Search - IFIP Open Digital Library Access content directly

Filter your results

4 results
Structure: Internal structure identifier : 303306
publicationDateY_i : 2012
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

Hybrid Negative Selection Approach for Anomaly Detection

Andrzej Chmielewski , Sławomir T. Wierzchoń
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers hal-01551730v1
Image document

Spectral Clustering Based on k-Nearest Neighbor Graph

Małgorzata Lucińska , Sławomir T. Wierzchoń
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.254-265, ⟨10.1007/978-3-642-33260-9_22⟩
Conference papers hal-01551732v1

Computer Information Systems and Industrial Management

Agostino Cortesi , Nabendu Chaki , Khalid Saeed , Sławomir Wierzchoń
Springer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books hal-01551708v1