Filter your results
- 12
- 2
- 12
- 2
- 14
- 1
- 1
- 1
- 2
- 1
- 4
- 1
- 3
- 14
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
14 results
|
|
sorted by
|
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books
hal-01639612v1
|
||
|
GDI as an Alternative Guiding Interaction Style for Occasional Users17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.75-96, ⟨10.1007/978-3-030-29390-1_5⟩
Conference papers
hal-02877652v1
|
||
|
Bayesian Classifiers in Intrusion Detection Systems2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.379-391, ⟨10.1007/978-3-030-45778-5_26⟩
Conference papers
hal-03266456v1
|
||
|
Network Traffic Analysis and QoE Evaluation for Video Progressive Download Service: Netflix13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.239-246, ⟨10.1007/978-3-319-22572-2_17⟩
Conference papers
hal-01728819v1
|
||
|
Policy Languages and Their Suitability for Trust Negotiation32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.69-84, ⟨10.1007/978-3-319-95729-6_5⟩
Conference papers
hal-01954417v1
|
||
|
Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.374-385, ⟨10.1007/978-3-642-21560-5_31⟩
Conference papers
hal-01583642v1
|
||
|
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.453-472, ⟨10.1007/978-3-319-61176-1_25⟩
Conference papers
hal-01684370v1
|
||
|
Dual Flow Interaction: Scene Flow and Data Flow, Dual Interaction in Art Installations13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-506, ⟨10.1007/978-3-642-23768-3_68⟩
Conference papers
hal-01597030v1
|
||
|
Towards a Cooperative Intrusion Detection System for Cognitive Radio NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.231-242, ⟨10.1007/978-3-642-23041-7_22⟩
Conference papers
hal-01587836v1
|
||
|
Behaviour Protection in Modular Rule-Based System Specifications21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.24-49, ⟨10.1007/978-3-642-37635-1_2⟩
Conference papers
hal-01485976v1
|
||
|
PerformLTE: A Testbed for LTE Testing in the Future Internet13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.46-59, ⟨10.1007/978-3-319-22572-2_4⟩
Conference papers
hal-01728791v1
|
||
|
AntWMNet – A Hybrid Routing Algorithm for Wireless Mesh Networks Based on Ant Colony Optimisation13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.108-121, ⟨10.1007/978-3-319-22572-2_8⟩
Conference papers
hal-01728793v1
|
||
|
Wired/Wireless Internet CommunicationsSpringer International Publishing, LNCS-9071, 2015, Lecture Notes in Computer Science, 978-3-319-22571-5. ⟨10.1007/978-3-319-22572-2⟩
Books
hal-01728798v1
|
||
|
Verifying Timed BPMN Processes Using Maude19th International Conference on Coordination Languages and Models (COORDINATION), Jun 2017, Neuchâtel, Switzerland. pp.219-236, ⟨10.1007/978-3-319-59746-1_12⟩
Conference papers
hal-01538104v1
|