Filter your results
- 3
- 1
- 4
- 4
- 1
- 1
- 2
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Strategies for Network Resilience: Capitalising on Policies4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.118-122, ⟨10.1007/978-3-642-13986-4_18⟩
Conference papers
hal-01056638v1
|
||
|
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.1-14, ⟨10.1007/978-3-642-55415-5_1⟩
Conference papers
hal-01370349v1
|
||
|
Ex-SDF: an extended service dependency framework for intrusion impact assessment25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers
hal-00565624v1
|
||
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers
hal-01255089v1
|