Filter your results
- 20
- 19
- 1
- 20
- 2
- 2
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 2
- 20
- 5
- 2
- 2
- 1
- 1
- 1
- 9
- 6
- 5
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
20 results
|
|
sorted by
|
|
Security auditing of internet of things devices in a smart home17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.213-234, ⟨10.1007/978-3-030-88381-2_11⟩
Conference papers
hal-03764368v1
|
||
|
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers
hal-03657230v1
|
||
|
A Field Study of User Behavior and Perceptions in Smartcard Authentication13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23768-3_1⟩
Conference papers
hal-01596949v1
|
||
|
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.263-289, ⟨10.1007/978-3-319-99277-8_15⟩
Conference papers
hal-01988841v1
|
||
|
Mining Likely Properties of Access Control Policies via Association Rule Mining24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers
hal-01056688v1
|
||
|
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers
hal-01449074v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|
||
|
A Probabilistic Network Forensic Model for Evidence Analysis12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.189-210, ⟨10.1007/978-3-319-46279-0_10⟩
Conference papers
hal-01758685v1
|
||
|
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.343-349, ⟨10.1007/978-3-642-13739-6_26⟩
Conference papers
hal-01056674v1
|
||
|
Data and Applications Security and Privacy XXXIVSpringer International Publishing, LNCS-12122, 2020, Lecture Notes in Computer Science, 978-3-030-49668-5. ⟨10.1007/978-3-030-49669-2⟩
Books
hal-03243621v1
|
||
|
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.330-348, ⟨10.1007/978-3-319-95729-6_21⟩
Conference papers
hal-01954421v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers
hal-01633677v1
|
||
|
Deep Learning for Detecting Network Attacks: An End-to-End Approach35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.221-234, ⟨10.1007/978-3-030-81242-3_13⟩
Conference papers
hal-03677041v1
|
||
|
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.261-276, ⟨10.1007/978-3-319-20810-7_19⟩
Conference papers
hal-01745826v1
|
||
|
Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.195-208, ⟨10.1007/978-3-030-29726-8_13⟩
Conference papers
hal-02520031v1
|
||
|
Creating Integrated Evidence Graphs for Network Forensics9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers
hal-01460608v1
|
||
|
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers
hal-01684351v1
|
||
|
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.259-274, ⟨10.1007/978-3-319-61176-1_14⟩
Conference papers
hal-01684363v1
|
||
|
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.253-272, ⟨10.1007/978-3-030-28752-8_14⟩
Conference papers
hal-02534598v1
|