Skip to Main content Skip to Navigation

Search by documents



hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
hal-03136790v1  Directions of work or proceedings
Guillaume HietFrédéric TronelJean-Louis Lanet. Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genoa, IEEE, pp.681, 2020, ⟨10.1109/EuroSPW51379.2020.00097⟩
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
hal-01241492v1  Conference papers
Sébastien GambsGuillaume Piolle. Les techniques d'effacement des données
Le droit à l'oubli numérique, enjeux et perspectives, Institut de l'Ouest : Droit et Europe, Mar 2015, Rennes, France
hal-01241807v1  Journal articles
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
hal-01221892v1  Journal articles
Guillaume Piolle. Protection des données personnelles dans le système d'information
Techniques de l'Ingenieur, Techniques de l'ingénieur, 2015, Sécurité des SI : organisation dans l'entreprise et législation, TIB458DUO (h5455), pp.21
hal-01344572v1  Conference papers
Willem de GroefDeepak SubramanianJohns MartinFrank PiessensDesmet Lieven. Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication
31st Annual ACM Symposium on Applied Computing (SAC 2016), Apr 2016, Pisa, Italy. p.2103-2110, ⟨10.1145/2851613.2851804⟩
hal-01355407v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET
13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
hal-01344472v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
hal-01355402v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparing inter-domain routing protocol assessment tools for MANET
2016 IEEE International Conference on Communications (ICC), May 2016, Kuala Lumpur, Malaysia. ⟨10.1109/icc.2016.7511313⟩
hal-01344471v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process
2016 IS&T International Symposium on Electronic Imaging (EI 2016), Feb 2016, San Francisco, California, United States
hal-01182303v1  Conference papers
Luca CaviglioneJean-François LalandeWojciech MazurczykSteffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩
hal-01361081v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
hal-01334612v1  Poster communications
Mouna Hkimi. Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion
Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01344473v1  Poster communications
Kun HeCyrielle FeronGaëtan Le GuelvouitChristophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms
IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada
hal-01344674v1  Directions of work or proceedings
Emmanuelle AnceaumeMaria Potop-ButucaruCachin Christian. Nineteenth International Conference on Principles of Distributed Systems (OPODIS)
LIPICS. Nineteenth International Conference on Principles of Distributed Systems (OPODIS), Dec 2015, Rennes, France. 2015
hal-01888302v1  Conference papers
Emmanuelle Anceaume. Sycomore, a Directed Acyclic Graph of Blocks
The International Industrial & Academic Conference on Blockchain Technology - Chain-In, Jul 2018, Porto, Portugal
hal-01344687v1  Directions of work or proceedings
Antonio PuliafitoEmmanuelle AnceaumeTutschku KurtAvresky DimiterErik Maehle. Fourth IEEE Symposium on Network Cloud Computing and Applications, NCCA 2015
Jun 2015, Munich, Germany. IEEE, 2015, ISBN 978-1-4673-7741-6
hal-01587915v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01136768v1  Conference papers
Jean-François Lalande. Sécurité Android: exemples de malware
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc