593 results on '"Jérôme François"'
Search Results
2. Vulnet: Learning Navigation in an Attack Graph.
3. How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya.
4. To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger.
5. ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models.
6. Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning.
7. HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots.
8. Multi-label Classification of Hosts Observed through a Darknet.
9. NetREC: Network-wide in-network REal-value Computation.
10. Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane.
11. Mannose-based surfactant as biofunctional nanoemulsion stabilizer
12. Two Anthropomorphic Stelae Connected With a Platform‐Like Structure in the Area of Ḥimā (Saudi Arabia): New Data From Southwestern Arabia.
13. HSL: a Cyber Security Research Facility for Sensitive Data Experiments.
14. InREC: In-network REal Number Computation.
15. Software-based Analysis of the Security by Design in Embedded Devices.
16. LINT: Accuracy-adaptive and Lightweight In-band Network Telemetry.
17. Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge.
18. Acid‐Catalyzed Activation and Condensation of the =C5H Bond of Furfural on Aldehydes, an Entry Point to Biobased Monomers
19. Metal‐Free Selective Synthesis of α,β‐Unsaturated Aldehydes from Alkenes and Formaldehyde Catalyzed by Dimethylamine
20. Harnessing ultrasound-derived hydroxyl radicals for the selective oxidation of aldehyde functions
21. BPP over P4: Exploring Frontiers and Limits in Programmable Packet Processing.
22. Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification.
23. Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
24. 13 Homogeneously catalyzed conversion of sugars, sugar derivatives and oils to platform and specialty chemicals
25. Mitigation of cation exchange resin deactivation in the one-pot conversion of fructose to methyl levulinate.
26. Efficient Resource Allocation for Multi-Tenant Monitoring of Edge Infrastructures.
27. Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis.
28. Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis.
29. SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic.
30. Catalysis under ultrasonic irradiation: a sound synergy
31. Utilizing attack enumerations to study SDN/NFV vulnerabilities.
32. Towards a management plane for smart contracts: Ethereum case study.
33. Blockchain orchestration and experimentation framework: A case study of KYC.
34. UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler.
35. Passive Monitoring of HTTPS Service Use.
36. Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
37. Oko: Extending Open vSwitch with Stateful Filters.
38. Offloading Security Services to the Cloud Infrastructure.
39. Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models.
40. Ultrasound-Assisted Synthesis of Nanostructured Oxide Materials
41. Catalytic glycosylation of glucose with alkyl alcohols over sulfonated mesoporous carbons
42. Leveraging in-network real-value computation for home network device recognition.
43. Acid‐Catalyzed Activation and Condensation of the =C5H Bond of Furfural on Aldehydes, an Entry Point to Biobased Monomers.
44. Understanding disruptive monitoring capabilities of programmable networks.
45. HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
46. A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study.
47. BotGM: Unsupervised graph mining to detect botnets in traffic flows.
48. Advanced interest flooding attacks in named-data networking.
49. Knowledge discovery of port scans from darknet.
50. Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.