Skip to Main content Skip to Navigation

Search by documents



hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
hal-01241492v1  Conference papers
Sébastien GambsGuillaume Piolle. Les techniques d'effacement des données
Le droit à l'oubli numérique, enjeux et perspectives, Institut de l'Ouest : Droit et Europe, Mar 2015, Rennes, France
hal-01241807v1  Journal articles
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
hal-01221892v1  Journal articles
Guillaume Piolle. Protection des données personnelles dans le système d'information
Techniques de l'Ingenieur, Techniques de l'ingénieur, 2015, Sécurité des SI : organisation dans l'entreprise et législation, TIB458DUO (h5455), pp.21
hal-01344572v1  Conference papers
Willem de GroefDeepak SubramanianJohns MartinFrank PiessensDesmet Lieven. Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication
31st Annual ACM Symposium on Applied Computing (SAC 2016), Apr 2016, Pisa, Italy. p.2103-2110, ⟨10.1145/2851613.2851804⟩
hal-01355407v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET
13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
hal-01344472v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
hal-01355402v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparing inter-domain routing protocol assessment tools for MANET
2016 IEEE International Conference on Communications (ICC), May 2016, Kuala Lumpur, Malaysia. ⟨10.1109/icc.2016.7511313⟩
hal-01344471v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process
2016 IS&T International Symposium on Electronic Imaging (EI 2016), Feb 2016, San Francisco, California, United States
hal-01182303v1  Conference papers
Luca CaviglioneJean-François LalandeWojciech MazurczykSteffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩
hal-01361081v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
hal-01334612v1  Poster communications
Mouna Hkimi. Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion
Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01344473v1  Poster communications
Kun HeCyrielle FeronGaëtan Le GuelvouitChristophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms
IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada
hal-01344674v1  Directions of work or proceedings
Emmanuelle AnceaumeMaria Potop-ButucaruCachin Christian. Nineteenth International Conference on Principles of Distributed Systems (OPODIS)
LIPICS. Nineteenth International Conference on Principles of Distributed Systems (OPODIS), Dec 2015, Rennes, France. 2015
hal-01344687v1  Directions of work or proceedings
Antonio PuliafitoEmmanuelle AnceaumeTutschku KurtAvresky DimiterErik Maehle. Fourth IEEE Symposium on Network Cloud Computing and Applications, NCCA 2015
Jun 2015, Munich, Germany. IEEE, 2015, ISBN 978-1-4673-7741-6
hal-01587915v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01136768v1  Conference papers
Jean-François Lalande. Sécurité Android: exemples de malware
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc
hal-01244606v1  Conference papers
Sébastien GambsCarlos Eduardo Rosar Kos LassanceCristina Onete. The Not-so-distant Future: Distance-Bounding Protocols on Smartphones
14th Smart Card Research and Advanced Application Conference, Nov 2015, Bochum, Germany. p.209-224, ⟨10.1007/978-3-319-31271-2_13⟩
hal-01334608v1  Conference papers
Eric TotelMouna HkimiMichel HurfinMourad LeslousYvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock
SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France
hal-01344469v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. ⟨10.1145/2947626.2947651⟩
hal-02415350v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparison of Inter-MANET routing protocol evaluation tools
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Jul 2016, Paris, France. pp.1-6, ⟨10.1109/NOTERE.2016.7745822⟩
hal-01149471v1  Conference papers
Laurent GeorgetGuillaume PiolleFrédéric TronelValérie Viet Triem TongMathieu Jaume. Towards a Formal Semantics for System Calls in terms of Information Flow
Tenth International Conference on Systems (ICONS 2015), Apr 2015, Barcelone, Spain. pp.1-4
hal-01242786v1  Conference papers
Guillaume HietHervé DebarSélim MénouarVérène Houdebine. Etude comparative des formats d’alertes
C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148
hal-01246441v1  Poster communications
Damien CrémilleuxFrédéric MajorczykNicolas Prigent. VEGAS: Visualizing, Exploring and Grouping AlertS
International Symposium on Visualization for Cyber Security - VizSec 2015, Oct 2015, Chicago, United States
hal-01241511v1  Conference papers
Guillaume Piolle. La protection des données personnelles vue par un informaticien
Journées thématiques: Respect de la vie privée et services mobiles sans contact, May 2015, Meudon, France