Skip to Main content Skip to Navigation

Search by documents

hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
hal-00659023v1  Conference papers
Michel HurfinIzabela MoiseJean-Pierre Le Narzul. An Adaptive Fast Paxos for Making Quick Everlasting Decisions
International Conference on Advanced Information Networking and Applications (AINA), IEEE, Mar 2011, Biopolis, Singapore. pp.208-215, ⟨10.1109/AINA.2011.73⟩
hal-00659026v1  Conference papers
Michel HurfinIzabela MoiseLinda ZeghacheNadjib Badache. Cloud-Based Support for Transactional Mobile Agents
25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, IEEE, Mar 2011, Biopolis, Singapore. pp.190-197, ⟨10.1109/WAINA.2011.138⟩
hal-00660054v1  Conference papers
Sébastien GambsOlivier HeenChristophe Potin. A comparative privacy analysis of geosocial networks
SPRINGL - 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - 2011, Nov 2011, Chicago, United States
hal-00656933v1  Conference papers
Valérie Viet Triem TongRadoniaina AndriatsimandefitraStéphane GellerSimon BocheFrédéric Tronel et al.  Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android
Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France
hal-00657244v1  Journal articles
Guillaume Piolle. Outils informatiques pour la protection de la vie privée
Interstices, INRIA, 2011,
hal-00657248v1  Journal articles
Guillaume PiolleYves Demazeau. Representing privacy regulations with deontico-temporal operators
Web Intelligence and Agent Systems, IOS Press, 2011, 9 (3), pp.209-226. ⟨10.3233/WIA-2011-0215⟩
hal-00660053v1  Conference papers
Sébastien GambsHo Ai ThanhEsma Aïmeur. Maintaining sovereignty on personal data on social networking sites
PATS - 1st International Conference on Privacy and Accountability - 2011, Apr 2011, Berlin, Germany
hal-03226341v1  Reports
Jérémy BriffautPatrice ClementeJean-François LalandeJonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas
[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
hal-00660055v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. Show me how you move and I will tell you who you are
Transactions on Data Privacy, IIIA-CSIC, 2011, 4 (2), pp.103-126