Filter your results
- 27
- 27
- 2
- 27
- 1
- 2
- 3
- 3
- 2
- 3
- 2
- 1
- 2
- 5
- 2
- 1
- 1
- 27
- 3
- 2
- 2
- 1
- 1
- 1
- 13
- 7
- 7
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Creating Integrated Evidence Graphs for Network Forensics9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers
hal-01460608v1
|
||
|
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers
hal-01534756v1
|
||
|
Identifying Evidence for Cloud Forensic Analysis13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.111-130, ⟨10.1007/978-3-319-67208-3_7⟩
Conference papers
hal-01716407v1
|
||
|
Distributed Query Evaluation over Encrypted Data35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.96-114, ⟨10.1007/978-3-030-81242-3_6⟩
Conference papers
hal-03677027v1
|
||
|
Evaluating WELI: A Wrist-Worn Application to Assist Young Adults with Neurodevelopmental Disorders in Inclusive Classes17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.114-134, ⟨10.1007/978-3-030-29384-0_7⟩
Conference papers
hal-02544603v1
|
||
|
Consistent Query Plan Generation in Secure Cooperative Data Access28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers
hal-01284858v1
|
||
|
Reducing Security Risks of Clouds Through Virtual Machine Placement31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.275-292, ⟨10.1007/978-3-319-61176-1_15⟩
Conference papers
hal-01684346v1
|
||
|
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers
hal-03657230v1
|
||
|
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers
hal-01449074v1
|
||
|
Cooperative Data Access in Multi-cloud Environments23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers
hal-01586583v1
|
||
|
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers
hal-01060614v1
|
||
|
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.263-289, ⟨10.1007/978-3-319-99277-8_15⟩
Conference papers
hal-01988841v1
|
||
|
Rule Enforcement with Third Parties in Secure Cooperative Data Access27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩
Conference papers
hal-01490712v1
|
||
|
Using parallel distributed processing to reduce the computational time of digital media similarity measures17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.65-87, ⟨10.1007/978-3-030-88381-2_4⟩
Conference papers
hal-03764373v1
|
||
|
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers
hal-01684351v1
|
||
|
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.253-272, ⟨10.1007/978-3-030-28752-8_14⟩
Conference papers
hal-02534598v1
|
||
|
Optimizing Integrity Checks for Join Queries in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers
hal-01284840v1
|
||
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers
hal-01633677v1
|
||
|
A Digital Media Similarity Measure for Triage of Digital Forensic Evidence16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers
hal-03657240v1
|
||
|
Real-Time Covert Timing Channel Detection in Networked Virtual Environments9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers
hal-01460611v1
|
||
|
TerraCheck: Verification of Dedicated Cloud Storage27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.113-127, ⟨10.1007/978-3-642-39256-6_8⟩
Conference papers
hal-01490720v1
|
||
|
Extending Loose Associations to Multiple Fragments27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.1-16, ⟨10.1007/978-3-642-39256-6_1⟩
Conference papers
hal-01490711v1
|
||
|
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers
hal-03243631v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|
||
|
A Probabilistic Network Forensic Model for Evidence Analysis12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.189-210, ⟨10.1007/978-3-319-46279-0_10⟩
Conference papers
hal-01758685v1
|