Filter your results
- 14
- 2
- 14
- 2
- 16
- 1
- 2
- 1
- 2
- 2
- 2
- 4
- 2
- 16
- 16
- 22
- 22
- 15
- 15
- 14
- 11
- 11
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
16 results
|
|
sorted by
|
|
A Study of RPL DODAG Version Attacks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers
hal-01090993v1
|
||
|
Econometric Feedback for Runtime Risk Management in VoIP Architectures5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.26-37, ⟨10.1007/978-3-642-21484-4_3⟩
Conference papers
hal-00747274v1
|
||
|
Cache Management Strategy for CCN based on Content Popularity7th International Conference on Autonomous Infrastructure (AIMS), IFIP, Jun 2013, Barcelonne, Spain. pp.92-95, ⟨10.1007/978-3-642-38998-6_12⟩
Conference papers
hal-00929736v1
|
||
|
Towards a Software-Defined Security Framework for Supporting Distributed CloudAIMS 2017 - 11th IFIP International Conference on Autonomous Infrastructure, Management and Security, Jul 2017, Zurich, Switzerland. pp.47-61, ⟨10.1007/978-3-319-60774-0_4⟩
Conference papers
hal-01806058v1
|
||
|
Labeled VoIP Data-set for Intrusion Detection EvaluationEUNICE 2010, Jun 2010, Trondheim, Norway. pp.97-106
Conference papers
inria-00497735v1
|
||
|
Outsourcing Mobile Security in the Cloud8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers
hal-01092239v1
|
||
|
Exploring IoT Protocols Through the Information-Centric Networking's Lens9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.56-60, ⟨10.1007/978-3-319-20034-7_6⟩
Conference papers
hal-01251165v1
|
||
|
Applying a Dependency Mechanism for Voting Protocol Models Using Event-B37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2017), Jun 2017, Neuchâtel, Switzerland. pp.124-138, ⟨10.1007/978-3-319-60225-7_9⟩
Conference papers
hal-01658423v1
|
||
|
Managing the Dynamics of Networks and ServicesSpringer, LNCS-6734, 2011, Lecture Notes in Computer Science, 978-3-642-21483-7. ⟨10.1007/978-3-642-21484-4⟩
Books
inria-00628157v1
|
||
|
An Autonomic Testing Framework for IPv6 Configuration Protocols4th International Conference on Autonomous Infrastructure, Management and Security - AIMS 2010, University of Zurich, Jun 2010, Zurich, Switzerland. pp.65-76, ⟨10.1007/978-3-642-13986-4_7⟩
Conference papers
inria-00546171v1
|
||
|
Towards Multi-layered Temporal Models: A Proposal to Integrate Instant Refinement in CCSL41th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2021), Jun 2021, Valletta, Malta. pp.120-137, ⟨10.1007/978-3-030-78089-0_7⟩
Conference papers
hal-03740259v1
|
||
|
Towards Vulnerability Prevention in Autonomic Networks and Systems5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.65-68, ⟨10.1007/978-3-642-21484-4_9⟩
Conference papers
hal-00580315v1
|
||
|
Analysis and Evaluation of OpenFlow Message Usage for Security Applications10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.84-97, ⟨10.1007/978-3-319-39814-3_9⟩
Conference papers
hal-01632745v1
|
||
|
Monitoring and Security for the Internet of Things7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.37-40, ⟨10.1007/978-3-642-38998-6_4⟩
Conference papers
hal-00876216v1
|
||
|
Intelligent Mechanisms for Network Configuration and SecuritySteven Latré; Marinos Charalambides; Jérôme François; Corinna Schmitt; Burkhard Stiller. Springer, LNCS-9122, 2015, Intelligent Mechanisms for Network Configuration and Security, 978-3-319-20034-7. ⟨10.1007/978-3-319-20034-7⟩
Books
hal-01244586v1
|
||
|
Towards Verification of the Pastry Protocol Using TLA +13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik, Iceland. pp.244-258, ⟨10.1007/978-3-642-21461-5_16⟩
Conference papers
hal-01583322v1
|