Filter your results
- 2
- 1
- 2
- 1
- 3
- 3
- 2
- 1
- 4
- 3
- 1
- 3
- 3
- 3
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers
hal-00739604v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
Data and Applications Security and Privacy XXVISpringer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books
hal-01164720v1
|