Filter your results
- 21
- 21
- 21
- 2
- 3
- 2
- 3
- 2
- 3
- 2
- 1
- 1
- 2
- 21
- 2
- 1
- 1
- 1
- 1
- 1
- 11
- 6
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On the Identification of Property Based Generalizations in Microdata Anonymization24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers
hal-01056667v1
|
||
|
Multi-keyword Similarity Search over Encrypted Cloud Data29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.52-65, ⟨10.1007/978-3-642-55415-5_5⟩
Conference papers
hal-01370353v1
|
||
|
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.97-112, ⟨10.1007/978-3-642-39256-6_7⟩
Conference papers
hal-01490726v1
|
||
|
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers
hal-02384604v1
|
||
|
Adversarial Sampling Attacks Against Phishing Detection33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.83-101, ⟨10.1007/978-3-030-22479-0_5⟩
Conference papers
hal-02384598v1
|
||
|
Evaluating CVSS Base Score Using Vulnerability Rewards Programs31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.62-75, ⟨10.1007/978-3-319-33630-5_5⟩
Conference papers
hal-01369542v1
|
||
|
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.179-193, ⟨10.1007/978-3-319-33630-5_13⟩
Conference papers
hal-01369552v1
|
||
|
A Distributed Mechanism to Protect Against DDoS Attacks31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.529-540, ⟨10.1007/978-3-319-61176-1_29⟩
Conference papers
hal-01684374v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers
hal-03243641v1
|
||
|
Intelligent Inventory Control: Is Bootstrapping Worth Implementing?7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.58-67, ⟨10.1007/978-3-642-32891-6_10⟩
Conference papers
hal-01524959v1
|
||
|
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.23-42, ⟨10.1007/978-3-030-22479-0_2⟩
Conference papers
hal-02384601v1
|
||
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers
hal-01633680v1
|
||
|
Continuous Engineering Through ALM-PLM Integration17th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2020, Rapperswil, Switzerland. pp.798-811, ⟨10.1007/978-3-030-62807-9_62⟩
Conference papers
hal-03753135v1
|
||
|
Multilevel Secure Data Stream Processing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers
hal-01586572v1
|
||
|
Using Trust-Based Information Aggregation for Predicting Security Level of Systems24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers
hal-01056685v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Stream Processing with Secure Information Flow Constraints29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩
Conference papers
hal-01745816v1
|
||
|
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.20-40, ⟨10.1007/978-3-319-61176-1_2⟩
Conference papers
hal-01684353v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|