Filter your results
- 8
- 8
- 8
- 1
- 1
- 4
- 1
- 2
- 8
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.91-104, ⟨10.1007/978-3-319-33630-5_7⟩
Conference papers
hal-01369545v1
|
||
|
An Interference-Free Programming Model for Network Objects18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.227-244, ⟨10.1007/978-3-319-39519-7_14⟩
Conference papers
hal-01631712v1
|
||
|
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.299-311, ⟨10.1007/978-3-319-95729-6_19⟩
Conference papers
hal-01954414v1
|
||
|
A Comparative Study of Pointing Techniques for Eyewear Using a Simulated Pedestrian Environment17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.625-646, ⟨10.31219/osf.io/ktuy4⟩
Conference papers
hal-02272539v1
|
||
|
A Multitouch Drawing Application with Occlusion-Free Interaction Strategies17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.535-539, ⟨10.1007/978-3-030-29390-1_32⟩
Conference papers
hal-02877646v1
|
||
|
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers
hal-03744302v1
|
||
|
Investigating Feedback for Two-Handed Exploration of Digital Maps Without Vision17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.305-324, ⟨10.1007/978-3-030-29381-9_19⟩
Conference papers
hal-02544543v1
|
||
|
A Template-Based Method for the Generation of Attack Trees13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers
hal-03173899v1
|