Filter your results
- 11
- 3
- 11
- 3
- 14
- 1
- 2
- 3
- 2
- 3
- 2
- 1
- 14
- 2
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Designing a Decision-Support Visualization for Live Digital Forensic Investigations34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.223-240, ⟨10.1007/978-3-030-49669-2_13⟩
Conference papers
hal-03243642v1
|
||
|
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.165-179, ⟨10.1007/978-3-030-22312-0_12⟩
Conference papers
hal-03744316v1
|
||
|
A Structured Comparison of the Corporate Information Security Maturity Level34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.223-237, ⟨10.1007/978-3-030-22312-0_16⟩
Conference papers
hal-03744289v1
|
||
Open Problems in Network SecurityINETSEC-2017, 2017, Open Problems in Network Security
Books
hal-01666537v1
|
|||
|
Reputation-Enhanced Recommender Systems11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.163-179, ⟨10.1007/978-3-319-59171-1_13⟩
Conference papers
hal-01651165v1
|
||
|
A Comprehensive Decision Support System for Enhanced Emergency Decision Management and Training1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.183-197, ⟨10.1007/978-3-319-68486-4_15⟩
Conference papers
hal-03213118v1
|
||
|
Intrusion Detection in the Smart Grid Based on an Analogue TechniqueInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.56-67, ⟨10.1007/978-3-319-39028-4_5⟩
Conference papers
hal-01445793v1
|
||
|
Open Problems in Network SecuritySpringer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books
hal-01445799v1
|
||
|
Personalized Composition of Trustful Reputation Systems29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.207-214, ⟨10.1007/978-3-319-20810-7_13⟩
Conference papers
hal-01745829v1
|
||
|
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.35-50, ⟨10.1007/978-3-319-18467-8_3⟩
Conference papers
hal-01345094v1
|
||
|
Reusable Defense Components for Online Reputation Systems9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.195-202, ⟨10.1007/978-3-319-18491-3_15⟩
Conference papers
hal-01416226v1
|
||
|
Data and Applications Security and Privacy XXVIIISpringer, Lecture Notes in Computer Science (LNCS-8566), 2014, 978-3-662-45501-2. ⟨10.1007/978-3-662-43936-4⟩
Books
hal-01285073v1
|
||
|
Reusability for Trust and Reputation Systems8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.28-43, ⟨10.1007/978-3-662-43813-8_3⟩
Conference papers
hal-01381675v1
|
||
|
The CAI-NPD-Systems Maturity Model as Forecasting Method: From Closed CAI 1.0 to Holistic CAI 2.0 Solutions4th Computer-Aided Innovation (CAI), Jun 2011, Strasbourg, France. pp.29-42, ⟨10.1007/978-3-642-22182-8_4⟩
Conference papers
hal-01567776v1
|