Filtrer vos résultats
- 61
- 8
- 38
- 18
- 5
- 3
- 2
- 1
- 1
- 1
- 3
- 58
- 9
- 8
- 5
- 2
- 2
- 2
- 1
- 2
- 1
- 4
- 4
- 3
- 3
- 3
- 9
- 10
- 7
- 8
- 5
- 3
- 1
- 3
- 1
- 1
- 1
- 60
- 9
- 64
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 69
- 20
- 17
- 15
- 11
- 8
- 8
- 7
- 6
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
69 résultats
Intangible Capital Risk Assessment (ICRA): a new framework for SMEs performance management5th International Conference on Information Systems and Economic Intelligence, Feb 2012, Djerba, Tunisia
Communication dans un congrès
hal-02519414v1
|
|||
1er rapport d'avancement du projet CPER CyNIC[Research Report] ANR (Agence Nationale de la Recherche - France); Université de technologie de Troyes. 2012
Rapport
hal-02519498v1
|
|||
Privacy Threats from Social Networking Service Aggregators2014 Fifth Cybercrime and Trustworthy Computing Conference (CTC), Nov 2014, Auckland, New Zealand. pp.30-37
Communication dans un congrès
hal-02274630v1
|
|||
KNN-LC: Classification in Unbalanced Datasets using a KNN-Based Algorithm and Local CentralitiesData-Driven Modeling for Sustainable Engineering, Springer, Cham, pp.85-97, 2020, 978-3-030-13697-0. ⟨10.1007/978-3-030-13697-0_7⟩
Chapitre d'ouvrage
hal-02330150v1
|
|||
Automatic Categorization of Press Articles through Learning: The Case of Senegalese Online Press2019 IEEE International Conference on Big Data (Big Data), Dec 2019, Los Angeles, United States. pp.6211-6213, ⟨10.1109/BigData47090.2019.9006070⟩
Communication dans un congrès
hal-02492483v1
|
|||
Collective classification in social networksthe 2017 IEEE/ACM International Conference, Jul 2017, Sydney, Australia. pp.827-835, ⟨10.1145/3110025.3110128⟩
Communication dans un congrès
hal-02519402v1
|
|||
Protection of IT infrastructures against cybercrimeInterdisciplinary Workshop on Global Security (WISG 2013), Jan 2013, Troyes, France
Communication dans un congrès
hal-02519449v1
|
|||
A simulation-based approach to quantifying resilience indicators in a mass transportation system11th International Conference on Information Systems for Crisis Response and Management, May 2014, University Park, United States
Communication dans un congrès
hal-02519410v1
|
|||
Nécessité d’une approche systémique de l’étude de la sécuritéWorkshop International DMD'2009 Diagnostic et Maintenance Décentralisée : Maîtrise des Infrastructures des Eaux et des Energies Renouvelables, Apr 2009, Yaoundé, Cameroun
Communication dans un congrès
hal-03091013v1
|
|||
|
Peak Electrical Energy Consumption Prediction by ARIMA, LSTM, GRU, ARIMA-LSTM and ARIMA-GRU ApproachesEnergies, 2023, 16 (12), pp.4739. ⟨10.3390/en16124739⟩
Article dans une revue
hal-04431859v1
|
||
Sécurité économique des PME par la protection du cycle du savoirRevue Internationale d’Intelligence Économique, 2010, 2 (2), pp.251-262
Article dans une revue
hal-02271534v1
|
|||
New tools for distributed diagnosis and preventive maintenance decision support7e Congrès International de Génie Industriel - CIGI'2007, Jun 2007, Trois-Rivières, Québec, Canada
Communication dans un congrès
hal-03091048v1
|
|||
|
Spatial patterns of the French rail strikes from social networks using weighted k-nearest neighbourInternational Journal of Social Network Mining, 2020, 3 (1), pp.52. ⟨10.1504/IJSNM.2020.105745⟩
Article dans une revue
hal-03296912v1
|
||
|
Agents Network on a Grid: An Approach with the Set of Circulant OperatorsInternational journal of mathematical and computational methods (IJMCM), 2008, 2 (11), pp.879-884. ⟨10.5281/zenodo.1075378⟩
Article dans une revue
hal-03044965v1
|
||
|
Thirty-six Full Matrix Forms of the Pascal Triangle: Derivation and Symmetry RelationsScientific African, 2021, 13, pp.e00932. ⟨10.1016/j.sciaf.2021.e00932⟩
Article dans une revue
hal-03321158v1
|
||
Modeling cumulative effects in life cycle assessment: The case of fertilizer in wheat production contributing to the global warming potentialScience of the Total Environment, 2014, 481, pp.588-595. ⟨10.1016/j.scitotenv.2014.02.020⟩
Article dans une revue
hal-02271184v1
|
|||
A matrix approach for threat assessment on human capital in SMEsINTERNATIONAL JOURNAL OF BUSINESS AND MANAGEMENT STUDIES, 2011, 3 (2), pp.10
Article dans une revue
hal-02269058v1
|
|||
3ème rapport d'avancement du projet CPER CyNIC[Rapport de recherche] ANR (Agence Nationale de la Recherche - France); Université de technologie de Troyes. 2014
Rapport
hal-02519506v1
|
|||
Disaster Early Warning and Relief: A Human-Centered ApproachImproving Disaster Resilience and Mitigation - IT Means and Tools, pp.135-151, 2014, ⟨10.1007/978-94-017-9136-6_9⟩
Chapitre d'ouvrage
hal-02307925v1
|
|||
The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Jun 2012, Liverpool, United Kingdom. pp.813-819
Communication dans un congrès
hal-02274771v1
|
|||
A smartphone-based online social network trust evaluation systemSocial Network Analysis and Mining, 2013, 3 (4), pp.1293-1310. ⟨10.1007/s13278-013-0138-4⟩
Article dans une revue
hal-02271996v1
|
|||
CyS : Cybercriminalité & SmartphonesSurveillance, Sûreté, Sécurité des Grands Systèmes 2011, Oct 2011, Valenciennes, France
Communication dans un congrès
hal-02519457v1
|
|||
NEW FORMULATION OF ADOMIAN POLYNOMIALS APPLIED TO HAMILTON-JACOBI EQUATIONSFar East Journal of Applied Mathematics, 2003, Volume 11 (Issue 1), pp.1 - 15
Article dans une revue
hal-00343170v1
|
|||
REPLOT: REtrieving Profile Links On Twitter for suspicious networks detectionthe 2013 IEEE/ACM International Conference, Aug 2013, Niagara, United States. pp.1307-1314, ⟨10.1145/2492517.2500234⟩
Communication dans un congrès
hal-02274663v1
|
|||
Multi-layered graph-based model for social engineering vulnerability assessmentthe 2015 IEEE/ACM International Conference, Aug 2015, Paris, France. pp.1480-1488, ⟨10.1145/2808797.2808899⟩
Communication dans un congrès
hal-02519406v1
|
|||
Robust clustering methods for detecting smartphone's abnormal behavior2014 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2014, Istanbul, France. pp.2552-2557, ⟨10.1109/WCNC.2014.6952790⟩
Communication dans un congrès
hal-02342675v1
|
|||
Social Engineering Threat Assessment Using a Multi-Layered Graph-Based ModelTrends in Social Network Analysis, pp.107-133, 2017, 978-3-319-53420-6. ⟨10.1007/978-3-319-53420-6_5⟩
Chapitre d'ouvrage
hal-02519466v1
|
|||
Protection des infrastructures informatiques des entreprises face à la cybercriminalitéWorkshop Interdisciplinaire sur la Sécurité Globale (WISG 2013), Jan 2013, Troyes, France
Communication dans un congrès
hal-02519454v1
|
|||
Familiar strangers detection in online social networksthe 2013 IEEE/ACM International Conference, Aug 2013, Niagara, United States. pp.1175-1182
Communication dans un congrès
hal-02273265v1
|
|||
The Impact of Natural Disasters on Critical Infrastructures: A Domino Effect-based StudyJournal of Homeland Security and Emergency Management, 2014, 11 (2), pp.217-241. ⟨10.1515/jhsem-2012-0077⟩
Article dans une revue
hal-02365385v1
|