Search

Your search keyword '"Département Réseaux et Services de Télécommunications (TSP - RST)"' showing total 88 results

Search Constraints

Start Over You searched for: Author "Département Réseaux et Services de Télécommunications (TSP - RST)" Remove constraint Author: "Département Réseaux et Services de Télécommunications (TSP - RST)"
88 results on '"Département Réseaux et Services de Télécommunications (TSP - RST)"'

Search Results

1. Explainable artificial intelligence for cybersecurity: a literature survey

2. Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux

3. Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework

4. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes

5. A Study of Live VM Migration for Server Consolidation in Data Centers

6. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things

7. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems

8. Detecting APT through graph anomaly detection

9. Digital Twin for IoT Environments: A Testing and Simulation Tool

10. Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)

11. Towards inference delivery networks: distributing machine learning with optimality guarantees

12. Machine Learning Application to Priority Scheduling in Smart Microgrids

13. A two phase investment game for competitive opinion dynamics in social networks

14. Diet-ESP: IP layer security for IoT

15. A stochastic game framework for analyzing computational investment strategies in distributed computing

16. Optimal investment strategies for competing camps in a social network: a broad framework

17. MOOC Sécurité des réseaux: un apprentissage massif de la sécurité par la théorie et la pratique

18. Reinforcement learning approach for Advanced Sleep Modes management in 5G networks

19. Resource Allocation Polytope Games: Uniqueness of Equilibrium, Price of Stability, and Price of Anarchy

20. A study of systems with multiple operating levels, probabilistic thresholds and hysteresis

21. Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

22. Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers

23. Securely outsourcing the ciphertext-policy attribute-based encryption

24. Manipulating opinion dynamics in social networks in two phases

25. Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings

26. A Framework for Optimal Investment Strategies for Competing Camps in a Social Network

27. Analysis of performance and energy consumption in the cloud

28. A game theoretical real options framework for investment decisions in mobile TV infrastructure

29. Stochastic bounds for switched Bernoulli batch arrivals observed through measurements

30. A Zero-sum Game for Opinion Dynamics in a Social Network with Competing Camps

31. Compromis entre énergie et performance dans le cloud

32. A Study of Systems with Multiple Operating Levels, Soft Thresholds and Hysteresis

33. Calcul des seuils optimaux d’une politique à hysteresis pour un modèle de cloud

34. Understanding bike trip patterns leveraging bike sharing system open data

35. Continuous and unconstrained vital signs monitoring with ballistocardiogram sensors in headrest position

36. A two-level auction for C-RAN resource allocation

37. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications

38. Lightweight collaborative key establishment scheme for the Internet of Things

39. Performance analysis of a queue by combining stochastic bounds, real traffic traces and histograms

40. Dimensioning and Profit Sharing in Hybrid LTE/DVB Systems to Offer Mobile TV Services

41. ML: DDoS Damage Control with MPLS

42. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things

43. Novel lightweight signcryption-based key distribution mechanisms for MIKEY

44. PrivCheck: privacy-preserving check-in data publishing for personalized location based services

45. Dynamic cluster-based over-demand prediction in bike sharing systems

46. Performance Evaluation of Cloud Computing Centers with General Arrivals and Service

47. Performance analysis of clouds with phase-type arrivals

48. Participatory cultural mapping based on collective behavior data in location-based social networks

49. Politique optimale d'activation et désactivation des serveurs dans un modèle de cloud computing

50. Stochastic Bounds and Histograms for Active Queues Management and Networks Analysis

Catalog

Books, media, physical & digital resources