Filter your results
- 6
- 5
- 6
- 4
- 1
- 11
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 2
- 1
- 11
- 1
- 1
- 1
- 1
- 1
- 11
- 6
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books
hal-03414737v1
|
|||
|
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems)Advancing Research in Information and Communication Technology, AICT-600, pp.333-360, 2021, ⟨10.1007/978-3-030-81701-5_14⟩
Book sections
hal-03325992v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books
hal-02520036v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books
hal-02060052v1
|
||
|
USBlock: Blocking USB-Based Keypress Injection Attacks32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.278-295, ⟨10.1007/978-3-319-95729-6_18⟩
Conference papers
hal-01954405v1
|
||
|
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers
hal-01768504v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-10410, 2017, Lecture Notes in Computer Science, 978-3-319-66807-9. ⟨10.1007/978-3-319-66808-6⟩
Books
hal-01677131v1
|
||
|
Availability, Reliability, and Security in Information SystemsSpringer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books
hal-01635010v1
|
||
|
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.286-299, ⟨10.1007/978-3-642-39218-4_22⟩
Conference papers
hal-01463833v1
|
||
|
Availability, Reliability, and Security in Information SystemsStephanie Teufel; Tjoa A Min; IlsunYou; EdgarWeippl. Springer, LNCS-8708, 2014, Lecture Notes in Computer Science, 978-3-319-10974-9. ⟨10.1007/978-3-319-10975-6⟩
Books
hal-01404011v1
|
||
|
Using Model Driven Security Approaches in Web Application Development2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers
hal-01397248v1
|