Skip to Main content Skip to Navigation

Search by documents



...
hal-00916744v1  Conference papers
Emmanuelle AnceaumeAina Ravoaja. Incentive-Based Robust Reputation Mechanism for P2P Services
International Conference on Principles of Distributed Systems (OPODIS), 2006, France. pp.12
...
hal-01099200v1  Conference papers
Emmanuelle AnceaumeAjoy K.DattaMaria GradinariuGwendal SimonAntonino Virgillito. A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe
Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), Jul 2006, Lisboa, Portugal. pp.22 - 22, ⟨10.1109/ICDCS.2006.12⟩
...
hal-00916758v1  Conference papers
Vincent GramoliEmmanuelle AnceaumeAntonino Virgillito. SQUARE: Scalable Quorum-Based Atomic Memory with Local Reconfiguration
ACM Symposium on Applied Computing (SAC), 2007, France. pp.12
...
hal-00916734v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardAina RavoajaFrancisco Brasiliero. PeerCube: an Hypercube-based P2P Overlay Robust against Collusion and Churn
IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008, France. pp.12
...
hal-00780724v1  Conference papers
Olivier HeenGilles GuetteThomas Genet. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, 2009, Belgium. pp.1-11
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
...
hal-00995211v1  Reports
Jérémy BriffautPatrice ClementeJean-François LalandeJonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas
[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
...
inria-00588203v1  Conference papers
Izabela MoiseMichel HurfinJean-Pierre Le NarzulFrédéric Majorczyk. Evaluation du caractère adaptatif d'un protocole de consensus de type "Fast Paxos
13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel), 2011, Cap Estérel, France
...
tel-00660467v1  Theses
Mohamed Ali Ayachi. Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite
Cryptographie et sécurité [cs.CR]. Université Rennes 1; Université Européenne de Bretagne; Université 7 Novembre à Carthage, 2011. Français
hal-00659023v1  Conference papers
Michel HurfinIzabela MoiseJean-Pierre Le Narzul. An Adaptive Fast Paxos for Making Quick Everlasting Decisions
International Conference on Advanced Information Networking and Applications (AINA), IEEE, Mar 2011, Biopolis, Singapore. pp.208-215, ⟨10.1109/AINA.2011.73⟩
hal-00659026v1  Conference papers
Michel HurfinIzabela MoiseLinda ZeghacheNadjib Badache. Cloud-Based Support for Transactional Mobile Agents
25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, IEEE, Mar 2011, Biopolis, Singapore. pp.190-197, ⟨10.1109/WAINA.2011.138⟩
...
tel-00660274v1  Theses
Jean-Marie Borello. Étude du métamorphisme viral : modélisation, conception et détection
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2011. Français
hal-00660053v1  Conference papers
Sébastien GambsHo Ai ThanhEsma Aïmeur. Maintaining sovereignty on personal data on social networking sites
PATS - 1st International Conference on Privacy and Accountability - 2011, Apr 2011, Berlin, Germany
...
hal-00659022v1  Conference papers
Izabela MoiseMichel HurfinJean-Pierre Le NarzulFrédéric Majorczyk. Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type "Fast Paxos
Vingtième Rencontres francophones du Parallelisme (Renpar'20), May 2011, Saint malo, France
...
inria-00586875v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno SericolaFrédéric Tronel. Modélisation et Évaluation des Attaques Ciblées dans un Overlay Structuré
CFIP 2011 - Colloque Francophone sur l Ingénierie des Protocoles, UTC, May 2011, Sainte Maxime, France
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie BlandinSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
hal-00657244v1  Journal articles
Guillaume Piolle. Outils informatiques pour la protection de la vie privée
Interstices, INRIA, 2011, http://interstices.info/outils-protection
...
hal-00650095v1  Conference papers
Emmanuelle AnceaumeBruno SericolaRomaric LudinardFrédéric Tronel. Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12
...
tel-00659694v1  Theses
Jonathan-Christofer Demay. Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2011. Français
hal-00657248v1  Journal articles
Guillaume PiolleYves Demazeau. Representing privacy regulations with deontico-temporal operators
Web Intelligence and Agent Systems, IOS Press, 2011, 9 (3), pp.209-226. ⟨10.3233/WIA-2011-0215⟩