Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

26 results
Keywords : Network security
Image document

Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter

Tomáš Halagan , Tomáš Kováčik , Peter Trúchly , Andrej Binder
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.30-39, ⟨10.1007/978-3-319-24315-3_4⟩
Conference papers hal-01466237v1
Image document

Security Issues of IPv6 Network Autoconfiguration

Maciej Rostański , Taras Mushynskyy
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.218-228, ⟨10.1007/978-3-642-40925-7_21⟩
Conference papers hal-01496069v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

Network-Wide Localization of Optical-Layer Attacks

Marija Furdek , Vincent Chan , Carlos Natalino , Lena Wosinska
23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.310-322, ⟨10.1007/978-3-030-38085-4_27⟩
Conference papers hal-03200677v1
Image document

In Whom Do We Trust - Sharing Security Events

Jessica Steinberger , Benjamin Kuhnert , Anna Sperotto , Harald Baier , Aiko Pras
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers hal-01632748v1
Image document

BotTrack: Tracking Botnets Using NetFlow and PageRank

Jérôme François , Shaonan Wang , Radu State , Thomas Engel
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.1-14, ⟨10.1007/978-3-642-20757-0_1⟩
Conference papers inria-00613597v1
Image document

Secure Client Puzzles Based on Random Beacons

Yves Igor Jerschow , Martin Mauve
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers hal-01531977v1
Image document

Security Situation Prediction of Network Based on Lstm Neural Network

Liqiong Chen , Guoqing Fan , Kun Guo , Junyan Zhao
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.140-144, ⟨10.1007/978-3-030-79478-1_12⟩
Conference papers hal-03768740v1
Image document

Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

Mahmood Hussain Shah , Raza Muhammad , Nisreen Ameen
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers hal-03222876v1
Image document

An Approach to Information Security Policy Modeling for Enterprise Networks

Dmitry Chernyavskiy , Natalia Miloslavskaya
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.118-127, ⟨10.1007/978-3-662-44885-4_10⟩
Conference papers hal-01404201v1
Image document

Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery

Ola Salman , Imad H. Elhajj , Ayman Kayssi , Ali Chehab
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.99-116, ⟨10.1007/978-3-030-45778-5_8⟩
Conference papers hal-03266453v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

Normalizing Security Events with a Hierarchical Knowledge Base

David Jaeger , Amir Azodi , Feng Cheng , Christoph Meinel
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.237-248, ⟨10.1007/978-3-319-24018-3_15⟩
Conference papers hal-01442546v1
Image document

Efficient and Secure Decentralized Network Size Estimation

Nathan Evans , Bartlomiej Polot , Christian Grothoff
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.304-317, ⟨10.1007/978-3-642-30045-5_23⟩
Conference papers hal-01531109v1
Image document

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Ding Wang , Chun-Guang Ma , Peng Wu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers hal-01534767v1
Image document

A Layered Detection Method for Malware Identification

Ting Liu , Xiaohong Guan , Yu Qu , Yanan Sun
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.166-175, ⟨10.1007/978-3-642-24403-2_14⟩
Conference papers hal-01593029v1
Image document

Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance

Frederic Pohl , Hans Dieter Schotten
6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.83-90, ⟨10.1007/978-3-319-67262-5_7⟩
Conference papers hal-01677607v1
Image document

Generating a Real-Time Constraint Engine for Network Protocols

Mohamed Sami Rakha , Fahim T. Imam , Thomas R. Dean
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.44-60, ⟨10.1007/978-3-030-20074-9_5⟩
Conference papers hal-02294615v1
Image document

A New Method for Authentication Based on Covert Channel

Yanan Sun , Xiaohong Guan , Ting Liu
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.160-165, ⟨10.1007/978-3-642-24403-2_13⟩
Conference papers hal-01593011v1
Image document

Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model

Yang Chen , Junzhe Zhang , Chai Kiat Yeo
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.1-14, ⟨10.1007/978-3-030-45778-5_1⟩
Conference papers hal-03266470v1
Image document

Efficient Processing of Multi-connection Compressed Web Traffic

Yehuda Afek , Anat Bremler-Barr , Yaron Koral
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.52-65, ⟨10.1007/978-3-642-20757-0_5⟩
Conference papers hal-01583398v1
Image document

A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network

Saswati Mukherjee , Matangini Chattopadhyay , Samiran Chattopadhyay , Debarshi Kumar Sanyal , Roshni Neogy , et al.
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.301-312, ⟨10.1007/978-3-642-40925-7_28⟩
Conference papers hal-01496076v1
Image document

Visual Analytics for Network Security and Critical Infrastructures

Karolína Burská , Radek Ošlejšek
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.149-152, ⟨10.1007/978-3-319-60774-0_13⟩
Conference papers hal-01806057v1
Image document

A High-Speed Network Content Filtering System

Guohong Zhao , Shuhui Chen , Baokang Zhao , Ilsun You , Jinshu Su , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers hal-01404003v1
Image document

Anomaly Detection and Mitigation at Internet Scale: A Survey

Jessica Steinberger , Lisa Schehlmann , Sebastian Abt , Harald Baier
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.49-60, ⟨10.1007/978-3-642-38998-6_7⟩
Conference papers hal-01489970v1
Image document

Investigation of DDoS Attacks by Hybrid Simulation

Yana Bekeneva , Konstantin Borisenko , Andrey Shorov , Igor Kotenko
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.179-189, ⟨10.1007/978-3-319-24315-3_18⟩
Conference papers hal-01466218v1