Filter your results
- 6
- 6
- 6
- 2
- 3
- 1
- 6
- 1
- 6
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Achieving Reproducible Network Environments with INSALATA11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.30-44, ⟨10.1007/978-3-319-60774-0_3⟩
Conference papers
hal-01806059v1
|
||
|
Privacy Assessment Using Static Taint Analysis (Tool Paper)37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.225-235, ⟨10.1007/978-3-319-60225-7_16⟩
Conference papers
hal-01658424v1
|
||
|
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers
hal-01411193v1
|
||
|
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers
hal-01411194v1
|
||
|
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Conference papers
hal-01411196v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|