Filter your results
- 9
- 6
- 9
- 6
- 15
- 1
- 1
- 1
- 2
- 2
- 3
- 2
- 2
- 2
- 15
- 1
- 1
- 1
- 1
- 1
- 8
- 6
- 6
- 4
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Availability, Reliability, and Security in Information SystemsStephanie Teufel; Tjoa A Min; IlsunYou; EdgarWeippl. Springer, LNCS-8708, 2014, Lecture Notes in Computer Science, 978-3-319-10974-9. ⟨10.1007/978-3-319-10975-6⟩
Books
hal-01404011v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books
hal-02060052v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books
hal-02520036v1
|
||
|
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers
hal-01056386v1
|
||
|
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.286-299, ⟨10.1007/978-3-642-39218-4_22⟩
Conference papers
hal-01463833v1
|
||
|
Towards Fully Automated Digital Alibis with Social Interaction10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers
hal-01393786v1
|
||
|
Availability, Reliability, and Security in Information SystemsSpringer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books
hal-01635010v1
|
||
|
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers
hal-01633686v1
|
||
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books
hal-03414737v1
|
|||
|
Multidisciplinary Research and Practice for Information SystemsSpringer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books
hal-01542459v1
|
||
|
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.1-8, ⟨10.1007/978-3-319-99740-7_1⟩
Conference papers
hal-02060058v1
|
||
|
Tor HTTP Usage and Information Leakage11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.245-255, ⟨10.1007/978-3-642-13241-4_22⟩
Conference papers
hal-01056375v1
|
||
|
Data Visualization for Social Network Forensics8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.115-126, ⟨10.1007/978-3-642-33962-2_8⟩
Conference papers
hal-01523701v1
|
||
|
Quantifying Windows File Slack Size and Stability9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.183-193, ⟨10.1007/978-3-642-41148-9_13⟩
Conference papers
hal-01460605v1
|
||
|
Automated Analysis of Underground Marketplaces10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.31-42, ⟨10.1007/978-3-662-44952-3_3⟩
Conference papers
hal-01393757v1
|