Filter your results
- 43
- 3
- 43
- 3
- 46
- 1
- 2
- 4
- 4
- 4
- 5
- 2
- 3
- 4
- 7
- 6
- 3
- 2
- 46
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 18
- 13
- 7
- 7
- 5
- 5
- 5
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Consistent Query Plan Generation in Secure Cooperative Data Access28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers
hal-01284858v1
|
||
|
Reducing Security Risks of Clouds Through Virtual Machine Placement31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.275-292, ⟨10.1007/978-3-319-61176-1_15⟩
Conference papers
hal-01684346v1
|
||
|
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers
hal-03657230v1
|
||
|
Creating Integrated Evidence Graphs for Network Forensics9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers
hal-01460608v1
|
||
|
Timely Delivery of Messages in Positive Train Control7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.139-152, ⟨10.1007/978-3-642-45330-4_10⟩
Conference papers
hal-01456882v1
|
||
|
Enhancing the Usability of the Commercial Mobile Alert System5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.137-149, ⟨10.1007/978-3-642-24864-1_10⟩
Conference papers
hal-01571774v1
|
||
|
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers
hal-01534756v1
|
||
|
Optimizing Integrity Checks for Join Queries in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers
hal-01284840v1
|
||
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers
hal-01633677v1
|
||
|
A Digital Media Similarity Measure for Triage of Digital Forensic Evidence16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers
hal-03657240v1
|
||
|
Towards the Detection of Malicious URL and Domain Names Using Machine Learning11th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Jul 2020, Costa de Caparica, Portugal. pp.109-117, ⟨10.1007/978-3-030-45124-0_10⟩
Conference papers
hal-03741567v1
|
||
|
A Framework for Moving Target Defense Quantification32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.124-138, ⟨10.1007/978-3-319-58469-0_9⟩
Conference papers
hal-01648997v1
|
||
|
Evaluation of Temporal Resolution Effect in Remote Sensing Based Crop Phenology Detection Studies5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.135-150, ⟨10.1007/978-3-642-27278-3_16⟩
Conference papers
hal-01360974v1
|
||
|
Real-Time Covert Timing Channel Detection in Networked Virtual Environments9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers
hal-01460611v1
|
- 1
- 2