Skip to Main content Skip to Navigation


hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00349883v1  Conference papers
Mehdi TalbiBenjamin MorinValérie Viet Triem TongAdel BouhoulaMohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM
Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France
...
hal-01629733v2  Conference papers
Lilian BessonEmilie Kaufmann. Multi-Player Bandits Revisited
Algorithmic Learning Theory, Mehryar Mohri; Karthik Sridharan, Apr 2018, Lanzarote, Spain
...
hal-01705292v1  Conference papers
Lilian BessonEmilie KaufmannChristophe Moy. Aggregation of Multi-Armed Bandits Learning Algorithms for Opportunistic Spectrum Access
IEEE WCNC - IEEE Wireless Communications and Networking Conference, Apr 2018, Barcelona, Spain. ⟨10.1109/wcnc.2018.8377070⟩
...
hal-02049824v2  Conference papers
Rémi BonnefoiLilian BessonJulio Manco-VasquezChristophe Moy. Upper-Confidence Bound for Channel Selection in LPWA Networks with Retransmissions
The 1st International Workshop on Mathematical Tools and technologies for IoT and mMTC Networks Modeling, Philippe Mary, Samir Perlaza, Petar Popovski, Apr 2019, Marrakech, Morocco
...
hal-02006825v1  Conference papers
Lilian BessonRémi BonnefoiChristophe Moy. GNU Radio Implementation of MALIN: "Multi-Armed bandits Learning for Internet-of-things Networks
IEEE WCNC 2019 - IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. ⟨10.1109/WCNC.2019.8885841⟩
...
hal-02013847v1  Poster communications
Lilian Besson. Multi-Player Bandits Revisited
Séminaire « IETR : Interagir Evaluer Transmettre Réunir », Jun 2018, Vannes, France
...
hal-02144465v1  Conference papers
Christophe MoyLilian Besson. Decentralized Spectrum Learning for IoT Wireless Networks Collision Mitigation
ISIoT 2019 - 1st International Workshop on Intelligent Systems for the Internet of Things, May 2019, Santorin, Greece
...
hal-02152243v1  Conference papers
Lilian BessonEmilie Kaufmann. Analyse non asymptotique d'un test séquentiel de détection de rupture et application aux bandits non stationnaires
GRETSI 2019 - XXVIIème Colloque francophone de traitement du signal et des images, Aug 2019, Lille, France
...
hal-00408871v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardFrédéric TronelF. BrasilieroBruno Sericola. Analytical Study of Adversarial Strategies in Cluster-based Overlays
2nd International Workshop on Reliability, Availability, and Security, 2009, Hiroshima, Japan. pp.12, ⟨10.1109/PDCAT.2009.62⟩
...
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
...
hal-00650095v1  Conference papers
Emmanuelle AnceaumeBruno SericolaRomaric LudinardFrédéric Tronel. Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12
...
hal-00156447v1  Conference papers
Valérie Viet Triem TongHervé SibertJérémy LecoeurMarc Girault. FingerKey, un cryptosystème biométrique pour l'authentification
Conférence sur la Sécurité et Architectures Réseaux, Jun 2007, annecy, France
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
hal-02013839v1  Poster communications
Rémi BonnefoiLilian Besson. Multi-Armed Bandit Learning in IoT Networks
Journée des Doctorants de l'IETR, Jul 2017, Rennes, France
hal-00269302v1  Conference papers
Michel HurfinJean-Pierre Le NarzulFrédéric MajorczykLudovic MéAyda Saidane et al.  A dependable intrusion detection architecture based on agreement services
Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p
...
inria-00586875v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno SericolaFrédéric Tronel. Modélisation et Évaluation des Attaques Ciblées dans un Overlay Structuré
CFIP 2011 - Colloque Francophone sur l Ingénierie des Protocoles, UTC, May 2011, Sainte Maxime, France
hal-00789582v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno SericolaFrédéric TronelFrancisco Brasileiro. Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems. Brief announcement
11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), 2009, Lyon, France
...
hal-00420559v1  Conference papers
Emmanuelle AnceaumeF. BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems
The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Nov 2009, Lyon, France. pp. 773-774
...
hal-00606018v1  Conference papers
Meriam Ben GhorbelFrédéric CuppensNora Cuppens-BoulahiaDaniel Le MétayerGuillaume Piolle. Delegation of Obligations and Responsibility
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
hal-00606021v1  Book sections
Daniel Le MétayerGuillaume Piolle. Droits et obligations à l'ère numérique : protection de la vie privée
Lisette Calderan, Bernard Hidoine et Jacques Millet. L'usager numérique, ADBS éditions, pp.63-88, 2010, Sciences et Techniques de l'Information
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
...
inria-00472287v3  Conference papers
Daniel Le MétayerManuel MaarekEduardo MazzaMarie-Laure PotetStéphane Frénot et al.  Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study
ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩