Skip to Main content Skip to Navigation

Search by documents

hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
hal-01888300v2  Journal articles
Yves MocquardBruno SericolaEmmanuelle Anceaume. Probabilistic Analysis of Rumor Spreading Time
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2020, 32 (1), ⟨10.1287/ijoc.2018.0845⟩
hal-01247495v1  Journal articles
Luca CaviglioneMauro GaggeroJean-François LalandeWojciech MazurczykMarcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. ⟨10.1109/TIFS.2015.2510825⟩
hal-02416015v1  Journal articles
Samiya HamadoucheMohamed MezghicheJean-Louis Lanet. Hiding a fault enabled virus through code construction
Journal of Computer Virology and Hacking Techniques, Springer, 2019, pp.1-22. ⟨10.1007/s11416-019-00340-z⟩
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43
hal-02381411v1  Journal articles
Claude KirchnerLudovic Mé. Défis de la recherche scientifique en cyber-sécurité
Annales des Mines - Enjeux Numériques, Conseil général de l'Économie, ministère de l'Économie et des Finances, 2019, pp.1-15
hal-01397403v1  Journal articles
Emmanuelle AnceaumeYann BusnelErnst Schulte-GeersBruno Sericola. Optimization Results for a Generalized Coupon Collector Problem
Journal of Applied Probability, Cambridge University press, 2015, 53 (2), pp.622-629. ⟨10.1017/jpr.2016.27⟩
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
hal-00926485v1  Journal articles
Emmanuelle AnceaumeYann BusnelSébastien Gambs. On the Power of the Adversary to Solve the Node Sampling Problem
Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Berlin / Heidelberg, 2013, 8290, pp.102-126. ⟨10.1007/978-3-642-45269-7_5⟩
hal-00736918v1  Journal articles
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. Performance evaluation of large-scale dynamic systems
ACM SIGMETRICS Performance Evaluation Review, Association for Computing Machinery, 2012, 39 (4), pp.108-117. ⟨10.1145/2185395.2185447⟩
hal-01634353v1  Journal articles
Emmanuelle AnceaumeYann Busnel. Lightweight Metric Computation for Distributed Massive Data Streams
Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Berlin / Heidelberg, 2017, 10430 (33), pp.1--39. ⟨10.1007/978-3-662-55696-2_1⟩
hal-03131262v1  Journal articles
Aimad BeradyMathieu JaumeValérie Viet Triem TongGilles Guette. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
IEEE Transactions on Network and Service Management, IEEE, 2021, Special Issue on Latest Developments for Security Management of Networks and Services, 18 (2), pp.1321 - 1333. ⟨10.1109/TNSM.2021.3056999⟩
hal-03085774v1  Journal articles
Ronny ChevalierDavid PlaquinChris DaltonGuillaume Hiet. Intrusion Survivability for Commodity Operating Systems
Digital Threats: Research and Practice, Association for Computing Machinery, 2020, 1 (4), pp.1-30. ⟨10.1145/3419471⟩
hal-01091576v1  Journal articles
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. A Privacy-Preserving NFC Mobile Pass for Transport Systems
EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. ⟨10.4108/mca.2.5.e4⟩
hal-00998708v1  Journal articles
Emmanuelle AnceaumeYann Busnel. A Distributed Information Divergence Estimation over Data Streams
IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers, 2014, 25 (2), pp.478-487. ⟨10.1109/TPDS.2013.101⟩
hal-00736916v1  Journal articles
Emmanuelle AnceaumeFrançois CastellaBruno Sericola. Analysis of a large number of Markov chains competing for transitions
International Journal of Systems Science, Taylor & Francis, 2014, 45 (3), pp.232--240. ⟨10.1080/00207721.2012.704090⟩
hal-01242268v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated data
Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩