125 results  save search


...
hal-00852244v1  Conference papers
Ivan StudniaVincent NicometteEric AlataYves DeswarteMohamed Kaâniche et al.  A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks
The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12
...
hal-00734858v1  Journal articles
Laurence LizéMireille Bruyère. Contrat de travail et sécurité des parcours sur le marché du travail
Économies et sociétés, Développement, croissance et progrès - Presses de l'ISMEA - Paris, 2012, 6 (34), pp.1129-1155
...
tel-00142168v1  Habilitation à diriger des recherches
Mohamed Kaâniche. Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances
Réseaux et télécommunications [cs.NI]. Institut National Polytechnique de Toulouse - INPT, 1999
inria-00527630v1  Journal articles
Yannick ChevalierMichael Rusinowitch. Decidability of Equivalence of Symbolic Derivations
Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.263-292. ⟨10.1007/s10817-010-9199-5⟩
hal-00755947v1  Conference papers
Tigran AvanesovYannick ChevalierMichael RusinowitchMathieu Turuani. Towards the Orchestration of Secured Services under Non-disclosure Policies.
6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, Oct 2012, St. Petersburg, Russia. pp.130-145, ⟨10.1007/978-3-642-33704-8_12⟩
...
tel-00280126v1  Theses
Eric Alata. Observation, caractérisation et modélisation de processus d'attaques sur Internet
Réseaux et télécommunications [cs.NI]. INSA de Toulouse, 2007. Français
...
hal-01070141v1  Conference papers
Philippe Owezarski. Unsupervised Classification and Characterization of Honeypot Attacks
10th International Conference on Network and Service Management, Nov 2014, Rio de Janeiro, Brazil
...
tel-00667635v1  Theses
Mohamed Mahdi. Architectures réseaux pour le partage de contenus multimédias avec garantie de qualité de service
Autre [cs.OH]. Université Paul Sabatier - Toulouse III, 2011. Français
...
hal-01567075v1  Conference papers
Eduardo B. FernandezBrahim Hamid. A pattern for network functions virtualization
20th European Conference on Pattern Language of Programs (EuroPlop 2015), Jul 2015, Kloster Irsee, Germany. pp. 1-9
...
hal-02346074v1  Conference papers
Romain CayreVincent NicometteGuillaume AuriolEric AlataMohamed Kaâniche et al.  Mirage: towards a Metasploit-like framework for IoT
2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany
...
tel-01115455v1  Theses
Rodolphe Ortalo. Évaluation quantitative de la sécurité des systèmes d’information
Cryptographie et sécurité [cs.CR]. INP DE TOULOUSE, 1998. Français
hal-00176315v1  Conference papers
Anas Abou El KalamYves Deswarte. Access Control for Critical Infractructures
VI International Congress on Secure Telematic Applications in National and International Projects, OTAN, Nov 2006, Minsk, Belarus. pp.22-34
hal-00176312v1  Conference papers
Anas Abou El KalamYves DeswarteAmine BaïnaMohamed Kaâniche. Access Control for Collaborative Systems: A Web Services Based Approach
IEEE ICWS (IEEE International Conference on Web Services), Jul 2007, Salt Lake City, United States. pp.1064-1072
hal-00176357v1  Conference papers
Mohammed Gad El RabAnas Abou El Kalam. Testing Intrusion Detection Systems: An Engineered Approach
International Conference on Software Engineering and Applications (SEA 2006), Nov 2006, United States. pp.N/A
...
hal-00667917v1  Conference papers
Pedro CasasJohan MazelPhilippe Owezarski. Steps towards autonomous network security: unsupervised detection of network attacks
4th IFIP International Conference on New Technologies, Mobility and Security (NTMS'2011), Feb 2011, Paris, France. 6p
...
inria-00586865v1  Conference papers
Johan MazelPedro CasasYann LabitPhilippe Owezarski. Détection non supervisée d'anomalies du trafic
CFIP 2011 - Colloque Francophone sur l Ingénierie des Protocoles, UTC, May 2011, Sainte Maxime, France
...
hal-00140367v1  Conference papers
Mohamed KaânicheYves DeswarteEric AlataMarc DacierVincent Nicomette. Empirical analysis and statistical modeling of attack processes based on honeypots
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Jun 2006, France. pp.119-124
inria-00557707v1  Conference papers
Yannick ChevalierDenis LugiezMichael Rusinowitch. Towards an Automatic Analysis of Web Service Security
6th International Symposium on Frontiers of Combining Systems - FroCoS'07, Sep 2007, Liverpool, United Kingdom. pp.133-147, ⟨10.1007/978-3-540-74621-8_9⟩
...
hal-00607912v1  Conference papers
Laurence LizéMireille Bruyère. Mobilité professionnelle : une approche en termes de segmentation
XXXes journées de l'Association d'Economie sociale " Transformations et innovations économiques et sociales en Europe : quelles sorties de crise ? Regards interdisciplinaires ", 2010, Charleroi, Belgique. pp.337-355
...
hal-01223182v1  Conference papers
Brahim HamidChristian Percebois. Model-based Specification and Validation of Security and Dependability Patterns
6th International Symposium on Foundations & Practice of Security (FPS 2013), Oct 2013, La Rochelle, France. pp.65-82, ⟨10.1007/978-3-319-05302-8⟩
...
hal-01217218v1  Conference papers
Laure JaegerTom JorqueraSylvain LemouzyChristian GoguStéphane Segonds et al.  Uncertainty propagation in multi-agent systems for multidisciplinary optimization problems
10th World Congress on Structural and Multidisciplinary Optimization (WCSMO 10), May 2013, Orlando, Florida, United States. pp. 1-10