Filter your results
- 17
- 3
- 17
- 3
- 20
- 1
- 2
- 4
- 1
- 4
- 3
- 3
- 1
- 1
- 20
- 1
- 1
- 1
- 1
- 10
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
20 results
|
|
sorted by
|
|
Using of Time Characteristics in Data Flow for Traffic Classification5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.173-176, ⟨10.1007/978-3-642-21484-4_21⟩
Conference papers
hal-01585856v1
|
||
|
Situational Awareness: Detecting Critical Dependencies and Devices in a Network11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.173-178, ⟨10.1007/978-3-319-60774-0_17⟩
Conference papers
hal-01806054v1
|
||
|
Emerging Management Mechanisms for the Future InternetSpringer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books
hal-01489973v1
|
||
|
Protocol-Independent Detection of Dictionary Attacks19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.304-309, ⟨10.1007/978-3-642-40552-5_30⟩
Conference papers
hal-01497030v1
|
||
|
Traffic Measurement and Analysis of Building Automation and Control Networks6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.62-73, ⟨10.1007/978-3-642-30633-4_9⟩
Conference papers
hal-01529790v1
|
||
|
Flow-Based Security Issue Detection in Building Automation and Control Networks18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.64-75, ⟨10.1007/978-3-642-32808-4_7⟩
Conference papers
hal-01543173v1
|
||
|
Visual Analytics for Network Security and Critical Infrastructures11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.149-152, ⟨10.1007/978-3-319-60774-0_13⟩
Conference papers
hal-01806057v1
|
||
|
Bringing Kleptography to Real-World TLS12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.15-27, ⟨10.1007/978-3-030-20074-9_3⟩
Conference papers
hal-02294600v1
|
||
|
Enhancing Network Security: Host Trustworthiness Estimation8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.63-68, ⟨10.1007/978-3-662-43862-6_8⟩
Conference papers
hal-01401291v1
|
||
|
Future of DDoS Attacks Mitigation in Software Defined Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.123-127, ⟨10.1007/978-3-662-43862-6_15⟩
Conference papers
hal-01401297v1
|
||
|
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.160-172, ⟨10.1007/978-3-662-43862-6_19⟩
Conference papers
hal-01401302v1
|
||
|
On Secrecy Amplification Protocols9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.3-19, ⟨10.1007/978-3-319-24018-3_1⟩
Conference papers
hal-01442550v1
|
||
|
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers
hal-01639601v1
|
||
|
Next Generation Application-Aware Flow Monitoring8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.173-178, ⟨10.1007/978-3-662-43862-6_20⟩
Conference papers
hal-01401303v1
|
||
|
Network Defence Using Attacker-Defender Interaction Modelling10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.127-131, ⟨10.1007/978-3-319-39814-3_12⟩
Conference papers
hal-01632737v1
|
||
|
Detecting Advanced Network Threats Using a Similarity Search10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.137-141, ⟨10.1007/978-3-319-39814-3_14⟩
Conference papers
hal-01632739v1
|
||
|
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.136-147, ⟨10.1007/978-3-642-40552-5_13⟩
Conference papers
hal-01497010v1
|
||
|
Management and Security in the Age of HyperconnectivitySpringer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books
hal-01632740v1
|
||
|
Random Number Generation Based on Fingerprints4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.170-182, ⟨10.1007/978-3-642-12368-9_12⟩
Conference papers
hal-01056088v1
|
||
|
Dependable Networks and ServicesSpringer, LNCS-7279, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30633-4⟩
Books
hal-01529791v1
|