Filter your results
- 26
- 25
- 1
- 26
- 5
- 1
- 5
- 1
- 2
- 1
- 3
- 2
- 3
- 3
- 5
- 26
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.30-39, ⟨10.1007/978-3-319-24315-3_4⟩
Conference papers
hal-01466237v1
|
||
|
Security Issues of IPv6 Network Autoconfiguration12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.218-228, ⟨10.1007/978-3-642-40925-7_21⟩
Conference papers
hal-01496069v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Network-Wide Localization of Optical-Layer Attacks23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.310-322, ⟨10.1007/978-3-030-38085-4_27⟩
Conference papers
hal-03200677v1
|
||
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
BotTrack: Tracking Botnets Using NetFlow and PageRank10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.1-14, ⟨10.1007/978-3-642-20757-0_1⟩
Conference papers
inria-00613597v1
|
||
|
Secure Client Puzzles Based on Random Beacons11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers
hal-01531977v1
|
||
|
Security Situation Prediction of Network Based on Lstm Neural Network17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.140-144, ⟨10.1007/978-3-030-79478-1_12⟩
Conference papers
hal-03768740v1
|
||
|
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers
hal-03222876v1
|
||
|
An Approach to Information Security Policy Modeling for Enterprise Networks15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.118-127, ⟨10.1007/978-3-662-44885-4_10⟩
Conference papers
hal-01404201v1
|
||
|
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.99-116, ⟨10.1007/978-3-030-45778-5_8⟩
Conference papers
hal-03266453v1
|
||
|
Information Security Theory and PracticeSpringer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books
hal-03173895v1
|
||
|
Normalizing Security Events with a Hierarchical Knowledge Base9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.237-248, ⟨10.1007/978-3-319-24018-3_15⟩
Conference papers
hal-01442546v1
|
||
|
Efficient and Secure Decentralized Network Size Estimation11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.304-317, ⟨10.1007/978-3-642-30045-5_23⟩
Conference papers
hal-01531109v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
A Layered Detection Method for Malware Identification8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.166-175, ⟨10.1007/978-3-642-24403-2_14⟩
Conference papers
hal-01593029v1
|
||
|
Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.83-90, ⟨10.1007/978-3-319-67262-5_7⟩
Conference papers
hal-01677607v1
|
||
|
Generating a Real-Time Constraint Engine for Network Protocols12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.44-60, ⟨10.1007/978-3-030-20074-9_5⟩
Conference papers
hal-02294615v1
|
||
|
A New Method for Authentication Based on Covert Channel8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.160-165, ⟨10.1007/978-3-642-24403-2_13⟩
Conference papers
hal-01593011v1
|
||
|
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.1-14, ⟨10.1007/978-3-030-45778-5_1⟩
Conference papers
hal-03266470v1
|
||
|
Efficient Processing of Multi-connection Compressed Web Traffic10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.52-65, ⟨10.1007/978-3-642-20757-0_5⟩
Conference papers
hal-01583398v1
|
||
|
A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.301-312, ⟨10.1007/978-3-642-40925-7_28⟩
Conference papers
hal-01496076v1
|
||
|
Visual Analytics for Network Security and Critical Infrastructures11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.149-152, ⟨10.1007/978-3-319-60774-0_13⟩
Conference papers
hal-01806057v1
|
||
|
A High-Speed Network Content Filtering SystemInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers
hal-01404003v1
|
||
|
Anomaly Detection and Mitigation at Internet Scale: A Survey7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.49-60, ⟨10.1007/978-3-642-38998-6_7⟩
Conference papers
hal-01489970v1
|
||
|
Investigation of DDoS Attacks by Hybrid Simulation3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.179-189, ⟨10.1007/978-3-319-24315-3_18⟩
Conference papers
hal-01466218v1
|