Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 3
- 6
- 1
- 1
- 1
- 4
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Study of RPL DODAG Version Attacks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers
hal-01090993v1
|
||
|
Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.100-111, ⟨10.1007/978-3-642-21484-4_13⟩
Conference papers
hal-01585867v1
|
||
|
Adaptive Underwater Acoustic Communications4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.98-101, ⟨10.1007/978-3-642-13986-4_13⟩
Conference papers
hal-01056643v1
|
||
|
Understanding the Impact of Network Infrastructure Changes Using Large-Scale Measurement Platforms7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.41-44, ⟨10.1007/978-3-642-38998-6_5⟩
Conference papers
hal-01489968v1
|
||
|
Implementation of a Stream-Based IP Flow Record Query Language4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.147-158, ⟨10.1007/978-3-642-13986-4_21⟩
Conference papers
hal-01056634v1
|
||
|
Cybermetrics: User Identification through Network Flow Analysis4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.167-170, ⟨10.1007/978-3-642-13986-4_24⟩
Conference papers
hal-01056631v1
|