Skip to Main content Skip to Navigation

Search by documents



hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
inria-00617866v1  Conference papers
Emmanuelle AnceaumeYann BusnelSébastien Gambs. Characterizing the Adversarial Power in Uniform and Ergodic Node Sampling
The 1st International Workshop on Algorithms and Models for Distributed Event Processing (AlMoDEP '11) collocated with the 25th International Symposium on Distributed Computing (DISC 2011), Sep 2011, Rome, Italy
...
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie BlandinSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
...
tel-00660467v1  Theses
Mohamed Ali Ayachi. Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite
Cryptographie et sécurité [cs.CR]. Université Rennes 1; Université Européenne de Bretagne; Université 7 Novembre à Carthage, 2011. Français
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
hal-00659023v1  Conference papers
Michel HurfinIzabela MoiseJean-Pierre Le Narzul. An Adaptive Fast Paxos for Making Quick Everlasting Decisions
International Conference on Advanced Information Networking and Applications (AINA), IEEE, Mar 2011, Biopolis, Singapore. pp.208-215, ⟨10.1109/AINA.2011.73⟩
hal-00659026v1  Conference papers
Michel HurfinIzabela MoiseLinda ZeghacheNadjib Badache. Cloud-Based Support for Transactional Mobile Agents
25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, IEEE, Mar 2011, Biopolis, Singapore. pp.190-197, ⟨10.1109/WAINA.2011.138⟩
hal-00660054v1  Conference papers
Sébastien GambsOlivier HeenChristophe Potin. A comparative privacy analysis of geosocial networks
SPRINGL - 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - 2011, Nov 2011, Chicago, United States
...
tel-00659694v1  Theses
Jonathan-Christofer Demay. Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2011. Français
hal-00656933v1  Conference papers
Valérie Viet Triem TongRadoniaina AndriatsimandefitraStéphane GellerSimon BocheFrédéric Tronel et al.  Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android
Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France
...
hal-00659022v1  Conference papers
Izabela MoiseMichel HurfinJean-Pierre Le NarzulFrédéric Majorczyk. Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type "Fast Paxos
Vingtième Rencontres francophones du Parallelisme (Renpar'20), May 2011, Saint malo, France
...
tel-00660274v1  Theses
Jean-Marie Borello. Étude du métamorphisme viral : modélisation, conception et détection
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2011. Français
...
hal-00650095v1  Conference papers
Emmanuelle AnceaumeBruno SericolaRomaric LudinardFrédéric Tronel. Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12
hal-00657244v1  Journal articles
Guillaume Piolle. Outils informatiques pour la protection de la vie privée
Interstices, INRIA, 2011, http://interstices.info/outils-protection
hal-00657248v1  Journal articles
Guillaume PiolleYves Demazeau. Representing privacy regulations with deontico-temporal operators
Web Intelligence and Agent Systems, IOS Press, 2011, 9 (3), pp.209-226. ⟨10.3233/WIA-2011-0215⟩
hal-00660053v1  Conference papers
Sébastien GambsHo Ai ThanhEsma Aïmeur. Maintaining sovereignty on personal data on social networking sites
PATS - 1st International Conference on Privacy and Accountability - 2011, Apr 2011, Berlin, Germany
...
inria-00588203v1  Conference papers
Izabela MoiseMichel HurfinJean-Pierre Le NarzulFrédéric Majorczyk. Evaluation du caractère adaptatif d'un protocole de consensus de type "Fast Paxos
13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel), 2011, Cap Estérel, France
hal-03226341v1  Reports
Jérémy BriffautPatrice ClementeJean-François LalandeJonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas
[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
...
tel-00658981v2  Theses
Izabela Moise. Efficient Agreement Protocols for Asynchronous Distributed Systems
Distributed, Parallel, and Cluster Computing [cs.DC]. Université Rennes 1, 2011. English