Filter your results
- 5
- 5
- 5
- 2
- 3
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Query Processing in Private Data Outsourcing Using Anonymization23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.138-153, ⟨10.1007/978-3-642-22348-8_12⟩
Conference papers
hal-01586588v1
|
||
|
FAIDECS: Fair Decentralized Event Correlation12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.228-248, ⟨10.1007/978-3-642-25821-3_12⟩
Conference papers
hal-01597762v1
|
||
|
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.281-292, ⟨10.1007/978-3-642-21424-0_23⟩
Conference papers
hal-01567600v1
|
||
|
Creating Integrated Evidence Graphs for Network Forensics9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers
hal-01460608v1
|
||
|
Real-Time Covert Timing Channel Detection in Networked Virtual Environments9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers
hal-01460611v1
|