


default search action
4th CSNet 2020: Lausanne, Switzerland
- Romain Laborde

, Nadjib Aitsaadi, Solange Ghernaouti, Abdelmalek Benzekri, Joaquín García-Alfaro
:
4th Cyber Security in Networking Conference, CSNet 2020, Lausanne, Switzerland, October 21-23, 2020. IEEE 2020, ISBN 978-1-6654-0458-7 - Lyes Khoukhi, Rida Khatoun:

Safe Traffic Adaptation Model in Wireless Mesh Networks. 1-4 - Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:

Message Fabrication Detection Model based on Reactive Protocols in VANET. 1-5 - Michal Pióro, Mariusz Mycek

, Artur Tomaszewski
:
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes. 1-8 - Sara Farahmandian, Doan B. Hoang:

A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions. 1-8 - Miel Verkerken

, Laurens D'hooge
, Tim Wauters, Bruno Volckaert, Filip De Turck
:
Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data. 1-8 - Mohammed B. Alshawki

, Yuping Yan, Péter Ligeti, Christoph Reich
:
A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things. 1-3 - Thi Quynh Nguyen

, Romain Laborde
, Abdelmalek Benzekri, Bruno Qu'hen:
Detecting abnormal DNS traffic using unsupervised machine learning. 1-8 - Fares Meghdouri, Maximilian Bachl, Tanja Zseby:

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection. 1-7 - Joanna Moubarak, Carole Bassil:

On Darknet HoneyBots. 1-3 - Abdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois:

A comparative performance study of cryptographic algorithms for connected vehicles. 1-8 - Fredrik Mårlind, Ismail Butun:

Activation of LoRaWAN End Devices by Using Public Key Cryptography. 1-8 - David Cordova

, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
Blockgraph: A blockchain for mobile ad hoc networks. 1-8 - Eva Holasova

, Radek Fujdiak, Karel Kuchar
:
Specific Anomaly Detection Method in Wireless Communication Networks. 1-3 - Anas Alsoliman, Abdulrahman Bin Rabiah, Marco Levorato:

Privacy-Preserving Authentication Framework for UAS Traffic Management Systems. 1-8 - Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat

:
Cloud Assisted Privacy Preserving Using Homomorphic Encryption. 1-8 - Karel Kuchar

, Radek Fujdiak, Petr Blazek, Zdenek Martinasek, Eva Holasova
:
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














