Filter your results
- 3
- 1
- 3
- 1
- 4
- 3
- 4
- 3
- 1
- 1
- 3
- 2
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
Hybrid Negative Selection Approach for Anomaly Detection11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers
hal-01551730v1
|
||
|
Spectral Clustering Based on k-Nearest Neighbor Graph11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.254-265, ⟨10.1007/978-3-642-33260-9_22⟩
Conference papers
hal-01551732v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books
hal-01551708v1
|