default search action
2nd CSNet 2018: Paris, France
- Patrick Hebrard, Solange Ghernaouti:
2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, October 24-26, 2018. IEEE 2018, ISBN 978-1-5386-7045-3 - Olivier Jacq, Xavier Boudvin, David Brosset, Yvon Kermarrec, Jacques Simonin:
Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre. 1-8 - Tam N. Nguyen:
The Challenges in ML-Based Security for SDN. 1-9 - Atef Abdelkefi, Yuming Jiang, Sachin Sharma:
SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis. 1-8 - Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler, Pierre Blanchart, Amira Ben Hamida, Mohamed-Haykel Zayani:
Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption. 1-8 - Hassan Noun, Walid Fahs, Ali Kalakech, Jamal Haydar:
Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-of-Art Techniques and Proposition of New Enhancement Revocation Method. 1-6 - Takashi Harada, Ken Tanaka, Kenji Mikawa:
A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem. 1-8 - Klaus Zaerens:
Concept for Controlled Business Critical Information Sharing Using Smart Contracts. 1-8 - Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu:
Tango: The Beginning-A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries. 1-3 - Samira Douzi, Ibtissam Benchaji, Bouabid El Ouahidi:
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules. 1-3 - Juan-Carlos Bennett, Mamadou H. Diallo:
A Forensic Pattern-Based Approach for Investigations in Cloud System Environments. 1-8 - Thibaud Mérien, David Brosset, Xavier J. A. Bellekens, Christophe Claramunt:
A Human-Centred Model for Network Flow Analysis. 1-6 - Andrea Melis, Davide Berardi, Chiara Contoli, Franco Callegati, Flavio Esposito, Marco Prandini:
A Policy Checker Approach for Secure Industrial SDN. 1-7 - Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of Cryptographic Algorithms on IoT Hardware platforms. 1-5 - Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu:
A Probabilistic Model of Periodic Pulsed Transaction Injection. 1-5 - Franck Sicard, Cedric Escudero, Eric Zamaï, Jean-Marie Flaus:
From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity. 1-8 - R. Madhusudhan, Shashidhara:
Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches. 1-3 - Dallal Belabed, Mathieu Bouet, Vania Conan:
Centralized Defense Using Smart Routing Against Link-Flooding Attacks. 1-8 - Ibtissam Benchaji, Samira Douzi, Bouabid El Ouahidi:
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection. 1-5 - Amir Djenna, Djamel-Eddine Saïdouni:
Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure. 1-4 - Eduardo Berrueta, Daniel Morató, Eduardo Magaña, Mikel Izal:
Ransomware Encrypted Your Files but You Restored Them from Network Traffic. 1-7 - Talal Halabi, Martine Bellaïche, Adel Abusitta:
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.