Skip to Main content Skip to Navigation

Search by documents



hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
inria-00617866v1  Conference papers
Emmanuelle AnceaumeYann BusnelSébastien Gambs. Characterizing the Adversarial Power in Uniform and Ergodic Node Sampling
The 1st International Workshop on Algorithms and Models for Distributed Event Processing (AlMoDEP '11) collocated with the 25th International Symposium on Distributed Computing (DISC 2011), Sep 2011, Rome, Italy
...
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie BlandinSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
...
hal-00688352v1  Conference papers
Emmanuelle AnceaumeYann BusnelSébastien Gambs. AnKLe: détection automatique d'attaques par divergence d'information
14èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), 2012, La Grande Motte, France. pp.1-4
...
tel-00660467v1  Theses
Mohamed Ali Ayachi. Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite
Cryptographie et sécurité [cs.CR]. Université Rennes 1; Université Européenne de Bretagne; Université 7 Novembre à Carthage, 2011. Français
hal-00736946v1  Journal articles
Sébastien Gambs. Inference attacks on geolocated data
ERCIM News, ERCIM, 2012, pp.23
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
hal-00659023v1  Conference papers
Michel HurfinIzabela MoiseJean-Pierre Le Narzul. An Adaptive Fast Paxos for Making Quick Everlasting Decisions
International Conference on Advanced Information Networking and Applications (AINA), IEEE, Mar 2011, Biopolis, Singapore. pp.208-215, ⟨10.1109/AINA.2011.73⟩
...
hal-00763377v1  Conference papers
Paul Lajoie-Mazenc. Système de réputation préservant la vie privée
3ième édition Atelier Protection de la vie privée, Nov 2012, Groix, France
hal-00659026v1  Conference papers
Michel HurfinIzabela MoiseLinda ZeghacheNadjib Badache. Cloud-Based Support for Transactional Mobile Agents
25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, IEEE, Mar 2011, Biopolis, Singapore. pp.190-197, ⟨10.1109/WAINA.2011.138⟩
hal-00724829v1  Conference papers
Mohammad AlagganSébastien GambsAnne-Marie Kermarrec. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom Filters
14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Oct 2012, Toronto, Canada
...
dumas-00725216v1  Master thesis
Simon Boche. Protection de la vie privée dans les réseaux mobiles ubiquitaires
Réseaux et télécommunications [cs.NI]. 2012
hal-00660054v1  Conference papers
Sébastien GambsOlivier HeenChristophe Potin. A comparative privacy analysis of geosocial networks
SPRINGL - 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - 2011, Nov 2011, Chicago, United States
...
tel-00659694v1  Theses
Jonathan-Christofer Demay. Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2011. Français
...
dumas-00725335v1  Master thesis
Antoine Rault. Privacy implications of geosocial proximity
Distributed, Parallel, and Cluster Computing [cs.DC]. 2012