Filter your results
- 3
- 1
- 3
- 1
- 4
- 1
- 1
- 2
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.201-215, ⟨10.1007/978-3-319-99828-2_15⟩
Conference papers
hal-02023722v1
|
||
|
Graphical Lasso Granger Method with 2-Levels-Thresholding for Recovering Causality Networks26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.220-229, ⟨10.1007/978-3-662-45504-3_21⟩
Conference papers
hal-01286461v1
|
||
|
Self-Organizing SystemsSpringer, LNCS 8221, 2014, Lecture Notes in Computer Science, 978-3-642-54139-1. ⟨10.1007/978-3-642-54140-7⟩
Books
hal-01291531v1
|
||
|
Smart Short Term Capacity Planning: A Reinforcement Learning ApproachIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.258-266, ⟨10.1007/978-3-030-85874-2_27⟩
Conference papers
hal-04030409v1
|