|
||
---|---|---|
hal-00763751v1
Conference papers
Netzob : un outil pour la rétro-conception de protocoles de communication SSTIC 2012, Jun 2012, Rennes, France. pp.43 |
||
hal-01246441v1
Poster communications
VEGAS: Visualizing, Exploring and Grouping AlertS International Symposium on Visualization for Cyber Security - VizSec 2015, Oct 2015, Chicago, United States |
||
hal-00354356v1
Conference papers
Using MARTE in a Co-Design Methodology MARTE UML profile workshop co-located with DATE'08, Mar 2008, Munich, Germany. 6 p |
||
hal-00356418v1
Journal articles
Détection d'intrusions : corrélation d'alertes Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2004, 23, 32 p |
||
hal-00356403v1
Conference papers
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p |
||
hal-00606065v1
Conference papers
Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC |
||
hal-00761354v1
Conference papers
User Defined Control Flow Policy for Web Service Orchestration C&ESAR 2012, Nov 2012, Rennes, France. pp.NC |
||
hal-01072519v1
Conference papers
A PAPR upper bound of generalized waveforms for multi-carrier modulation systems 6th International Symposium on Communications, Control, and Signal Processing - ISCCSP 2014, May 2014, Athènes, Greece. pp.461 - 464, ⟨10.1109/ISCCSP.2014.6877913⟩ |
||
hal-01131975v2
Conference papers
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings 9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩ |
||
hal-00735997v1
Conference papers
Detecting Attacks Against Data in Web Applications CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8 |
||
hal-00736034v1
Conference papers
Designing information flow policies for Android's operating system IEEE ICC 2012, Jun 2012, Ottawa, Canada |
||
hal-00736020v1
Conference papers
AMORES: an architecture for mobiquitous resilient systems ARMOR'12, Apr 2012, Sibiu, Romania. Article N°7 (7p.), ⟨10.1145/2222436.2222443⟩ |
||
hal-00919178v1
Conference papers
NoName, un protocole de routage ad hoc respectant la vie privée SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.122-134 |
||
hal-00920036v1
Conference papers
A proactive routing protocol for wireless ad hoc networks assuring some privacy HotWiSec '13, Apr 2013, Budapest, Hungary. pp.25-30, ⟨10.1145/2463183.2463190⟩ |
||
hal-00919227v1
Conference papers
The Hecate Attack SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215 |
||
hal-00268410v1
Conference papers
Techniques d'obscurcissement de code pour virus métamorphes Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France |
||
hal-01311032v1
Poster communications
HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Apr 2016, Paris, France. 2016 |
||
hal-00269302v1
Conference papers
A dependable intrusion detection architecture based on agreement services Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p |
||
hal-00606014v1
Conference papers
The Coprelobri project: the logical approach to privacy 2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France |
||
hal-01334787v1
Conference papers
Power Spectral Density Limitations of the Wavelet-OFDM System 2016 24th European Signal Processing Conference (EUSIPCO), Aug 2016, Budapest, Hungary. ⟨10.1109/eusipco.2016.7760484⟩ |
||
hal-00349883v1
Conference papers
Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France |
||
hal-00353059v1
Journal articles
A logic-based model to support alert correlation in intrusion detection Information Fusion, Elsevier, 2009, 10 (4), pp.285-299. ⟨10.1016/j.inffus.2009.01.005⟩ |
||
hal-00606061v1
Conference papers
Alert correlation in intrusion detection: Combining AI-based approaches for exploiting security operators' knowledge and preferences Security and Artificial Intelligence (SecArt), Jul 2011, Barcelona, Spain. pp.NC |
||
hal-00919211v1
Other publications
Vers une catégorisation par objectif des outils de visualisation pour la sécurité 2013 |
||
hal-01311045v1
Conference papers
A portable approach for SoC-based Dynamic Information Flow Tracking implementations 11ème Colloque du GDR SoC/SiP, Jun 2016, Nantes, France |
||
hal-00735993v1
Journal articles
User Data on Androïd Smartphone Must be Protected ERCIM News, ERCIM, 2012, pp.Page 18 |
||
hal-00736045v1
Conference papers
A taint marking approach to confidentiality violation detection AISC 2012, Jan 2012, Melbourne, Australia. pp.83-90 |
||
hal-00735995v1
Journal articles
Visualization for Monitoring Network Security Events ERCIM News, ERCIM, 2012, pp.Page 31 |
||
hal-00736023v1
Conference papers
Privacy Policy Requirements for Distributed Social Network Systems APVP'12, Jun 2012, Groix, France |
||
hal-00606018v1
Conference papers
Delegation of Obligations and Responsibility 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩ |
||
|