Filtrer vos résultats
- 33
- 21
- 33
- 7
- 5
- 5
- 3
- 1
- 54
- 2
- 1
- 7
- 5
- 3
- 5
- 6
- 9
- 5
- 4
- 6
- 3
- 1
- 53
- 1
- 49
- 8
- 5
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 54
- 22
- 8
- 7
- 7
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
54 résultats
|
|
triés par
|
Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedingsSpringer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5
Ouvrages
hal-01450264v1
|
|||
A trusted knowledge management system for multi-layer threat analysisTRUST 2014 : 7th International Conference on Trust and Trustworthy Computing , Jun 2014, Heraklion, Greece. Springer International Publishing, pp.214 - 215, 2014, ⟨10.1007/978-3-319-08593-7_18⟩
Poster de conférence
hal-01263387v1
|
|||
|
AJNA : anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLSBADGERS 2015 : 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Nov 2015, Kyoto, Japan. pp.74 - 84, ⟨10.1109/BADGERS.2015.019⟩
Communication dans un congrès
hal-01453228v1
|
||
|
Usage control policy enforcement in SDN-based clouds: a dynamic availability service use caseHPCC 2016 : 18th IEEE International Conference on High Performance Computing and Communications, Dec 2016, Sydney, Australia. pp.578 - 585, ⟨10.1109/HPCC-SmartCity-DSS.2016.0087⟩
Communication dans un congrès
hal-01449235v1
|
||
|
A survey of smart home IOT device classification using machine learning-based network traffic analysisIEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩
Article dans une revue
hal-03787447v1
|
||
Towards a 5G security architecture: articulating software-defined security and security as a service5G-NS 2018: Workshop on 5G Networks Security, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, ⟨10.1145/3230833.3233251⟩
Communication dans un congrès
hal-01988053v1
|
|||
Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedingsSpringer, pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5
Ouvrages
hal-01864973v1
|
|||
|
Adaptive policy-driven attack mitigation in SDNXDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩
Communication dans un congrès
hal-01649980v1
|
||
|
Solving security constraints for 5G slice embedding: a proof-of-conceptComputers and Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩
Article dans une revue
hal-02387073v1
|
||
ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networksACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, ⟨10.1145/3576915.3624027⟩
Communication dans un congrès
hal-04325353v1
|
|||
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Communication dans un congrès
hal-01255089v1
|
||
|
Information and Communications Security11149, Springer International Publishing, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-01950-1⟩
Proceedings/Recueil des communications
hal-04187775v1
|
||
ML: DDoS Damage Control with MPLSNordSec 2016, Nov 2016, Oulu, Finland. pp.101--116, ⟨10.1007/978-3-319-47560-8_7⟩
Communication dans un congrès
hal-01387569v1
|
|||
|
Interactions between artificial intelligence and cybersecurity to protect future networksAnnals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.727-729. ⟨10.1007/s12243-022-00935-6⟩
Article dans une revue
hal-04164335v1
|
||
|
Data-driven evaluation of intrusion detectors: a methodological frameworkFPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩
Communication dans un congrès
hal-04055085v1
|
||
Policy enforcement point modelSECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩
Communication dans un congrès
hal-01263380v1
|
|||
|
Towards autonomic DDoS mitigation using Software Defined NetworkingSENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩
Communication dans un congrès
hal-01257899v1
|
||
|
Hybrid Risk Assessment Model Based on Bayesian Networks11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩
Communication dans un congrès
hal-01393744v1
|
||
ArOMA: an SDN based autonomic DDoS mitigation frameworkComputers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩
Article dans une revue
hal-01648031v1
|
|||
|
Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021
Proceedings/Recueil des communications
hal-03535661v1
|
||
|
Evaluation Framework for ML-based IDSRESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France
Poster de conférence
hal-04164441v1
|
||
Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. ProceedingsSpringer, 9404, pp.638, 2015, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-26361-8
Ouvrages
hal-01453167v1
|
|||
|
IoT devices recognition through network traffic analysisBIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩
Communication dans un congrès
hal-01994156v1
|
||
|
Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseauxRESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3
Communication dans un congrès
hal-04165396v1
|
||
|
VARIoT: vulnerability and attack repository for IoTRESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En ligne, France
Poster de conférence
hal-04165400v1
|
||
|
GRIFIN: cognitive and programmable security for resilient next-generation networksRESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France
Poster de conférence
hal-04165398v1
|
||
|
Combining technical and financial impacts for countermeasure selectionAIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩
Communication dans un congrès
hal-01257903v1
|
||
|
Classification of SSL servers based on their SSL handshake for automated security assessmentBADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩
Communication dans un congrès
hal-01332339v1
|
||
|
Machine learning for IoT network monitoringRESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3
Communication dans un congrès
hal-02438733v1
|
||
Network visibility-aware blacklist generationICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15
Communication dans un congrès
hal-01987693v1
|
- 1
- 2