Filtrer vos résultats
- 59
- 52
- 2
- 65
- 27
- 10
- 8
- 3
- 112
- 1
- 2
- 4
- 7
- 11
- 11
- 10
- 5
- 5
- 7
- 7
- 6
- 9
- 1
- 7
- 1
- 6
- 3
- 2
- 3
- 2
- 4
- 105
- 8
- 112
- 13
- 13
- 9
- 5
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 113
- 15
- 11
- 10
- 9
- 9
- 7
- 7
- 7
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
113 résultats
|
Robust approach for host-overload detection based on dynamic safety parameterIEEE Ficloud (The 9th International Conference on Future Internet of Things and Cloud), Aug 2022, Rome, Italy. ⟨10.1109/FiCloud57274.2022.00044⟩
Communication dans un congrès
hal-03849513v1
|
||
Les cartes à puceLavoisier, 2013
Ouvrages
hal-02920496v1
|
|||
|
NDN-over-ZigBee: A ZigBee support for Named Data NetworkingFuture Generation Computer Systems, 2019, 93, pp.792-798. ⟨10.1016/j.future.2017.09.053⟩
Article dans une revue
hal-02411296v1
|
||
|
A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environmentInternational Journal of Information and Computer Security, 2022, 17 (3/4), pp.261. ⟨10.1504/IJICS.2022.122374⟩
Article dans une revue
hal-03688529v1
|
||
Towards secure identity management in smartphone environments2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135
Communication dans un congrès
hal-01126288v1
|
|||
|
Convergence in trusted computing and virtualized systems: A new dimension towards trusted intelligent systemThe 5th IFIP Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2016), Nov 2016, Paris, France. ⟨10.1109/PEMWN.2016.7842896⟩
Communication dans un congrès
hal-01462088v1
|
||
|
Middleware to Integrate Mobile Devices, Sensors and Cloud ComputingANT 2015 - 6th International Conference on Ambient Systems, Networks and Technologies, Jun 2015, Greenwich,London, United Kingdom. pp.234-243, ⟨10.1016/j.procs.2015.05.061⟩
Communication dans un congrès
hal-01160989v1
|
||
Virtualization techniques: challenges & opportunitiesMSPN 2016 : International Conference on Mobile, Secure and Programmable Networking, Jun 2016, Paris, France. pp.49 - 62, ⟨10.1007/978-3-319-50463-6_5⟩
Communication dans un congrès
hal-01462931v1
|
|||
|
Mobile, secure, and programmable networking : second international conference, MSPN 2016, Paris, France, June 1-3, 2016, revised selected papersSpringer, 10026, pp.225, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-50462-9. ⟨10.1007/978-3-319-50463-6⟩
Ouvrages
hal-01452777v1
|
||
Mobile, secure, and programmable networking : first international conference, MSPN 2015, Paris, France, June 15-17, 2015, selected papersSpringer international publishing, 9395, pp.175, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-25743-3
Ouvrages
hal-01269566v1
|
|||
Mise en œuvre d'une application, choix de solutions, performancesMise en oeuvre d?une application, choix de solutions, performances, 2013
Chapitre d'ouvrage
hal-01126444v1
|
|||
|
Secure and non-interactive k-NN classifier using symmetric fully homomorphic encryptionPrivacy in statistical databases (PSD'2022), Sep 2022, Paris, France. pp.142-154, ⟨10.1007/978-3-031-13945-1_11⟩
Communication dans un congrès
hal-03933277v1
|
||
|
Self-Organizing Maps Applied to Soil Conservation in Mediterranean Olive GrovesPEMWN2019 - 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling inWired andWireless Networks, Nov 2019, Paris, France
Communication dans un congrès
hal-02432848v1
|
||
Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE AlgorithmThe 16th IEEE International Conference on High Performance Computing and Communications, Aug 2014, X, France. pp.1117-1124
Communication dans un congrès
hal-01126443v1
|
|||
L?identité numérique dans le Cloud ComputingISTE. La gestion des identités numériques, pp.340, 2014, à paraître
Chapitre d'ouvrage
hal-01126447v1
|
|||
|
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuumIEEE International Conference on Network Softwarization (NetSoft 2022), Jun 2022, Milan, Italy. ⟨10.1109/NetSoft54395.2022.9844027⟩
Communication dans un congrès
hal-03768388v1
|
||
|
Handling security issues by using homomorphic encryption in multi-cloud environmentThe 14th International Conference on Ambient Systems, Networks and Technologies (ANT), Mar 2023, Leuven, Belgium
Communication dans un congrès
hal-03933238v1
|
||
Optimization of Ontology‐Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare SystemDac‐Nhuong Le Chintan Bhatt Mani Madhukar. Security Designs for the Cloud, Iot, and Social Networking, Scrivener Publishing, 2019, ⟨10.1002/9781119593171.ch13⟩
Chapitre d'ouvrage
hal-02425149v1
|
|||
|
RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, Apr 2016, Rome, Italy. pp.102-111, ⟨10.5220/0005874301020111⟩
Communication dans un congrès
hal-02425168v1
|
||
Identity management systems and interoperability in a heterogeneous environmentInt. Conf. on Advanced Technologies for Communications, Hanoi, Jan 2008, X, France. pp.243-246
Communication dans un congrès
hal-01125652v1
|
|||
Hybrid Machine Learning for Matchmaking in Digital Business EcosystemsEncyclopedia of Data Science and Machine Learning, IGI Global; IGI Global, pp.2817-2838, 2023, ⟨10.4018/978-1-7998-9220-5.ch168⟩
Chapitre d'ouvrage
hal-03617780v1
|
|||
Toward a Framework in Cloudlet-Based Architecture for a Real-Time Predictional Model2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Aug 2015, Beijing, China. pp.1016-1021, ⟨10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.190⟩
Communication dans un congrès
hal-02069781v1
|
|||
|
Exploring Formal Strategy Framework for the Security in IoT in e-health using Computational IntelligenceInternet of Things and Big Data Technologies for Next Generation Healthcare, Springer, 2017, 9783319497358. ⟨10.1007/978-3-319-49736-5_4⟩
Chapitre d'ouvrage
hal-02425163v1
|
||
|
A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacksIEEE International Conference on Security, Pattern Analysis, and Cybernetics, Jun 2021, Chengdu, China. pp.374-379, ⟨10.1109/SPAC53836.2021.9539947⟩
Communication dans un congrès
hal-03381663v1
|
||
|
A modified LOF based approach for outlier characterization in IoTAnnals of Telecommunications - annales des télécommunications, 2021, 76 (3-4), pp.145-153. ⟨10.1007/s12243-020-00780-5⟩
Article dans une revue
hal-03381644v1
|
||
An approach for unsupervised contextual anomaly detection and characterizationIntelligent Data Analysis, 2022, 26 (5), pp.1185-1209. ⟨10.3233/IDA-215906⟩
Article dans une revue
hal-03791193v1
|
|||
|
A lightweight forwarding strategy for Named Data Networking in low-end IoTJournal of Network and Computer Applications (JNCA), 2019, 148, pp.102445. ⟨10.1016/j.jnca.2019.102445⟩
Article dans une revue
hal-02334088v1
|
||
How to Manage Real-Time Transactions Overload in epsilon-data applications ?The 15th EuroMicro Real-Time Systems Conference (WIP Session), Porto, Jan 2003, X, France
Communication dans un congrès
hal-01124846v1
|
|||
Handling Overload and Data-relaxation Control in Distributed Real-Time Database SystemsInternational Journal of computer and their applications, 2008, 15, pp.187-200
Article dans une revue
hal-01125553v1
|
|||
Performance Evaluation of Java Card BytecodesWorkshop in Information Security Theory and Practices 2007: Smart Cards,Mobile and Ubiquitous Comput, Jan 2007, X, France. pp.127-137
Communication dans un congrès
hal-01125301v1
|