Filter your results
- 5
- 5
- 5
- 2
- 1
- 1
- 1
- 5
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Malicious MPLS Policy Engine Reconnaissance15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.3-18, ⟨10.1007/978-3-662-44885-4_1⟩
Conference papers
hal-01404180v1
|
||
|
Mapping between Classical Risk Management and Game Theoretical Approaches12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.147-154, ⟨10.1007/978-3-642-24712-5_12⟩
Conference papers
hal-01596184v1
|
||
|
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.148-159, ⟨10.1007/978-3-642-38998-6_18⟩
Conference papers
hal-01489964v1
|
||
|
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.73-85, ⟨10.1007/978-3-662-44885-4_6⟩
Conference papers
hal-01404188v1
|
||
|
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.16-27, ⟨10.1007/978-3-642-13241-4_3⟩
Conference papers
hal-01056371v1
|