Loading...
Last publications
-
Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila. Demo: towards reproducible evaluations of ML-based IDS using data-driven approaches. Bo Luo; Xiaojing Liao; Jun Xu. CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Oct 2024, Salt Lake City, UT, United States. Association for Computing Machinery, CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp.5081-5083, 2024, ⟨10.1145/3658644.3691368⟩. ⟨hal-04879181⟩
Keywords
Modeling
Scheduling
Triplet Markov chains
Sensor networks
Context
Computer networks
Service composition
Performance evaluation
Network security
Distributed systems
Authentication
Augmented reality
WSN
RFID
Biometrics
Semantic web
Semantics
Cloud computing
Formal methods
Machine learning
VANET
Privacy
Cryptography
5G
Performance
Access control
Internet of things
Sécurité
P2P
Ubiquitous computing
IMS
Sensors
QoS
NFV
Wireless networks
Business process
Internet des objets
Wireless sensor networks
Classification
Clustering
Particle filtering
Web services
Virtualization
Signal processing
Social media
LTE
Ontology
MPEG
Formal verification
Context-awareness
Intrusion detection
Hidden Markov chains
Optimisation
Reputation
Passive testing
Trust
Reinforcement learning
Interoperability
MPEG-4
Anomaly detection
Hidden Markov models
Event-B
Routing
Optimization
Performance analysis
Internet of Things
Energy consumption
Testing
IoT
Cloud Computing
Data mining
Verification
Middleware
Deep learning
Quality of service
Simulation
Security
Model checking
NGN
Compression
Software engineering
Resource allocation
Cloud
Indoor positioning
Data security
Social networks
Blockchain
Neural networks
SDN
Energy efficiency
Ontologies
MANETs
Artificial intelligence
Augmented Reality
Indoor localization
SIP
Mobility
Scalability
Monitoring
QoE
Number of fulltext
2 389
Number of reference
4 777
COLLABORATIONS
Submissions evolution