index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

HIP Graph theory Costs Industries Microcontrollers OPC UA CAM Certificate Cybersecurity Arabic Natural Language Processing Demi-treillis à médianes Misbehavior Detection Classification Named Data Networking Anomaly detection Vehicular networks Data centers Virtualization and Cloud Computing Cybersécurité Computer architecture Apprentissage automatique Authentication Connected vehicles Secure Elements NP-completeness Twin-Free Graphs Boolean Satisfiability Problems Wireless communication Protocols Integrity Access Control Domination Combinatorial optimization Software Symmetric difference distance Bent Actuators Attack graph Certificate-less PKI Classification algorithms Complexity Theory Industrial Environment Internet of Things IoT Machine learning Sécurité Lattice-Based Cryptography Servers Industry Algorithm Access control Bridge User-Centric Identity Internet Graph PKI ETSI Privacy Countermeasure Cryptography HSM Polynomial Reduction Hardware Blockchain Dominating codes Certificate request Internet of Things IoT Dataset Resistance Communication V2X Clustering Dynamic attack graph Identifying codes Functional Encryption Simulation Cloud Computing Computer crime Ethereum Equivalence relations Information dissemination Finite fields Physical unclonable function Security Complexity Internet of things IoT Graph Theory Risk assessment Program processors Identifying Codes Decision Problems Blockchains C-ITS Complexité WSN Hardness Complexity theory Dynamic system OpenID Machine Learning Uniqueness of Solution

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays