Filter your results
- 6
- 1
- 6
- 1
- 7
- 7
- 2
- 1
- 2
- 1
- 5
- 3
- 3
- 10
- 10
- 6
- 7
- 2
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
CrowdMAC: A Crowdsourcing System for Mobile Access13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.1-20, ⟨10.1007/978-3-642-35170-9_1⟩
Conference papers
hal-01555555v1
|
||
|
Challenges for Dynamic Analysis of iOS ApplicationsInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.65-77, ⟨10.1007/978-3-642-27585-2_6⟩
Conference papers
hal-01481507v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
XML Conversion of the Windows Registry for Forensic Processing and Distribution8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.51-65, ⟨10.1007/978-3-642-33962-2_4⟩
Conference papers
hal-01523700v1
|
||
|
Measuring the Evolution of Internet Peering Agreements11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.136-148, ⟨10.1007/978-3-642-30054-7_11⟩
Conference papers
hal-01531958v1
|
||
|
Towards a Statistical Characterization of the Interdomain Traffic Matrix11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.111-123, ⟨10.1007/978-3-642-30054-7_9⟩
Conference papers
hal-01531968v1
|
||
|
Security Limitations of Using Secret Sharing for Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.145-160, ⟨10.1007/978-3-642-31540-4_12⟩
Conference papers
hal-01534766v1
|