Filter your results
- 20
- 2
- 20
- 2
- 22
- 2
- 1
- 1
- 2
- 1
- 3
- 2
- 1
- 4
- 2
- 3
- 2
- 22
- 7
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers
hal-01284843v1
|
||
|
Structured Digital Storytelling for Eliciting Software Requirements in the ICT4D DomainSecond IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.58-69, ⟨10.1007/978-3-642-15231-3_7⟩
Conference papers
hal-01055460v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers
hal-01633677v1
|
||
|
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.341-355, ⟨10.1007/978-3-319-58469-0_23⟩
Conference papers
hal-01648996v1
|
||
|
The Role of Internal and External Sources of Knowledge in the Product Lifecycle in Biotechnology Sector9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.46-57, ⟨10.1007/978-3-642-35758-9_5⟩
Conference papers
hal-01526129v1
|
||
|
On Understanding Permission Usage Contextuality in Android Apps32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.232-242, ⟨10.1007/978-3-319-95729-6_15⟩
Conference papers
hal-01954415v1
|
||
|
Data and Applications Security and Privacy XXVIISpringer, LNCS-7964, 2013, Lecture Notes in Computer Science, 978-3-642-39255-9. ⟨10.1007/978-3-642-39256-6⟩
Books
hal-01490722v1
|
||
|
Computational Intelligence and Its ApplicationsSpringer International Publishing, AICT-522, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-89742-4. ⟨10.1007/978-3-319-89743-1⟩
Books
hal-01913869v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
Methods for Live Testing of Cloud Services32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.201-216, ⟨10.1007/978-3-030-64881-7_13⟩
Conference papers
hal-03239818v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers
hal-01684351v1
|
||
|
An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.296-305, ⟨10.1007/978-3-642-55032-4_29⟩
Conference papers
hal-01397226v1
|
||
|
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers
hal-03243631v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|
||
|
Towards an Integrated Model for Functional and User Interface RequirementsThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.214-221, ⟨10.1007/978-3-642-16488-0_19⟩
Conference papers
hal-01055201v1
|
||
|
The Role of Product Lifecycle Management Systems in Organizational Innovation9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.322-331, ⟨10.1007/978-3-642-35758-9_28⟩
Conference papers
hal-01526157v1
|
||
|
Online Learning for Two Novel Latent Topic Models2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.286-295, ⟨10.1007/978-3-642-55032-4_28⟩
Conference papers
hal-01397223v1
|
||
|
Design of a Reconfigurable Optical Computing Architecture Using Phase Change Material29th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2021, Singapore, Singapore. pp.155-174, ⟨10.1007/978-3-031-16818-5_8⟩
Conference papers
hal-04419567v1
|
||
|
Security auditing of internet of things devices in a smart home17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.213-234, ⟨10.1007/978-3-030-88381-2_11⟩
Conference papers
hal-03764368v1
|
||
|
A Context-Aware Multi-Agent Systems Architecture for Adaptation of Autonomic Systems7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.387-397, ⟨10.1007/978-3-642-32891-6_48⟩
Conference papers
hal-01524968v1
|