Filter your results
- 19
- 19
- 19
- 4
- 1
- 2
- 1
- 2
- 1
- 1
- 3
- 7
- 1
- 19
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On Detecting Abrupt Changes in Network Entropy Time Series12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.194-205, ⟨10.1007/978-3-642-24712-5_18⟩
Conference papers
hal-01596209v1
|
||
|
Information Density Based Image Binarization for Text Document Containing Graphics15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.105-115, ⟨10.1007/978-3-319-45378-1_10⟩
Conference papers
hal-01637461v1
|
||
|
On Graph Entropy Measures for Knowledge Discovery from Publication Network Data1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.354-362
Conference papers
hal-01506782v1
|
||
|
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers
hal-01056381v1
|
||
|
On the Analysis of Queues with Heavy Tails: A Non-Extensive Maximum Entropy Formalism and a Generalisation of the Zipf-Mandelbrot DistributionPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.99-111, ⟨10.1007/978-3-642-25575-5_9⟩
Conference papers
hal-01586893v1
|
||
|
Learning Entropy10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.15-27, ⟨10.1007/978-3-642-20757-0_2⟩
Conference papers
hal-01583407v1
|
||
|
Network Anomaly Detection Using Parameterized Entropy13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers
hal-01405630v1
|
||
|
Cross-Entropy Optimized Cognitive Radio PoliciesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.13-21, ⟨10.1007/978-3-642-23041-7_2⟩
Conference papers
hal-01587842v1
|
||
|
Information-Theoretic Analysis of Human Performance for Command Selection16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.515-524, ⟨10.1007/978-3-319-67687-6_35⟩
Conference papers
hal-01643924v1
|
||
|
Entropy of Selectively Encrypted Strings5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers
hal-01573290v1
|
||
|
A Comparison of Post-Processing Techniques for Biased Random Number Generators5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.175-190, ⟨10.1007/978-3-642-21040-2_12⟩
Conference papers
hal-01573305v1
|
||
|
On Measurement of Internal Variables of Complex Self-Organized Systems and Their Relation to Multifractal Spectra6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.36-47, ⟨10.1007/978-3-642-28583-7_4⟩
Conference papers
hal-01527539v1
|
||
|
Concise Server-Wide Causality Management for Eventually Consistent Data Stores15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.66-79, ⟨10.1007/978-3-319-19129-4_6⟩
Conference papers
hal-01775033v1
|
||
|
The Entropy of a Rapid Aimed Movement: Fitts’ Index of Difficulty versus Shannon’s Entropy13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.222-239, ⟨10.1007/978-3-642-23768-3_19⟩
Conference papers
hal-01596980v1
|
||
|
Split-and-merge Tweak in Cross Entropy Clustering16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.193-204, ⟨10.1007/978-3-319-59105-6_17⟩
Conference papers
hal-01656257v1
|
||
|
Hard Core via PCA: Entropy Bounds21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.85-98, ⟨10.1007/978-3-662-47221-7_7⟩
Conference papers
hal-01442484v1
|
||
|
Information-Entropy-Based DNS Tunnel Prediction14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.127-140, ⟨10.1007/978-3-319-99277-8_8⟩
Conference papers
hal-01988835v1
|
||
|
Flow-Based Security Issue Detection in Building Automation and Control Networks18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.64-75, ⟨10.1007/978-3-642-32808-4_7⟩
Conference papers
hal-01543173v1
|
||
|
A New Approach for Detecting SMTPFA Based on Entropy Measurement9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.349-359, ⟨10.1007/978-3-642-35606-3_41⟩
Conference papers
hal-01551369v1
|