Filter your results
- 51
- 51
- 51
- 8
- 20
- 51
- 4
- 46
- 66
- 52
- 42
- 39
- 59
- 64
- 98
- 63
- 71
- 36
- 51
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.137-154, ⟨10.1007/978-3-319-66808-6_10⟩
Conference papers
hal-01677144v1
|
||
|
Evaluating a Multi Agency Cyber Security Training Program Using Pre-post Event Assessment and Longitudinal Analysis10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.147-156, ⟨10.1007/978-3-319-58553-6_13⟩
Conference papers
hal-01690964v1
|
||
|
Secure Cloud Micro Services Using Intel SGX17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.177-191, ⟨10.1007/978-3-319-59665-5_13⟩
Conference papers
hal-01800126v1
|
||
|
RiskInDroid: Machine Learning-Based Risk Analysis on Android32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.538-552, ⟨10.1007/978-3-319-58469-0_36⟩
Conference papers
hal-01648990v1
|
||
|
Modeling Less-Literate User’s Choices of Smartphone Authentication Modes16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.496-500, ⟨10.1007/978-3-319-68059-0_59⟩
Conference papers
hal-01679776v1
|
||
|
Assessment of Ancillary Service Demand Response and Time of Use in a Market-Based Power System Through a Stochastic Security Constrained Unit Commitment8th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), May 2017, Costa de Caparica, Portugal. pp.233-241, ⟨10.1007/978-3-319-56077-9_22⟩
Conference papers
hal-01629577v1
|
||
|
On the Use of Emojis in Mobile Authentication32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.265-280, ⟨10.1007/978-3-319-58469-0_18⟩
Conference papers
hal-01649025v1
|
||
|
Introducing Mobile Network Security Experiments to Communication Technology Education10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.74-83, ⟨10.1007/978-3-319-58553-6_7⟩
Conference papers
hal-01690971v1
|
||
|
Testing TLS Using Combinatorial Methods and Execution Framework29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.162-177, ⟨10.1007/978-3-319-67549-7_10⟩
Conference papers
hal-01678990v1
|
||
|
Challenges to automating security configuration checklists in manufacturing environments11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.225-241, ⟨10.1007/978-3-319-70395-4_12⟩
Conference papers
hal-01819144v1
|
||
|
A Malware-Tolerant, Self-Healing Industrial Control System Framework32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.46-60, ⟨10.1007/978-3-319-58469-0_4⟩
Conference papers
hal-01649003v1
|
||
|
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.638-651, ⟨10.1007/978-3-319-59105-6_55⟩
Conference papers
hal-01656248v1
|
||
|
Low-Level Exploitation Mitigation by Diverse Microservices6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.49-56, ⟨10.1007/978-3-319-67262-5_4⟩
Conference papers
hal-01677618v1
|
||
|
Multiple security domain model of a vehicle in an automated platoon11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.81-97, ⟨10.1007/978-3-319-70395-4_5⟩
Conference papers
hal-01819138v1
|
||
|
New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production MachineryIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2017, Hamburg, Germany. pp.391-398, ⟨10.1007/978-3-319-66923-6_46⟩
Conference papers
hal-01666158v1
|
||
|
Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.61-76, ⟨10.1007/978-3-319-68486-4_6⟩
Conference papers
hal-03213130v1
|
||
|
Firewall Policies Provisioning Through SDN in the Cloud31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.293-310, ⟨10.1007/978-3-319-61176-1_16⟩
Conference papers
hal-01684362v1
|
||
|
Coping with Accessibility Challenges for Security - A User Study with Blind Smartphone Users16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.3-22, ⟨10.1007/978-3-319-68059-0_1⟩
Conference papers
hal-01679788v1
|
||
|
Benchmarking Cryptographic Schemes for Securing Public Cloud Storages17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.163-176, ⟨10.1007/978-3-319-59665-5_12⟩
Conference papers
hal-01800117v1
|
||
|
Information Security Risk Management10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-319-70241-4_2⟩
Conference papers
hal-01765266v1
|
||
|
Supporting Privacy by Design Using Privacy Process Patterns32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.491-505, ⟨10.1007/978-3-319-58469-0_33⟩
Conference papers
hal-01648984v1
|
||
|
Using Fraud Patterns for Fraud Risk Assessment of E-services32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.553-567, ⟨10.1007/978-3-319-58469-0_37⟩
Conference papers
hal-01649009v1
|
||
|
Software defined response and network reconfiguration for industrial control systems11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.157-173, ⟨10.1007/978-3-319-70395-4_9⟩
Conference papers
hal-01819135v1
|
||
|
The Challenge of Private IdentificationInternational Workshop on Open Problems in Network Security (iNetSec), May 2017, Rome, Italy. pp.39-53
Conference papers
hal-01684219v1
|
||
|
The “Secure Exam Environment”: E-Testing with Students’ Own Devices11th IFIP World Conference on Computers in Education (WCCE), Jul 2017, Dublin, Ireland. pp.179-188, ⟨10.1007/978-3-319-74310-3_20⟩
Conference papers
hal-01762856v1
|
||
|
Securing bluetooth low energy locks from unauthorizedaccess and surveillance11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩
Conference papers
hal-01819142v1
|
||
|
A Multimodal Face and Fingerprint Recognition Biometrics System16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.131-140, ⟨10.1007/978-3-319-59105-6_12⟩
Conference papers
hal-01656231v1
|
||
|
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.264-276, ⟨10.1007/978-3-319-59105-6_23⟩
Conference papers
hal-01656239v1
|
||
|
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers
hal-01806063v1
|
||
|
Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.57-75, ⟨10.1007/978-3-319-59171-1_6⟩
Conference papers
hal-01651155v1
|
- 1
- 2