Filter your results
- 3
- 3
- 3
- 2
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Information Leakage Discovery Techniques to Enhance Secure Chip Design5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.128-143, ⟨10.1007/978-3-642-21040-2_9⟩
Conference papers
hal-01573297v1
|
||
|
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.240-254, ⟨10.1007/978-3-030-45778-5_16⟩
Conference papers
hal-03266466v1
|
||
|
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.66-84, ⟨10.1007/978-3-030-41702-4_5⟩
Conference papers
hal-03173902v1
|