57 results on '"Isabelle Chrisment"'
Search Results
2. SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks.
3. SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in Microgrid.
4. Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning.
5. Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane.
6. An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures.
7. Capturing Privacy-Preserving User Contexts with IndoorHash.
8. A Process Mining Approach for Supporting IoT Predictive Security.
9. Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification.
10. Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
11. Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms.
12. FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps.
13. Testing nearby peer-to-peer mobile apps at large.
14. Passive Monitoring of HTTPS Service Use.
15. Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN.
16. ANDROFLEET: testing WiFi peer-to-peer mobile apps in the large.
17. A Process Mining Tool for Supporting IoT Security.
18. Exploring Smartphone Application Usage Logs with Declared Sociological Information.
19. Improving SNI-Based HTTPS Security Monitoring.
20. Using the RPL protocol for supporting passive monitoring in the Internet of Things.
21. A multi-level framework to identify HTTPS services.
22. Green growth in NDN: Deployment of content stores.
23. Detecting version number attacks in RPL-based networks using a distributed monitoring architecture.
24. Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids.
25. SRSC: SDN-based routing scheme for CCN.
26. Efficiently bypassing SNI-based HTTPS filtering.
27. Refining smartphone usage analysis by combining crowdsensing and survey.
28. Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
29. Addressing DODAG inconsistency attacks in RPL networks.
30. Group-Based Characterization for the I2P Anonymous File-Sharing Environment.
31. A Study of RPL DODAG Version Attacks.
32. Monitoring and Security for the Internet of Things.
33. I2P's Usage Characterization.
34. A Bird's Eye View on the I2P Anonymous File-Sharing Environment.
35. Improving Content Availability in the I2P Anonymous File-Sharing Environment.
36. When KAD Meets BitTorrent - Building a Stronger P2P Network.
37. Content pollution quantification in large P2P networks : A measurement study on KAD.
38. BitTorrent's Mainline DHT Security Assessment.
39. Efficient DHT attack mitigation through peers' ID distribution.
40. Monitoring and Controlling Content Access in KAD.
41. Automated and secure IPv6 configuration in enterprise networks.
42. Evaluation of Sybil Attacks Protection Schemes in KAD.
43. A Distributed and Adaptive Revocation Mechanism for P2P Networks.
44. Assessing the security of VoIP Services.
45. Efficient Clustering for Multicast Key Distribution in MANETs.
46. An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks.
47. Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments.
48. A secure SSM architecture.
49. Dynamic Group Communication Security.
50. Dynamic Group Key Management Protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.