Skip to Main content Skip to Navigation

Search by documents



hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
hal-01334612v1  Poster communications
Mouna Hkimi. Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion
Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01344473v1  Poster communications
Kun HeCyrielle FeronGaëtan Le GuelvouitChristophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms
IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014
hal-01246441v1  Poster communications
Damien CrémilleuxFrédéric MajorczykNicolas Prigent. VEGAS: Visualizing, Exploring and Grouping AlertS
International Symposium on Visualization for Cyber Security - VizSec 2015, Oct 2015, Chicago, United States