Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

90 results
Image document

Solving an Integration Process Planning and Scheduling in a Flexible Job Shop Using a Hybrid Approach

Nassima Keddari , Nasser Mebarki , Atif Shahzad , Zaki Sari
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.387-398, ⟨10.1007/978-3-319-89743-1_34⟩
Conference papers hal-01913923v1
Image document

Bringing Complex Event Processing into Multitree Modelling of Sensors

Alexandre Garnier , Jean-Marc Menaud , Nicolas Montavont
16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.196-210, ⟨10.1007/978-3-319-39577-7_16⟩
Conference papers hal-01434795v1
Image document

Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study

Iyas Alloush , Vanea Chiprianov , Yvon Kermarrec , Siegfried Rouvrais
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers hal-00739604v1
Image document

Specification and Deployment of Integrated Security Policies for Outsourced Data

Anis Bkakria , Frédéric Cuppens , Nora Cuppens-Bouhlahia , David Gross-Amblard
28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers hal-01087467v1
Image document

3D Simulation to Validate Autonomous Intervention Systems Architecture for Disaster Management

Tullio Tanzi , Matteo Bertolino
4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.196-211, ⟨10.1007/978-3-030-48939-7_17⟩
Conference papers hal-03374239v1
Image document

Applying a Dependency Mechanism for Voting Protocol Models Using Event-B

Paul J. Gibson , Souad Kherroubi , Dominique Méry
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2017), Jun 2017, Neuchâtel, Switzerland. pp.124-138, ⟨10.1007/978-3-319-60225-7_9⟩
Conference papers hal-01658423v1

When Clocks Fail: On Critical Paths and Clock Faults

Michel Agoyan , Jean-Max Dutertre , David Naccache , Bruno Robisson , Assia Tria
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers emse-00505344v1
Image document

Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks

Juliette Dromard , Rida Khatoun , Lyes Khoukhi
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers hal-01401284v1
Image document

Quality Estimation of Virtual Machine Placement in Cloud Infrastructures

Jorge Lopez , Natalia Kushik , Djamal Zeghlache
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.213-229, ⟨10.1007/978-3-319-67549-7_13⟩
Conference papers hal-01678958v1
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1

Testing Software and Systems

Nina Yevtushenko , Ana Rosa Cavalli , Husnu Yenigun
Springer International Publishing, LNCS-10533, 2017, Lecture Notes in Computer Science, 978-3-319-67548-0. ⟨10.1007/978-3-319-67549-7⟩
Books hal-01678967v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers hal-01391308v1
Image document

Towards QoC-aware location-based services

Sophie Chabridon , Cao Cuong Ngo , Zied Abid , Denis Conan , Chantal Taconet , et al.
11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.71 - 76, ⟨10.1007/978-3-642-21387-8_6⟩
Conference papers hal-01303054v1

Data and Applications Security and Privacy XXVI

Nora Cuppens-Bouhlahia , Frédéric Cuppens , Joaquin Garcia Alfaro
Springer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books hal-01164720v1
Image document

Parametric Statistical Model Checking of UAV Flight Plan

Ran Bao , Christian Attiogbe , Benoit Delahaye , Paulin Fournier , Didier Lime
39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.57-74, ⟨10.1007/978-3-030-21759-4_4⟩
Conference papers hal-02313737v1
Image document

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Tidiane Sylla , Mohamed Aymen Chalouf , Francine Krief , Karim Samaké
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers hal-02496273v1
Image document

On traffic domination in communication networks

Walid Ben-Ameur , Pablo Pavón Mariño , Michal Pioro
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.191-202, ⟨10.1007/978-3-642-25575-5_16⟩
Conference papers hal-01301879v1
Image document

Leakage Squeezing Countermeasure against High-Order Attacks

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers hal-01573295v1
Image document

Improving clustering techniques in wireless sensor networks using thinning process

Monique Becker , Ashish Gupta , Michel Marot , Harmeet Singh
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.203-214, ⟨10.1007/978-3-642-25575-5_17⟩
Conference papers hal-01347786v1
Image document

One Fitts’ Law, Two Metrics

Julien Gori , Olivier Rioul , Yves Guiard , Michel Beaudouin-Lafon
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.525-533, ⟨10.1007/978-3-319-67687-6_36⟩
Conference papers hal-01717202v1
Image document

Characterizing Bufferbloat and its Impact at End-hosts

Stephane Wustner , Renata Teixeira , Jaideep Chandrashekar
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.51-64, ⟨10.1007/978-3-642-54999-1_5⟩
Conference papers hal-01097476v1
Image document

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds

Tarik Moataz , Benjamin Justus , Indrakshi Ray , Nora Cuppens-Bouhlahia , Frédéric Cuppens , et al.
DBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers hal-01159841v1
Image document

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data

Anis Bkakria , Frédéric Cuppens , Nora Cuppens-Bouhlahia , José M. Fernandez
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers hal-01213982v1

Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposal

Patrick Battistello , Cyril Delétré
CMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers hal-00565730v1
Image document

Privacy in digital identity systems: models, assessment and user adoption

Armen Khatchatourov , Maryline Laurent , Claire Levallois-Barth
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers hal-01283997v1
Image document

Runtime Code Polymorphism as a Protection Against Side Channel Attacks

Damien Couroussé , Thierno Barry , Bruno Robisson , Philippe Jaillon , Olivier Potin , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers emse-01372223v1
Image document

U-Note: Capture the Class and Access it Everywhere

Sylvain Malacria , Thomas Pietrzak , Aurélien Tabard , Éric Lecolinet
Proceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers hal-00671380v1
Image document

Network Traffic Classification Using Machine Learning for Software Defined Networks

Menuka Perera Jayasuriya Kuranage , Kandaraj Piamrat , Salima Hamma
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.28-39, ⟨10.1007/978-3-030-45778-5_3⟩
Conference papers hal-03266452v1
Image document

A model checking based approach for detecting SDN races

Evgenii Vinarskii , Jorge Lopez , Natalia Kushik , Nina Yevtushenko , Djamal Zeghlache
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩
Conference papers hal-02448964v1
Image document

Heuristics for deriving adaptive homing and distinguishing sequences for nondeterministic finite state machines

Natalia Kushik , Husnu Yenigun
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah And Dubai, United Arab Emirates. pp.243-248, ⟨10.1007/978-3-319-25945-1_15⟩
Conference papers hal-01262740v1