The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSNet"( http://dblp.L3S.de/Venues/CSNet )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csnet

Publication years (Num. hits)
2017 (24) 2018 (22) 2019 (26) 2020 (17) 2021 (18) 2022 (24)
Publication types (Num. hits)
inproceedings(125) proceedings(6)
Venues (Conferences, Journals, ...)
CSNet(131)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 131 publication records. Showing 131 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Diego Canizio Lopes, André Luiz Nasserala Pires, Igor Monteiro Moraes The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routers. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1João Pedro De Lima Cassiano, Sérgio Ribeiro, Alana Almeida ICpSAF - Integrated Cross-platform Security Assessment Framework. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Khan Reaz, Gerhard Wunder ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nouredine Tamani, Saad El Jaouhari Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Emil Suleymanov, Erkin Kirdan, Marc-Oliver Pahl Securing CoAP with DTLS and OSCORE. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Wiem Tounsi Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Govinda Mohini G. Bezerra, Tadeu N. Ferreira, Diogo M. F. Mattos Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access Networks. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Paulo Assumpção, Carlos Oliveira, Pablo Ortiz, Wilson S. Melo, Luiz Carmo A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pascal Urien Estimating Speedup Factor For Personal HSMs Based On Secure Elements. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carol J. Fung, Vivian Motti 0001, Katie Zhang, Yanjun Qian A Study of User Concerns about Smartphone Privacy. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, Luís Henrique M. K. Costa Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Khaldoun Al Agha, Pauline Loygue, Guy Pujolle Horizontal network for a better cybersecurity. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Vagner Ereno Quincozes, Silvio E. Quincozes, Célio Vinicius N. de Albuquerque, Diego G. Passos 0001, Daniel Mossé Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Junye Li 0003, Aryan Sharma, Deepak Mishra 0001, Aruna Seneviratne Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle A Review On Lexical Based Malicious Domain Name Detection Methods. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Igor Jochem Sanz, Gabriel Antonio Fontes Rebello, Otto Carlos Muniz Bandeira Duarte GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection Systems. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Humberto Mendes, Silvio E. Quincozes, Vagner Ereno Quincozes A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pedro Horchulhack, Eduardo K. Viegas, Martin Andreoni Lopez A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1 6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022 Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Gabriel Antonio F. Rebello, Gustavo Franco Camilo, Lucas C. B. Guimarães, Lucas Airam C. de Souza, Otto Carlos M. B. Duarte Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Y A Joarder, Carol J. Fung A Survey on the Security Issues of QUIC. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Samir Chabbi, Nour El Madhoun, Lazhar Khamer Security of NFC Banking Transactions: Overview on Attacks and Solutions. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li Mitigation of poisoning attack in federated learning by using historical distance detection. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan Forensic Analysis of the Cisco WebEx Application. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pascal Urien Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sanaa Kaddoura Classification of malicious and benign websites by network features using supervised machine learning algorithms. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mathew Nicho, Maitha Alkhateri Modeling Evasive Malware Authoring Techniques. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, Peter Langendörfer Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christian Lübben, Marc-Oliver Pahl Advances in ML-Based Anomaly Detection for the IoT. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gianmarco Baldini Intrusion detection systems in in-vehicle networks based on bag-of-words. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz 0007, António Carvalho, David Campelo Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1 5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021 Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mwrwan Abubakar, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai, William J. Buchanan Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Siem Girmay, Faniel Samsom, Asad Masood Khattak AI based Login System using Facial Recognition. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi A secure blockchain-based architecture for the COVID-19 data network. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1David Cordova Morales, Pedro B. Velloso, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pedro B. Velloso, David Cordova Morales, Thi Mai Trang Nguyen, Guy Pujolle State of the art: Cross chain communications. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Raphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux Authenticating IDS autoencoders using multipath neural networks. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Eiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Mohammad Mehedy Masud Blockchain-based Secure CIDS Operation. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois A comparative performance study of cryptographic algorithms for connected vehicles. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Bruno Qu'hen Detecting abnormal DNS traffic using unsupervised machine learning. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fredrik Mårlind, Ismail Butun Activation of LoRaWAN End Devices by Using Public Key Cryptography. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammed B. M. Kamel, Yuping Yan, Péter Ligeti, Christoph Reich A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eva Holasova, Radek Fujdiak, Karel Kuchar Specific Anomaly Detection Method in Wireless Communication Networks. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anas Alsoliman, Abdulrahman Bin Rabiah, Marco Levorato Privacy-Preserving Authentication Framework for UAS Traffic Management Systems. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat Cloud Assisted Privacy Preserving Using Homomorphic Encryption. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1David Cordova, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle Blockgraph: A blockchain for mobile ad hoc networks. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Joanna Moubarak, Carole Bassil On Darknet HoneyBots. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Romain Laborde, Nadjib Aitsaadi, Solange Ghernaouti, Abdelmalek Benzekri, Joaquín García-Alfaro (eds.) 4th Cyber Security in Networking Conference, CSNet 2020, Lausanne, Switzerland, October 21-23, 2020 Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lyes Khoukhi, Rida Khatoun Safe Traffic Adaptation Model in Wireless Mesh Networks. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fares Meghdouri, Maximilian Bachl, Tanja Zseby EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Karel Kuchar, Radek Fujdiak, Petr Blazek, Zdenek Martinasek, Eva Holasova Simplified Method for Fast and Efficient Incident Detection in Industrial Networks. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sara Farahmandian, Doan B. Hoang A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun Message Fabrication Detection Model based on Reactive Protocols in VANET. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michal Pióro, Mariusz Mycek, Artur Tomaszewski Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes. Search on Bibsonomy CSNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Diego Oña, Lenín Zapata, Walter Fuertes, Germán E. Rodríguez, Diego Eduardo Benavides, Theofilos Toulkeridis Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andreane Spano da Roza, João Vitor Valle, Diogo Menezes Ferrazani Mattos A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic Classification. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Achraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni A Blockchain-based Lightweight Authentication Solution for IoT. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ralph Koning, Ameneh Deljoo, Lydia Meijer, Cees de Laat, Paola Grosso Trust-based collaborative defences in multi network alliances. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marek Malowidzki, Damian Hermanowski, Przemyslaw Berezinski TAG: Topological Attack Graph Analysis Tool. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fathima James A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, October 23-25, 2019 Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  BibTeX  RDF
1Ameneh Deljoo, Ralph Koning, Tom M. van Engers, Leon Gommans, Cees de Laat Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1El-hacen Diallo, Alexandre Laubé, Khaldoun Al Agha, Steven Martin 0001 Efficient Block replication to optimize the blockchain resources. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christian Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, Christoph Meinel Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maria Alejandra Osorio Angarita, Ebroul Izquierdo, Agustín Moreno Cañadas Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou Towards Blockchain Services For Mobile Money Traceability And Federation. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammed S. Alshehri, Brajendra Panda A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, Darine Rammal, François Barrère Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Olivier Cros, Gabriel Chênevert Hashing-based authentication for CAN bus and application to Denial-of-Service protection. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Germán E. Rodríguez, Jenny Torres 0001, Pamela Flores, Diego Eduardo Benavides, Daniel Nuñez-Agurto XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nour El Madhoun, Emmanuel Bertin, Guy Pujolle The EMV Payment System: Is It Reliable? Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Solange Ghernaouti, Léonore Cellier, Bastien Wanner Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Firas Al-Doghman, Zenon Chaczko, Wayne Brookes, Lucia Carrion Gordon Social Consensus-inspired Aggregation Algorithms for Edge Computing. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anika Anwar, Talal Halabi, Mohammad Zulkernine Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nour El Madhoun, Julien Hatin, Emmanuel Bertin Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications? Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin L. Sanchez, Gabriel Lopez, Dorys Quiroz Information Security Management Frameworks in Higher Education Institutions: An Overview. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fathima James IoT Cybersecurity based Smart Home Intrusion Prevention System. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karim Lounis, Mohammad Zulkernine Bluetooth Low Energy Makes "Just Works" Not Work. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Victor Pasknel de Alencar Ribeiro, Raimir Holanda Filho, Alex Ramos A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain. Search on Bibsonomy CSNet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amir Djenna, Djamel-Eddine Saïdouni Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan-Carlos Bennett, Mamadou H. Diallo A Forensic Pattern-Based Approach for Investigations in Cloud System Environments. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Talal Halabi, Martine Bellaïche, Adel Abusitta 0001 Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hassan Noun, Walid Fahs, Ali Kalakech, Jamal Haydar Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-of-Art Techniques and Proposition of New Enhancement Revocation Method. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Takashi Harada, Ken Tanaka, Kenji Mikawa A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Klaus Zaerens Concept for Controlled Business Critical Information Sharing Using Smart Contracts. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tam N. Nguyen The Challenges in ML-Based Security for SDN. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Samira Douzi, Ibtissam Benchaji, Bouabid El Ouahidi Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eduardo Berrueta, Daniel Morató, Eduardo Magaña, Mikel Izal Ransomware Encrypted Your Files but You Restored Them from Network Traffic. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Melis 0001, Davide Berardi, Chiara Contoli, Franco Callegati, Flavio Esposito, Marco Prandini A Policy Checker Approach for Secure Industrial SDN. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler, Pierre Blanchart, Amira Ben Hamida, Mohamed-Haykel Zayani Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ibtissam Benchaji, Samira Douzi, Bouabid El Ouahidi Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dallal Belabed, Mathieu Bouet, Vania Conan Centralized Defense Using Smart Routing Against Link-Flooding Attacks. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed El-hajj 0001, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni Analysis of Cryptographic Algorithms on IoT Hardware platforms. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick Hebrard, Solange Ghernaouti (eds.) 2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, October 24-26, 2018 Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 131 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license