Filter your results
- 3
- 3
- 3
- 3
- 5
- 1
- 6
- 2
- 1
- 8
- 4
- 2
- 3
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers
hal-01056380v1
|
||
|
Click or Strike: Realistic versus Standard Game Controls in Violent Video Games and Their Effects on Aggression9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.171-182, ⟨10.1007/978-3-642-15399-0_16⟩
Conference papers
hal-01055645v1
|
||
|
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers
hal-01056387v1
|