415v1

Data and Applications Security and Privacy XXVII

Lingyu Wang , Basit Shafiq
Springer, LNCS-7964, 2013, Lecture Notes in Computer Science, 978-3-642-39255-9. ⟨10.1007/978-3-642-39256-6⟩
Books hal-01490722v1
Image document

An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling

Nizar Bouguila , Mohamed Al Mashrgy
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.296-305, ⟨10.1007/978-3-642-55032-4_29⟩
Conference papers hal-01397226v1
Image document

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers hal-03243631v1
Image document

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia , Anoop Singhal
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers hal-01954402v1
Image document

Towards an Integrated Model for Functional and User Interface Requirements

Rabeb Mizouni , Daniel Sinnig , Ferhat Khendek
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.214-221, ⟨10.1007/978-3-642-16488-0_19⟩
Conference papers hal-01055201v1
Image document

Online Learning for Two Novel Latent Topic Models

Ali Shojaee Bakhtiari , Nizar Bouguila
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.286-295, ⟨10.1007/978-3-642-55032-4_28⟩
Conference papers hal-01397223v1
Image document

Security auditing of internet of things devices in a smart home

Suryadipta Majumdar , Daniel Bastos , Anoop Singhal
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.213-234, ⟨10.1007/978-3-030-88381-2_11⟩
Conference papers hal-03764368v1

Computational Intelligence and Its Applications

Abdelmalek Amine , Malek Mouhoub , Otmane Ait Mohamed , Bachir Djebbar
Springer International Publishing, AICT-522, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-89742-4. ⟨10.1007/978-3-319-89743-1⟩
Books hal-01913869v1
Image document

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal , Roger Zahno , Amr M. Youssef
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers hal-01506556v1
Image document

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud

Samira Barouti , Feras Aljumah , Dima Alhadidi , Mourad Debbabi
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers hal-01284843v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1