


default search action
2nd CSNet 2018: Paris, France
- Patrick Hebrard, Solange Ghernaouti:

2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, October 24-26, 2018. IEEE 2018, ISBN 978-1-5386-7045-3 - Olivier Jacq, Xavier Boudvin, David Brosset, Yvon Kermarrec, Jacques Simonin:

Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre. 1-8 - Tam N. Nguyen

:
The Challenges in ML-Based Security for SDN. 1-9 - Atef Abdelkefi, Yuming Jiang

, Sachin Sharma
:
SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis. 1-8 - Oana Stan, Renaud Sirdey

, Cédric Gouy-Pailler
, Pierre Blanchart, Amira Ben Hamida, Mohamed-Haykel Zayani:
Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption. 1-8 - Hassan Noun, Walid Fahs, Ali Kalakech, Jamal Haydar:

Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-of-Art Techniques and Proposition of New Enhancement Revocation Method. 1-6 - Takashi Harada, Ken Tanaka, Kenji Mikawa:

A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem. 1-8 - Klaus Zaerens:

Concept for Controlled Business Critical Information Sharing Using Smart Contracts. 1-8 - Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu:

Tango: The Beginning-A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries. 1-3 - Samira Douzi

, Ibtissam Benchaji, Bouabid El Ouahidi:
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules. 1-3 - Juan-Carlos Bennett, Mamadou H. Diallo:

A Forensic Pattern-Based Approach for Investigations in Cloud System Environments. 1-8 - Thibaud Mérien, David Brosset, Xavier J. A. Bellekens

, Christophe Claramunt:
A Human-Centred Model for Network Flow Analysis. 1-6 - Andrea Melis

, Davide Berardi, Chiara Contoli
, Franco Callegati
, Flavio Esposito, Marco Prandini
:
A Policy Checker Approach for Secure Industrial SDN. 1-7 - Mohammed El-hajj

, Maroun Chamoun
, Ahmad Fadlallah
, Ahmed Serhrouchni:
Analysis of Cryptographic Algorithms on IoT Hardware platforms. 1-5 - Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu:

A Probabilistic Model of Periodic Pulsed Transaction Injection. 1-5 - Franck Sicard, Cedric Escudero, Eric Zamaï, Jean-Marie Flaus:

From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity. 1-8 - R. Madhusudhan, Shashidhara

:
Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches. 1-3 - Dallal Belabed, Mathieu Bouet, Vania Conan:

Centralized Defense Using Smart Routing Against Link-Flooding Attacks. 1-8 - Ibtissam Benchaji, Samira Douzi

, Bouabid El Ouahidi
:
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection. 1-5 - Amir Djenna

, Djamel-Eddine Saïdouni:
Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure. 1-4 - Eduardo Berrueta

, Daniel Morató
, Eduardo Magaña, Mikel Izal
:
Ransomware Encrypted Your Files but You Restored Them from Network Traffic. 1-7 - Talal Halabi

, Martine Bellaïche, Adel Abusitta:
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














