Filter your results
- 28
- 6
- 27
- 6
- 1
- 34
- 6
- 1
- 4
- 4
- 4
- 6
- 6
- 2
- 2
- 2
- 2
- 1
- 34
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 9
- 7
- 7
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Explainable AI: the new 42?2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.295-303, ⟨10.1007/978-3-319-99740-7_21⟩
Conference papers
hal-01934928v1
|
||
|
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.179-194, ⟨10.1007/978-3-319-24123-4_11⟩
Conference papers
hal-01449058v1
|
||
|
Who On Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.80-89, ⟨10.1007/978-3-642-15257-3_8⟩
Conference papers
hal-01054574v1
|
||
|
Automated Analysis of Underground Marketplaces10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.31-42, ⟨10.1007/978-3-662-44952-3_3⟩
Conference papers
hal-01393757v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books
hal-02060052v1
|
||
|
Testing TLS Using Combinatorial Methods and Execution Framework29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.162-177, ⟨10.1007/978-3-319-67549-7_10⟩
Conference papers
hal-01678990v1
|
||
|
The More the Merrier - Federated Learning from Local Sphere Recommendations1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.367-373, ⟨10.1007/978-3-319-66808-6_24⟩
Conference papers
hal-01677145v1
|
||
|
Backdoor Attacks in Neural Networks – A Systematic Evaluation on Multiple Traffic Sign Datasets3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.285-300, ⟨10.1007/978-3-030-29726-8_18⟩
Conference papers
hal-02520034v1
|
||
|
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.401-415, ⟨10.1007/978-3-030-58201-2_27⟩
Conference papers
hal-03440847v1
|
||
|
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.286-299, ⟨10.1007/978-3-642-39218-4_22⟩
Conference papers
hal-01463833v1
|
||
|
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.234-247, ⟨10.1007/978-3-030-58201-2_16⟩
Conference papers
hal-03440850v1
|
||
|
Set-Based Algorithms for Combinatorial Test Set Generation28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.231-240, ⟨10.1007/978-3-319-47443-4_16⟩
Conference papers
hal-01643730v1
|
||
|
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers
hal-01768504v1
|
||
|
USBlock: Blocking USB-Based Keypress Injection Attacks32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.278-295, ⟨10.1007/978-3-319-95729-6_18⟩
Conference papers
hal-01954405v1
|
||
|
Towards Fully Automated Digital Alibis with Social Interaction10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers
hal-01393786v1
|
||
|
Availability, Reliability, and Security in Information SystemsSpringer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books
hal-01635010v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books
hal-02520036v1
|
||
|
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems)Advancing Research in Information and Communication Technology, AICT-600, pp.333-360, 2021, ⟨10.1007/978-3-030-81701-5_14⟩
Book sections
hal-03325992v1
|
||
|
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers
hal-01633686v1
|
||
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books
hal-03414737v1
|
|||
|
Multidisciplinary Research and Practice for Information SystemsSpringer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books
hal-01542459v1
|
||
|
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.1-8, ⟨10.1007/978-3-319-99740-7_1⟩
Conference papers
hal-02060058v1
|
||
|
Privacy-Preserving Anomaly Detection Using Synthetic Data34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.195-207, ⟨10.1007/978-3-030-49669-2_11⟩
Conference papers
hal-03243628v1
|
||
|
A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.70-85, ⟨10.1007/978-3-319-47443-4_5⟩
Conference papers
hal-01643723v1
|
||
|
DO NOT DISTURB? Classifier Behavior on Perturbed Datasets1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.155-173, ⟨10.1007/978-3-319-66808-6_11⟩
Conference papers
hal-01677128v1
|
||
|
Machine Learning and Knowledge ExtractionSpringer International Publishing, LNCS-10410, 2017, Lecture Notes in Computer Science, 978-3-319-66807-9. ⟨10.1007/978-3-319-66808-6⟩
Books
hal-01677131v1
|
||
|
An HMM-Based Anomaly Detection Approach for SCADA Systems10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.85-99, ⟨10.1007/978-3-319-45931-8_6⟩
Conference papers
hal-01639609v1
|
||
|
Turning Active TLS Scanning to Eleven32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.3-16, ⟨10.1007/978-3-319-58469-0_1⟩
Conference papers
hal-01649020v1
|
||
|
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge BasesInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.251-266, ⟨10.1007/978-3-319-45507-5_17⟩
Conference papers
hal-01635002v1
|
||
|
Online Ad-fraud in Search Engine Advertising Campaigns3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.109-118, ⟨10.1007/978-3-319-24315-3_11⟩
Conference papers
hal-01466210v1
|
- 1
- 2