Skip to Main content Skip to Navigation

Search by documents



hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
hal-01344572v1  Conference papers
Willem de GroefDeepak SubramanianJohns MartinFrank PiessensDesmet Lieven. Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication
31st Annual ACM Symposium on Applied Computing (SAC 2016), Apr 2016, Pisa, Italy. p.2103-2110, ⟨10.1145/2851613.2851804⟩
hal-01355407v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET
13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
hal-01344472v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
hal-01355402v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparing inter-domain routing protocol assessment tools for MANET
2016 IEEE International Conference on Communications (ICC), May 2016, Kuala Lumpur, Malaysia. ⟨10.1109/icc.2016.7511313⟩
hal-01344471v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process
2016 IS&T International Symposium on Electronic Imaging (EI 2016), Feb 2016, San Francisco, California, United States
hal-01361081v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
hal-01334612v1  Poster communications
Mouna Hkimi. Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion
Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01587915v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
hal-01334608v1  Conference papers
Eric TotelMouna HkimiMichel HurfinMourad LeslousYvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock
SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France
hal-01344469v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. ⟨10.1145/2947626.2947651⟩
hal-02415350v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparison of Inter-MANET routing protocol evaluation tools
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Jul 2016, Paris, France. pp.1-6, ⟨10.1109/NOTERE.2016.7745822⟩