Filter your results
- 5
- 5
- 5
- 1
- 2
- 1
- 1
- 5
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Making Flow-Based Security Detection Parallel11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.3-15, ⟨10.1007/978-3-319-60774-0_1⟩
Conference papers
hal-01806062v1
|
||
|
Hunting SIP Authentication Attacks Efficiently11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.125-130, ⟨10.1007/978-3-319-60774-0_9⟩
Conference papers
hal-01806064v1
|
||
|
Analysis of Vertical Scans Discovered by Naive Detection10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.165-169, ⟨10.1007/978-3-319-39814-3_19⟩
Conference papers
hal-01632742v1
|
||
|
Refined Detection of SSH Brute-Force Attackers Using Machine Learning35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.49-63, ⟨10.1007/978-3-030-58201-2_4⟩
Conference papers
hal-03440815v1
|
||
|
Using Application-Aware Flow Monitoring for SIP Fraud Detection9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.87-99, ⟨10.1007/978-3-319-20034-7_10⟩
Conference papers
hal-01410154v1
|