Skip to Main content Skip to Navigation


hal-01246441v1  Poster communications
Damien CrémilleuxFrédéric MajorczykNicolas Prigent. VEGAS: Visualizing, Exploring and Grouping AlertS
International Symposium on Visualization for Cyber Security - VizSec 2015, Oct 2015, Chicago, United States
...
hal-00354356v1  Conference papers
Ali KoudriDenis AulagnierDidier VojtisekPhilippe SoulardChristophe Moy et al.  Using MARTE in a Co-Design Methodology
MARTE UML profile workshop co-located with DATE'08, Mar 2008, Munich, Germany. 6 p
hal-00356418v1  Journal articles
Hervé DebarBenjamin MorinFrédéric CuppensFabien AutrelLudovic Mé et al.  Détection d'intrusions : corrélation d'alertes
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2004, 23, 32 p
hal-00356403v1  Conference papers
Elvis TombiniHervé DebarLudovic MéMireille Ducassé. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
hal-01072519v1  Conference papers
Marwa ChafiiJacques PalicotRémi Gribonval. A PAPR upper bound of generalized waveforms for multi-carrier modulation systems
6th International Symposium on Communications, Control, and Signal Processing - ISCCSP 2014, May 2014, Athènes, Greece. pp.461 - 464, ⟨10.1109/ISCCSP.2014.6877913⟩
hal-00735997v1  Conference papers
Romaric LudinardEric TotelFrédéric TronelVincent NicometteMohamed Kaâniche et al.  Detecting Attacks Against Data in Web Applications
CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8
hal-00919178v1  Conference papers
Simon BocheGilles GuetteChristophe BidanNicolas Prigent. NoName, un protocole de routage ad hoc respectant la vie privée
SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.122-134
hal-00919227v1  Conference papers
Nathanaël AubertMohamed Ali AyachiChristophe BidanNicolas Prigent. The Hecate Attack
SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215
hal-00268410v1  Conference papers
J.-M. BorelloLudovic MéEric Filiol. Techniques d'obscurcissement de code pour virus métamorphes
Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France
...
hal-01311032v1  Poster communications
Mounir Nasr AllahGuillaume HietMuhammad Abdul WahabPascal CotretGuy Gogniat et al.  HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking
Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Apr 2016, Paris, France. 2016
hal-00269302v1  Conference papers
Michel HurfinJean-Pierre Le NarzulFrédéric MajorczykLudovic MéAyda Saidane et al.  A dependable intrusion detection architecture based on agreement services
Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie Blandin-ObernesserSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
hal-01334787v1  Conference papers
Marwa ChafiiJacques PalicotRémi GribonvalAlister G. Burr. Power Spectral Density Limitations of the Wavelet-OFDM System
2016 24th European Signal Processing Conference (EUSIPCO), Aug 2016, Budapest, Hungary. ⟨10.1109/eusipco.2016.7760484⟩
hal-00349883v1  Conference papers
Mehdi TalbiBenjamin MorinValérie Viet Triem TongAdel BouhoulaMohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM
Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France
...
hal-00606018v1  Conference papers
Meriam Ben GhorbelFrédéric CuppensNora Cuppens-BoulahiaDaniel Le MétayerGuillaume Piolle. Delegation of Obligations and Responsibility
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩