The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSNet"( http://dblp.L3S.de/Venues/CSNet )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csnet

Publication years (Num. hits)
2017 (24) 2018 (22) 2019 (26) 2020 (17) 2021 (18) 2022 (24)
Publication types (Num. hits)
inproceedings(125) proceedings(6)
Venues (Conferences, Journals, ...)
CSNet(131)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 131 publication records. Showing 131 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Olivier Jacq, Xavier Boudvin, David Brosset, Yvon Kermarrec, Jacques Simonin Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1R. Madhusudhan, Shashidhara Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Atef Abdelkefi, Yuming Jiang 0001, Sachin Sharma SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu A Probabilistic Model of Periodic Pulsed Transaction Injection. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Franck Sicard, Cedric Escudero, Eric Zamaï, Jean-Marie Flaus From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu Tango: The Beginning-A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thibaud Mérien, David Brosset, Xavier J. A. Bellekens, Christophe Claramunt A Human-Centred Model for Network Flow Analysis. Search on Bibsonomy CSNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jéssica Alcântara Gonçalves, Vinicius S. Faria, Gabriele de Brito Vieira, Camilla Alves Mariano da Silva, Dalbert Matos Mascarenhas WIDIP: Wireless distributed IPS for DDoS attacks. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS). Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Markus Endler, Anderson Silva, Rafael A. M. S. Cruz An approach for secure edge computing in the Internet of Things. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Romain Laborde, Arnaud Oglaza, François Barrère, Abdelmalek Benzekri dynSMAUG: A dynamic security management framework driven by situations. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad-Mahdi Bazm, Marc Lacoste, Mario Südholt, Jean-Marc Menaud Side-channels beyond the cloud edge: New isolation threats and solutions. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat On DGHV and BGV fully homomorphic encryption schemes. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nour El Madhoun, Emmanuel Bertin Magic always comes with a price: Utility versus security for bank cards. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patricio Zambrano, Marco Sánchez, Jenny Torres 0001, Walter Fuertes BotHook: An option against Cyberpedophilia. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Badis Hammi, Jean Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Valentin Vallois, Fouad Amine Guenane Bitcoin transaction: From the creation to validation, a protocol overview. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Katarzyna Kapusta, Gérard Memmi, Hassan Noura 0001 Secure and resilient scheme for data protection in unattended wireless sensor networks. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State BotGM: Unsupervised graph mining to detect botnets in traffic flows. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 1st Cyber Security in Networking Conference, CSNet 2017, Rio de Janeiro, Brazil, October 18-20, 2017 Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  BibTeX  RDF
1Igor Jochem Sanz, Martin Andreoni Lopez, Diogo Menezes Ferrazani Mattos, Otto Carlos Muniz Bandeira Duarte A cooperation-aware virtual network function for proactive detection of distributed port scanning. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Andreoni Lopez, Renato Souza Silva, Igor Drummond Alvarenga, Gabriel A. F. Rebello, Igor Jochem Sanz, Antonio Gonzalez Pastana Lobato, Diogo M. F. Mattos, Otto Carlos M. B. Duarte, Guy Pujolle Collecting and characterizing a real broadband access network traffic dataset. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Renato Souza Silva, Evandro L. C. Macedo A cooperative approach for a global intrusion detection system for internet service providers. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet A lightweight IoT security protocol. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammed El-hajj 0001, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni Analysis of authentication techniques in Internet of Things (IoT). Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Varun Sharma A ranking based privilege model for privacy in location based services. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Batoul Haidar, Maroun Chamoun, Ahmed Serhrouchni Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Valerio Selis, Alan Marshall 0001 A fake timing attack against behavioural tests used in embedded IoT M2M communications. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joanna Moubarak, Eric Filiol, Maroun Chamoun Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality? Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri Describing advanced persistent threats using a multi-agent system approach. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nikola Bozic, Guy Pujolle, Stefano Secci Securing virtual machine orchestration with blockchains. Search on Bibsonomy CSNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #131 of 131 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license