Filter your results
- 11
- 11
- 11
- 2
- 2
- 1
- 1
- 5
- 11
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
11 results
|
|
sorted by
|
|
Towards Learning Normality for Anomaly Detection in Industrial Control Networks7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.61-72, ⟨10.1007/978-3-642-38998-6_8⟩
Conference papers
hal-01489971v1
|
||
|
Analysis of Multi-path Onion Routing-Based Anonymization Networks33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.240-258, ⟨10.1007/978-3-030-22479-0_13⟩
Conference papers
hal-02384590v1
|
||
|
A Concept of a Virtual Research Environment for Long-Term Ecological Projects with Free and Open Source Software9th International Symposium on Environmental Software Systems (ISESS), Jun 2011, Brno, Czech Republic. pp.235-244, ⟨10.1007/978-3-642-22285-6_26⟩
Conference papers
hal-01569246v1
|
||
|
Solving the Talent Scheduling Problem by Parallel Constraint Programming15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.236-244, ⟨10.1007/978-3-030-19823-7_19⟩
Conference papers
hal-02331320v1
|
||
|
The Regularization of CSPs for Rostering, Planning and Resource Management Problems14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.209-218, ⟨10.1007/978-3-319-92007-8_18⟩
Conference papers
hal-01821029v1
|
||
|
An Introduction of FD-Complete Constraints16th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2020, Neos Marmaras, Greece. pp.27-38, ⟨10.1007/978-3-030-49186-4_3⟩
Conference papers
hal-04060688v1
|
||
|
Efficient Distributed Signature Analysis5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.13-25, ⟨10.1007/978-3-642-21484-4_2⟩
Conference papers
hal-01585852v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
|
Using a Commercial Optimisation Tool for Fine Tuning of Parameters of an Eutrophication Model9th International Symposium on Environmental Software Systems (ISESS), Jun 2011, Brno, Czech Republic. pp.618-624, ⟨10.1007/978-3-642-22285-6_66⟩
Conference papers
hal-01569229v1
|
||
|
A New Electronic Path to the Hospital – A Prenatal Observation System11th Conference on e-Business, e-Services, and e-Society (I3E), Oct 2011, Kaunas, Lithuania. pp.245-254, ⟨10.1007/978-3-642-27260-8_20⟩
Conference papers
hal-01560842v1
|
||
|
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.219-233, ⟨10.1007/978-3-030-58201-2_15⟩
Conference papers
hal-03440868v1
|