Filter your results
- 8
- 2
- 8
- 2
- 10
- 1
- 1
- 1
- 1
- 3
- 1
- 1
- 2
- 10
- 10
- 2
- 1
- 1
- 7
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 results
|
|
sorted by
|
|
HCI Challenges in Human Movement Analysis17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.725-730, ⟨10.1007/978-3-030-29390-1_70⟩
Conference papers
hal-02378742v1
|
||
|
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.98-110, ⟨10.1007/978-3-319-39814-3_10⟩
Conference papers
hal-01632732v1
|
||
|
Impact of Dynamics on Situated and Global Aggregation Schemes5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.148-159, ⟨10.1007/978-3-642-21484-4_17⟩
Conference papers
hal-00951994v1
|
||
|
Toward a Source Detection of Botclouds: A PCA-Based Approach8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.105-117, ⟨10.1007/978-3-662-43862-6_13⟩
Conference papers
hal-01401295v1
|
||
|
Distributed and Efficient One-Class Outliers Detection Classifier in Wireless Sensors Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.259-273, ⟨10.1007/978-3-319-22572-2_19⟩
Conference papers
hal-01728802v1
|
||
|
Emerging Management Mechanisms for the Future InternetSpringer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books
hal-01489973v1
|
||
|
Monitoring and Securing Virtualized Networks and ServicesSpringer, LNCS-8508, 2014, Lecture Notes in Computer Science, 978-3-662-43861-9. ⟨10.1007/978-3-662-43862-6⟩
Books
hal-01401308v1
|
||
|
Towards a P2P-Based Deployment of Network Management Information4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.26-37, ⟨10.1007/978-3-642-13986-4_4⟩
Conference papers
hal-01056626v1
|
||
|
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers
hal-01401284v1
|
||
|
Modeling User Behavior in P2P Live Video Streaming Systems through a Bayesian Network4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.2-13, ⟨10.1007/978-3-642-13986-4_2⟩
Conference papers
hal-01056628v1
|