default search action
4th CSNet 2020: Lausanne, Switzerland
- Romain Laborde, Nadjib Aitsaadi, Solange Ghernaouti, Abdelmalek Benzekri, Joaquín García-Alfaro:
4th Cyber Security in Networking Conference, CSNet 2020, Lausanne, Switzerland, October 21-23, 2020. IEEE 2020, ISBN 978-1-6654-0458-7 - Lyes Khoukhi, Rida Khatoun:
Safe Traffic Adaptation Model in Wireless Mesh Networks. 1-4 - Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:
Message Fabrication Detection Model based on Reactive Protocols in VANET. 1-5 - Michal Pióro, Mariusz Mycek, Artur Tomaszewski:
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes. 1-8 - Sara Farahmandian, Doan B. Hoang:
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions. 1-8 - Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data. 1-8 - Mohammed B. M. Kamel, Yuping Yan, Péter Ligeti, Christoph Reich:
A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things. 1-3 - Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Bruno Qu'hen:
Detecting abnormal DNS traffic using unsupervised machine learning. 1-8 - Fares Meghdouri, Maximilian Bachl, Tanja Zseby:
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection. 1-7 - Joanna Moubarak, Carole Bassil:
On Darknet HoneyBots. 1-3 - Abdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois:
A comparative performance study of cryptographic algorithms for connected vehicles. 1-8 - Fredrik Mårlind, Ismail Butun:
Activation of LoRaWAN End Devices by Using Public Key Cryptography. 1-8 - David Cordova, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
Blockgraph: A blockchain for mobile ad hoc networks. 1-8 - Eva Holasova, Radek Fujdiak, Karel Kuchar:
Specific Anomaly Detection Method in Wireless Communication Networks. 1-3 - Anas Alsoliman, Abdulrahman Bin Rabiah, Marco Levorato:
Privacy-Preserving Authentication Framework for UAS Traffic Management Systems. 1-8 - Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat:
Cloud Assisted Privacy Preserving Using Homomorphic Encryption. 1-8 - Karel Kuchar, Radek Fujdiak, Petr Blazek, Zdenek Martinasek, Eva Holasova:
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks. 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.