Filter your results
- 21
- 21
- 21
- 1
- 1
- 2
- 2
- 3
- 7
- 1
- 5
- 21
- 7
- 14
- 98
- 78
- 75
- 65
- 59
- 51
- 49
- 47
- 43
- 42
- 40
- 40
- 38
- 35
- 33
- 33
- 33
- 31
- 29
- 29
- 29
- 29
- 28
- 28
- 27
- 26
- 25
- 25
- 25
- 23
- 23
- 22
- 22
- 21
- 21
- 21
- 21
- 20
- 20
- 20
- 20
- 19
- 19
- 19
- 18
- 18
- 18
- 17
- 17
- 17
- 17
- 17
- 16
- 16
- 16
- 15
- 15
- 15
- 15
- 15
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 13
- 13
- 13
- 13
- 13
- 13
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 11
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
21 results
|
|
sorted by
|
|
Augmenting Reputation-based Trust Metrics with Rumor-like Dissemination of Reputation Information25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.136-147, ⟨10.1007/978-3-642-15257-3_13⟩
Conference papers
hal-01054521v1
|
||
|
The Role of Internal and External Sources of Knowledge in the Product Lifecycle in Biotechnology Sector9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.46-57, ⟨10.1007/978-3-642-35758-9_5⟩
Conference papers
hal-01526129v1
|
||
|
Design and Analysis of a Generalized Canvas Protocol4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.106-121, ⟨10.1007/978-3-642-12368-9_8⟩
Conference papers
hal-01056063v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
On Understanding Permission Usage Contextuality in Android Apps32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.232-242, ⟨10.1007/978-3-319-95729-6_15⟩
Conference papers
hal-01954415v1
|
||
|
All I Need to Know about Twitter in Education I Learned in KindergartenIFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.322-332, ⟨10.1007/978-3-642-15378-5_31⟩
Conference papers
hal-01054688v1
|
||
|
Dataflow Testing of Java Programs with DFC4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.215-228, ⟨10.1007/978-3-642-28038-2_17⟩
Conference papers
hal-01527388v1
|
||
|
Exploring State Machine CECA Model19th International TRIZ Future Conference (TFC), Oct 2019, Marrakesh, Morocco. pp.388-399, ⟨10.1007/978-3-030-32497-1_31⟩
Conference papers
hal-02905561v1
|
||
|
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers
hal-03243631v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|
||
|
The Role of Product Lifecycle Management Systems in Organizational Innovation9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.322-331, ⟨10.1007/978-3-642-35758-9_28⟩
Conference papers
hal-01526157v1
|
||
|
Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.358-366, ⟨10.1007/978-3-642-40925-7_33⟩
Conference papers
hal-01496082v1
|
||
|
Online Requirements and Portal Design for Female University Science and Technology Students in Kenya14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.403-410, ⟨10.1007/978-3-642-40498-6_31⟩
Conference papers
hal-01510497v1
|
||
|
Object-Oriented Testing Capabilities and Performance Evaluation of the C# Mutation System4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.229-242, ⟨10.1007/978-3-642-28038-2_18⟩
Conference papers
hal-01527392v1
|
||
|
Dynamic Resources Allocation for Delivery of Personalized Services10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society (I3E), Nov 2010, Buenos Aires, Argentina. pp.17-28, ⟨10.1007/978-3-642-16283-1_6⟩
Conference papers
hal-01055004v1
|
||
|
Surrogate Modelling of Solutions of Integral Equations by Neural Networks8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.88-96, ⟨10.1007/978-3-642-33409-2_10⟩
Conference papers
hal-01521408v1
|
||
|
Personalisation in Service-Oriented Systems Using Markov Chain Model and Bayesian Inference2nd Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Feb 2011, Costa de Caparica, Portugal. pp.91-98, ⟨10.1007/978-3-642-19170-1_10⟩
Conference papers
hal-01566550v1
|
||
|
Query Processing Using Negative and Temporal Tuples in Stream Query Engines4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.70-83, ⟨10.1007/978-3-642-28038-2_6⟩
Conference papers
hal-01527387v1
|
||
|
Traffic Measurement and Analysis of Building Automation and Control Networks6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.62-73, ⟨10.1007/978-3-642-30633-4_9⟩
Conference papers
hal-01529790v1
|
||
|
ViSE - A Virtual Smart Environment for Usability EvaluationThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.38-45, ⟨10.1007/978-3-642-16488-0_4⟩
Conference papers
hal-01055197v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|