Filter your results
- 33
- 33
- 32
- 11
- 1
- 5
- 2
- 2
- 2
- 2
- 2
- 1
- 5
- 5
- 3
- 4
- 33
- 5
- 2
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Model for Vendor Selection and Dynamic EvaluationInternational Conference on Advances in Production and Management Systems (APMS), Sep 2009, Paris, France. pp.283-290, ⟨10.1007/978-3-642-16358-6_36⟩
Conference papers
hal-01055843v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.89-103, ⟨10.1007/978-3-030-64881-7_6⟩
Conference papers
hal-03239821v1
|
||
|
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.3-17, ⟨10.1007/978-3-319-99828-2_1⟩
Conference papers
hal-02023727v1
|
||
|
Interplay of Requirements Engineering and Human Computer Interaction Approaches in the Evolution of a Mobile Agriculture Information System1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.135-159, ⟨10.1007/978-3-319-45916-5_9⟩
Conference papers
hal-01631310v1
|
||
|
New Steganographic Techniques for the OOXML File Format1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.344-358, ⟨10.1007/978-3-642-23300-5_27⟩
Conference papers
hal-01590389v1
|
||
|
On the Security of a Two-Factor Authentication Scheme4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.245-252, ⟨10.1007/978-3-642-12368-9_19⟩
Conference papers
hal-01056082v1
|
||
|
Automated Construction of a False Digital Alibi1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.359-373, ⟨10.1007/978-3-642-23300-5_28⟩
Conference papers
hal-01590408v1
|
||
|
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.135-149, ⟨10.1007/978-3-030-64881-7_9⟩
Conference papers
hal-03239830v1
|
||
|
Proxy Smart Card Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.213-220, ⟨10.1007/978-3-642-12368-9_15⟩
Conference papers
hal-01056085v1
|
||
|
Network Profiling: Content Analysis of Users Behavior in Digital Communication ChannelInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.416-429, ⟨10.1007/978-3-642-32498-7_31⟩
Conference papers
hal-01542442v1
|
||
|
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.414-429
Conference papers
hal-01506692v1
|
||
|
2nd International Workshop on Empowering People in Dealing with Internet of Things Ecosystems (EMPATHY)18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.525-529, ⟨10.1007/978-3-030-85607-6_71⟩
Conference papers
hal-04291212v1
|
||
|
Sustainable maintenance performances and EN 15341:2019: An integration proposalIFIP International Conference on Advances in Production Management Systems, APMS 2021, Sep 2021, Nantes, France. pp.401-409, ⟨10.1007/978-3-030-85910-7_42⟩
Conference papers
hal-03475752v1
|
||
|
The Effect of Hardware/Software Features on the Performance of an Open–Source Network Emulator17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.233-245, ⟨10.1007/978-3-030-30523-9_19⟩
Conference papers
hal-02881748v1
|
||
|
Infinite Two-Dimensional Strong Prefix Codes: Characterization and Properties23th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2017, Milan, Italy. pp.19-31, ⟨10.1007/978-3-319-58631-1_2⟩
Conference papers
hal-01656353v1
|
||
|
Analyzing the Internet Stability in Presence of Disasters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.253-268
Conference papers
hal-01506694v1
|
||
|
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.643-652, ⟨10.1007/978-3-642-55032-4_66⟩
Conference papers
hal-01397282v1
|
||
|
Orchestrated Co-creation of High-Quality Open Data Within Large Groups18th International Conference on Electronic Government (EGOV), Sep 2019, San Benedetto del Tronto, Italy. pp.168-179, ⟨10.1007/978-3-030-27325-5_13⟩
Conference papers
hal-02445793v1
|
||
|
WISE Workshops : Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements ; Reimaging Inclusive Pedagogy in Cybersecurity Education (A Workshop Proposal)14th IFIP World Conference on Information Security Education (WISE), Jun 2021, Virtual, United States. pp.143-149, ⟨10.1007/978-3-030-80865-5⟩
Conference papers
hal-03742000v1
|
||
|
Supporting Interaction in a Virtual Chorus: Results from a Focus Group18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.722-730, ⟨10.1007/978-3-030-85623-6_41⟩
Conference papers
hal-04331784v1
|
||
|
Avoiding Overlaps in Pictures19th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2017, Milano, Italy. pp.16-32, ⟨10.1007/978-3-319-60252-3_2⟩
Conference papers
hal-01657001v1
|
||
|
A Review of Security Attacks on the GSM Standard1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers
hal-01480210v1
|
||
|
A Secure Distributed Video Surveillance System Based on Portable DevicesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.403-415, ⟨10.1007/978-3-642-32498-7_30⟩
Conference papers
hal-01542458v1
|
||
|
How to Quantify Trust in Your Network Emulator?International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.171-182, ⟨10.1007/978-3-030-02931-9_14⟩
Conference papers
hal-02269739v1
|
||
|
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive MapsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.501-515, ⟨10.1007/978-3-642-32498-7_38⟩
Conference papers
hal-01542464v1
|
||
|
Increasing Project Control and Guidance through a Time-frame Simulation ApproachInternational Conference on Advances in Production and Management Systems (APMS), Sep 2009, Paris, France. pp.417-424, ⟨10.1007/978-3-642-16358-6_52⟩
Conference papers
hal-01060461v1
|
||
|
TactCube: Designing Mobile Interactions with Ambient Intelligence18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.599-609, ⟨10.1007/978-3-030-85610-6_34⟩
Conference papers
hal-04215511v1
|
||
|
«Omnia Numerorum Videntur Ratione Formata». A ‘Computable World’ Theory in Early Medieval Philosophy3rd International Conference on History and Philosophy of Computing (HaPoC), Oct 2015, Pisa, Italy. pp.131-140, ⟨10.1007/978-3-319-47286-7_9⟩
Conference papers
hal-01615295v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|
- 1
- 2