Search

Your search keyword '"Isabelle Chrisment"' showing total 52 results

Search Constraints

Start Over You searched for: Author "Isabelle Chrisment" Remove constraint Author: "Isabelle Chrisment" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
52 results on '"Isabelle Chrisment"'

Search Results

1. Comparative Assessment of Process Mining for Supporting IoT Predictive Security

2. Capturing Privacy-Preserving User Contexts with IndoorHash

3. Mitigating TCP Protocol Misuse With Programmable Data Planes

4. Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space

5. Empowering Mobile Crowdsourcing Apps with User Privacy Control

6. Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms

7. A Process Mining Approach for Supporting IoT Predictive Security

8. A Process Mining Tool for Supporting IoT Security

9. Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic

10. FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps

11. Testing Nearby Peer-to-Peer Mobile Apps at Large

12. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks

13. Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN

14. Exploring Smartphone Application Usage Logs with Declared Sociological Information

15. Improving SNI-based HTTPS Security Monitoring

16. Green growth in NDN: Deployment of content stores

17. Using the RPL Protocol for Supporting Passive Monitoring in the Internet of Things

18. A Multi-Level Framework to Identify HTTPS Services

19. Refining smartphone usage analysis by combining crowdsensing and survey

20. A Study of RPL DODAG Version Attacks

21. Improving Content Availability in the I2P Anonymous File-Sharing Environment

22. Detection and mitigation of localized attacks in a widely deployed P2P network

23. Content pollution quantification in large P2P networks : A measurement study on KAD

24. Détection de pairs suspects dans le réseau pair à pair KAD

25. BitTorrent's Mainline DHT Security Assessment

26. When KAD meets BitTorrent - Building a Stronger P2P Network

27. Autonomic Renumbering in the Future Internet

28. Monitoring and Controlling Content Access in KAD

29. Efficient DHT attack mitigation through peers' ID distribution

30. Formal Verification of Secure Group Communication Protocols Modelled in UML

31. Evaluation of Sybil Attacks Protection Schemes in KAD

32. A Distributed and Adaptive Revocation Mechanism for P2P networks

33. Automated Verification of a Key Management Architecture for Hierarchical Group Protocols

34. Monitoring the Neighbor Discovery Protocol

35. Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique

36. Mobility-Awareness in Group Key Management Protocols within MANETs

37. Efficient Clustering for Multicast Key Distribution in MANETs

38. An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks

39. A secure SSM architecture

40. Dynamic group communication security

41. Dynamic Group Key Management Protocol

42. A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks

43. Decision Engine for SIP Based Dynamic Call Routing

44. Towards Self-Adaptive Monitoring Framework for Integrated Management

45. Econometric Feedback for Runtime Risk Management in VoIP Architectures

46. Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services

47. Impact of Dynamics on Situated and Global Aggregation Schemes

48. Using of Time Characteristics in Data Flow for Traffic Classification

49. Towards Vulnerability Prevention in Autonomic Networks and Systems

50. An SLA Support System for Cloud Computing

Catalog

Books, media, physical & digital resources