Search - IFIP Open Digital Library Access content directly

Filter your results

8 results
Structure: Internal structure identifier : 254148
Image document

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System

Sridhar Adepu , Aditya Mathur
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.91-104, ⟨10.1007/978-3-319-33630-5_7⟩
Conference papers hal-01369545v1
Image document

A Comparative Study of Pointing Techniques for Eyewear Using a Simulated Pedestrian Environment

Quentin Roy , Camelia Zakaria , Simon Perrault , Mathieu Nancel , Wonjung Kim , et al.
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.625-646, ⟨10.31219/osf.io/ktuy4⟩
Conference papers hal-02272539v1
Image document

A Multitouch Drawing Application with Occlusion-Free Interaction Strategies

Yi Ren Tan , Hyowon Lee , Insuk Ko , Dongliang Zhang , Chunxiao Li
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.535-539, ⟨10.1007/978-3-030-29390-1_32⟩
Conference papers hal-02877646v1
Image document

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications

Weizhi Meng , Wenjuan Li , Lijun Jiang , Jianying Zhou
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers hal-03744302v1
Image document

Virtually Isolated Network: A Hybrid Network to Achieve High Level Security

Jia Xu , Jianying Zhou
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.299-311, ⟨10.1007/978-3-319-95729-6_19⟩
Conference papers hal-01954414v1
Image document

Investigating Feedback for Two-Handed Exploration of Digital Maps Without Vision

Sandra Bardot , Marcos Serrano , Simon Perrault , Shengdong Zhao , Christophe Jouffrais
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.305-324, ⟨10.1007/978-3-030-29381-9_19⟩
Conference papers hal-02544543v1
Image document

A Template-Based Method for the Generation of Attack Trees

Jeremy Bryans , Lin Shen Liew , Hoang Nga Nguyen , Giedre Sabaliauskaite , Siraj Shaikh , et al.
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers hal-03173899v1
Image document

An Interference-Free Programming Model for Network Objects

Bertrand Meyer , Mischael Schill , Christopher M. Poskitt
18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.227-244, ⟨10.1007/978-3-319-39519-7_14⟩
Conference papers hal-01631712v1