Skip to Main content Skip to Navigation

hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-03426543v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Sandwich: An Algorithm for Discovering Relevant Link Keys in an LKPS Concept Lattice
ICFCA 2021 - 16th international conference on formal concept analysis, Jun 2021, Strasbourg /Virtuel, France. pp.243-251, ⟨10.1007/978-3-030-77867-5_15⟩
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
CLA 2020 - The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn / Virtual, Estonia
hal-03512110v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. LKSA : un algorithme de sélection de clés de liage dans des données RDF guidée par des paires de classes
Extraction et Gestion des Connaissances EGC2021, Jan 2021, Montpellier, France. pp.205-216
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-03482955v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Non-Redundant Link Keys in RDF Data: Preliminary Steps
FCA4AI 2021 - 9th Workshop on What can FCA do for Artificial Intelligence?, Aug 2021, Montréal, Canada. pp.1-6
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
hal-03036292v1  Poster communications
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichaël RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-03036350v1  Conference papers
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France
tel-03508140v1  Theses
Ahmad Abboud. Efficient Rules Management Algorithms in Software Defined Networking
Computer Science [cs]. University of Lorraine, 2021. English
inria-00326077v1  Conference papers
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP Authentication
Information Assurance and Security ( ISIAS), Sep 2008, Naples, Italy. pp.237-242, ⟨10.1109/IAS.2008.29⟩
inria-00405356v1  Journal articles
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP authentication
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318
inria-00619236v1  Conference papers
Mohamed Ahmed AbdelraheemCéline BlondeauMaria Naya-PlasenciaMarion VideauErik Zenner. Cryptanalysis of ARMADILLO2
Advances in cryptology - ASIACRYPT 2011, Dec 2011, Séoul, South Korea. pp.308-326, ⟨10.1007/978-3-642-25385-0⟩
hal-03376084v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheMatteo GolfarelliDominique MéryCarlos Ordonez. Model and Data Engineering. 8th International Conference, MEDI 2018, Proceedings
Model and Data Engineering. 8th International Conference, MEDI 2018, Oct 2018, Marrakesh, Morocco. Springer, 2018, Lecture Notes in Computer Science, 978-3-030-00855-0. ⟨10.1007/978-3-030-00856-7⟩
hal-01933975v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheDjamal BenslimaneMatteo GolfarelliStéphane Jean et al.  New Trends in Model and Data Engineering
MEDI 2018 - International Workshops, DETECT, MEDI4SG, IWCFS, REMEDY, Oct 2018, Marrakesh, Morocco. Communications in Computer and Information Science, Communications in Computer and Information Science (929), Springer, 2018, 978-3-030-02851-0. ⟨10.1007/978-3-030-02852-7⟩
hal-01987946v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre et al.  Efficient Resource Allocation for Multi-tenant Monitoring of Edge Infrastructures
PDP 2019 - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Feb 2019, Pavie, Italy. pp.1-8, ⟨10.1109/EMPDP.2019.8671621⟩
hal-01897570v3  Reports
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisXavier Lorca et al.  A Framework for Edge Infrastructures Monitoring
[Research Report] RR-9215, Orange Labs; Inria Nancy - Grand Est; IMT-Atlantique. 2018, pp.1-14
hal-01591161v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre. A Holistic Monitoring Service for Fog/Edge Infrastructures: a Foresight Study
The IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud 2017), Aug 2017, Prague, Czech Republic. pp.337-344, ⟨10.1109/FiCloud.2017.30⟩
inria-00107574v1  Conference papers
Imine AbdessamadPascal MolliGérald OsterMichaël Rusinowitch. Development of Transformation Functions Assisted by a Theorem Prover
Fourth International Workshop on Collaborative Editing 2002 - ACM CSCW'2002, 2002, Nouvelle-Orléans, USA, 8 p
tel-03256970v1  Habilitation à diriger des recherches
Imine Abdessamad. Partage de Données dans les Systèmes Collaboratifs : De la Synchronisation à la Protection des Données
Calcul parallèle, distribué et partagé [cs.DC]. Université de Lorraine, 2016
hal-02378889v1  Journal articles
Mohammed Riyadh AbdmeziemFrançois Charoy. Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2019
hal-01588490v2  Conference papers
Mohammed Riyadh AbdmeziemFrançois Charoy. Fault-tolerant and Scalable Key Management Protocol for IoT-based Collaborative Groups
SecureComm 2017 : 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara falls, Canada. pp.1-20
hal-02378897v1  Journal articles
Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
International Journal of Information and Computer Security, Inderscience, 2019
hal-01874495v1  Conference papers
Badr AbdullahIrina IllinaDominique Fohr. Dynamic Extension of ASR Lexicon Using Wikipedia Data
IEEE Workshop on Spoken and Language Technology (SLT), Dec 2018, Athènes, Greece
halshs-01450319v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. L'analyse syntaxique des SN de la forme N
Deuxièmes journées romanes, 2005, Toulouse, Unknown Region
hal-01613530v2  Journal articles
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Improved Complexity Bounds for Counting Points on Hyperelliptic Curves
Foundations of Computational Mathematics, Springer Verlag, 2019, 19 (3), pp.591-621. ⟨10.1007/s10208-018-9392-1⟩
hal-01816256v3  Conference papers
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Counting points on genus-3 hyperelliptic curves with explicit real multiplication
ANTS-XIII - Thirteenth Algorithmic Number Theory Symposium, Jul 2018, Madison, United States. pp.1--19