Search

Your search keyword '"Isabelle Chrisment"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Isabelle Chrisment" Remove constraint Author: "Isabelle Chrisment" Topic computer Remove constraint Topic: computer
42 results on '"Isabelle Chrisment"'

Search Results

1. Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space

2. Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms

3. Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic

4. Testing Nearby Peer-to-Peer Mobile Apps at Large

5. Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN

6. Comparing Pedophile Activity in Different P2P Systems

7. Improving SNI-based HTTPS Security Monitoring

8. A Multi-Level Framework to Identify HTTPS Services

9. Efficiently bypassing SNI-based HTTPS filtering

10. Refining smartphone usage analysis by combining crowdsensing and survey

11. Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security

12. Improving Content Availability in the I2P Anonymous File-Sharing Environment

13. Detection and mitigation of localized attacks in a widely deployed P2P network

14. I2P’s Usage Characterization

15. A Bird’s Eye View on the I2P Anonymous File-Sharing Environment

16. Content pollution quantification in large P2P networks : A measurement study on KAD

17. BitTorrent's Mainline DHT Security Assessment

18. When KAD meets BitTorrent - Building a Stronger P2P Network

19. Efficient DHT attack mitigation through peers' ID distribution

20. Key Management in Ad Hoc Networks

21. Formal Verification of Secure Group Communication Protocols Modelled in UML

22. Evaluation of Sybil Attacks Protection Schemes in KAD

23. A Distributed and Adaptive Revocation Mechanism for P2P networks

24. Automated Verification of a Key Management Architecture for Hierarchical Group Protocols

25. Monitoring the Neighbor Discovery Protocol

26. Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique

27. Mobility-Awareness in Group Key Management Protocols within MANETs

28. An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks

29. A secure SSM architecture

30. Dynamic group communication security

31. Dynamic Group Key Management Protocol

32. ALFred, a protocol compiler for the automated implementation of distributed applications

33. Application Level Framing and Automated Implementation

34. A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks

35. Decision Engine for SIP Based Dynamic Call Routing

36. Econometric Feedback for Runtime Risk Management in VoIP Architectures

37. Autonomous Platform for Life-Critical Decision Support in the ICU

38. Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services

39. Impact of Dynamics on Situated and Global Aggregation Schemes

40. Towards Vulnerability Prevention in Autonomic Networks and Systems

41. An SLA Support System for Cloud Computing

42. Policy-Based Pricing for Heterogeneous Wireless Access Networks

Catalog

Books, media, physical & digital resources