Filter your results
- 5
- 5
- 5
- 1
- 2
- 3
- 1
- 1
- 2
- 1
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Template-Based Method for the Generation of Attack Trees13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers
hal-03173899v1
|
||
|
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers
hal-03222876v1
|
||
|
Combining Third Party Components Securely in Automotive Systems10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers
hal-01639623v1
|
||
|
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop ApproachInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.81-95, ⟨10.1007/978-3-319-45507-5_6⟩
Conference papers
hal-01635020v1
|
||
|
Early Warning Systems for Cyber DefenceInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.29-42, ⟨10.1007/978-3-319-39028-4_3⟩
Conference papers
hal-01445791v1
|