Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

20 results
Image document

Using of Time Characteristics in Data Flow for Traffic Classification

Pavel Piskac , Jiri Novotny
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.173-176, ⟨10.1007/978-3-642-21484-4_21⟩
Conference papers hal-01585856v1
Image document

Situational Awareness: Detecting Critical Dependencies and Devices in a Network

Martin Laštovička , Pavel Čeleda
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.173-178, ⟨10.1007/978-3-319-60774-0_17⟩
Conference papers hal-01806054v1

Emerging Management Mechanisms for the Future Internet

Guillaume Doyen , Martin Waldburger , Pavel Čeleda , Anna Sperotto , Burkhard Stiller
Springer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books hal-01489973v1
Image document

Protocol-Independent Detection of Dictionary Attacks

Martin Drašar
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.304-309, ⟨10.1007/978-3-642-40552-5_30⟩
Conference papers hal-01497030v1
Image document

Traffic Measurement and Analysis of Building Automation and Control Networks

Radek Krejčí , Pavel Čeleda , Jakub Dobrovolný
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.62-73, ⟨10.1007/978-3-642-30633-4_9⟩
Conference papers hal-01529790v1
Image document

Flow-Based Security Issue Detection in Building Automation and Control Networks

Pavel Čeleda , Radek Krejčí , Vojtěch Krmíček
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.64-75, ⟨10.1007/978-3-642-32808-4_7⟩
Conference papers hal-01543173v1
Image document

Visual Analytics for Network Security and Critical Infrastructures

Karolína Burská , Radek Ošlejšek
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.149-152, ⟨10.1007/978-3-319-60774-0_13⟩
Conference papers hal-01806057v1
Image document

Bringing Kleptography to Real-World TLS

Adam Janovsky , Jan Krhovjak , Vashek Matyas
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.15-27, ⟨10.1007/978-3-030-20074-9_3⟩
Conference papers hal-02294600v1
Image document

Enhancing Network Security: Host Trustworthiness Estimation

Tomáš Jirsík , Pavel Čeleda
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.63-68, ⟨10.1007/978-3-662-43862-6_8⟩
Conference papers hal-01401291v1
Image document

Future of DDoS Attacks Mitigation in Software Defined Networks

Martin Vizváry , Jan Vykopal
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.123-127, ⟨10.1007/978-3-662-43862-6_15⟩
Conference papers hal-01401297v1
Image document

Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches

Martin Drašar , Tomáš Jirsík , Martin Vizváry
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.160-172, ⟨10.1007/978-3-662-43862-6_19⟩
Conference papers hal-01401302v1
Image document

On Secrecy Amplification Protocols

Radim Ošťádal , Petr Švenda , Vashek Matyáš
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.3-19, ⟨10.1007/978-3-319-24018-3_1⟩
Conference papers hal-01442550v1
Image document

Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms

Vlasta Stavova , Vashek Matyas , Mike Just
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers hal-01639601v1
Image document

Next Generation Application-Aware Flow Monitoring

Petr Velan , Pavel Čeleda
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.173-178, ⟨10.1007/978-3-662-43862-6_20⟩
Conference papers hal-01401303v1
Image document

Network Defence Using Attacker-Defender Interaction Modelling

Jana Medková , Pavel Čeleda
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.127-131, ⟨10.1007/978-3-319-39814-3_12⟩
Conference papers hal-01632737v1
Image document

Detecting Advanced Network Threats Using a Similarity Search

Milan Čermák , Pavel Čeleda
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.137-141, ⟨10.1007/978-3-319-39814-3_14⟩
Conference papers hal-01632739v1
Image document

Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement

Petr Velan , Tomáš Jirsík , Pavel Čeleda
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.136-147, ⟨10.1007/978-3-642-40552-5_13⟩
Conference papers hal-01497010v1

Management and Security in the Age of Hyperconnectivity

Rémi Badonnel , Robert Koch , Aiko Pras , Martin Drašar , Burkhard Stiller
Springer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books hal-01632740v1
Image document

Random Number Generation Based on Fingerprints

Shkodran Gerguri , Václav Matyáš , Zdeněk Říha , Luděk Smolík
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.170-182, ⟨10.1007/978-3-642-12368-9_12⟩
Conference papers hal-01056088v1

Dependable Networks and Services

Ramin Sadre , Jiří Novotný , Pavel Čeleda , Martin Waldburger , Burkhard Stiller
Springer, LNCS-7279, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30633-4⟩
Books hal-01529791v1