Search

Your search keyword '"Isabelle Chrisment"' showing total 182 results

Search Constraints

Start Over You searched for: Author "Isabelle Chrisment" Remove constraint Author: "Isabelle Chrisment"
182 results on '"Isabelle Chrisment"'

Search Results

152. Detection methods for security of heterogeneous IoT systems

153. Atténuation des abus de protocole dans les plans de données programmables SDN

154. Environnements hybrides et anonymes pour le partage de fichiers : architecture et caractérisation

155. Large-scale trustworthy distributed collaboration

156. Attack Modelling and Detection in Distributed and Cooperative Controlled Microgrid Systems

157. HTTPS traffic analysis for the detection of user activity

158. Analyse de trafic HTTPS pour la supervision d'activités utilisateurs

159. Protocole de routage pour l’architecture NDN

160. Service-Level Monitoring of HTTPS Traffic

161. Monitoring and Security for the RPL-based Internet of Things

162. Supervision et sécurité pour l'Internet des Objets utilisant le protocole de routage RPL

163. Étude du filtrage de flux HTTPS

164. Monitoring of the Anonymous I2P Network

165. Using Kad-BitTorrent Hybrid Clients to Share Contents

166. Analyse et visualisation de communautés dans les données P2P

167. Analyse des vulnérabilités du réseau pair à pair anonymisé I2P

168. Monitoring of structured P2P networks applied to the security of contents

169. Monitoring of structured peer-to-peer networks applied to the security of contents

170. Decision Engine for SIP Based Dynamic Call Routing

171. Towards Self-Adaptive Monitoring Framework for Integrated Management

172. Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems

173. Econometric Feedback for Runtime Risk Management in VoIP Architectures

174. Autonomous Platform for Life-Critical Decision Support in the ICU

175. Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services

176. Impact of Dynamics on Situated and Global Aggregation Schemes

177. Using of Time Characteristics in Data Flow for Traffic Classification

178. Towards Vulnerability Prevention in Autonomic Networks and Systems

179. An SLA Support System for Cloud Computing

180. Autonomous service composition in symbiotic networks

181. Policy-Based Pricing for Heterogeneous Wireless Access Networks

182. Conception d'un réseau WDM protégé par sous-réseaux

Catalog

Books, media, physical & digital resources