Filtrer vos résultats
- 57
- 35
- 66
- 20
- 2
- 2
- 1
- 1
- 92
- 3
- 3
- 2
- 3
- 4
- 4
- 7
- 6
- 8
- 10
- 4
- 5
- 14
- 3
- 8
- 4
- 1
- 1
- 2
- 3
- 87
- 5
- 74
- 9
- 8
- 5
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 92
- 22
- 19
- 19
- 9
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
92 résultats
|
Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metricsSECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩
Communication dans un congrès
hal-01332331v1
|
||
A service dependency model for cost-sensitive intrusion responseESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩
Communication dans un congrès
istex
hal-01164601v1
|
|||
One year of SSL internet measurementACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20
Communication dans un congrès
hal-00768258v1
|
|||
Limitation of Honeypot/Honeynet Databases to Enhance Alert CorrelationInternational Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N
Article dans une revue
hal-00738459v1
|
|||
Limitation of honeypot/honeynet databases to enhance alert correlationMMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩
Communication dans un congrès
hal-00747133v1
|
|||
Self-defending clouds : myth and realitiesC&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France
Communication dans un congrès
hal-01464909v1
|
|||
|
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩
Communication dans un congrès
hal-01154820v1
|
||
|
Security and privacy in communication networksSpringer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩
Ouvrages
hal-03628450v1
|
||
|
IoT devices recognition through network traffic analysisBIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩
Communication dans un congrès
hal-01994156v1
|
||
|
Enabling automated threat response through the use of a dynamic security policyJournal in Computer Virology (JCV), 2007, 3 (3), pp.195-210
Article dans une revue
hal-00439845v1
|
||
|
XeNA: an access negotiation framework using XACMLAnnals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩
Article dans une revue
hal-00448945v1
|
||
|
Combining technical and financial impacts for countermeasure selectionAIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩
Communication dans un congrès
hal-01257903v1
|
||
Dynamic risk management response system to handle cyber threatsFuture Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩
Article dans une revue
hal-01745780v1
|
|||
Towards multi-layer autonomic isolation of cloud computing and networking resourcesCSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland
Communication dans un congrès
hal-01300936v1
|
|||
Challenges for advanced security monitoring : the MASSIF projectTrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩
Communication dans un congrès
hal-00747573v1
|
|||
An adaptive mitigation framework for handling suspicious network flows via MPLS policiesNORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩
Communication dans un congrès
istex
hal-01269681v1
|
|||
Policy enforcement point modelSECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩
Communication dans un congrès
hal-01263380v1
|
|||
|
Towards autonomic DDoS mitigation using Software Defined NetworkingSENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩
Communication dans un congrès
hal-01257899v1
|
||
|
Hybrid Risk Assessment Model Based on Bayesian Networks11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩
Communication dans un congrès
hal-01393744v1
|
||
ArOMA: an SDN based autonomic DDoS mitigation frameworkComputers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩
Article dans une revue
hal-01648031v1
|
|||
Détection d'intrusions : corrélation d'alertesRevue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p
Article dans une revue
hal-00356418v1
|
|||
|
Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021
Proceedings/Recueil des communications
hal-03535661v1
|
||
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI indexComputers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩
Article dans une revue
hal-01255033v1
|
|||
One Year of Internet SSL measurementACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20
Communication dans un congrès
hal-00770473v1
|
|||
RetroVisor : nested virtualization for multi IaaS VM availabilityComPAS 2013 : Conférence en Parallélisme, Architecture et Système, Jan 2013, Grenoble, France. 2013
Poster de conférence
hal-01287046v1
|
|||
A survey on game-theoretic approaches for intrusion detection and response optimizationACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩
Article dans une revue
hal-02009646v1
|
|||
Time series modeling for IDS alert managementACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113
Communication dans un congrès
hal-00143467v1
|
|||
|
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri NetInternational Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩
Article dans une revue
hal-00858941v1
|
||
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Communication dans un congrès
hal-01255089v1
|
||
|
Methodology of a network simulation in the context of an evaluation: application to an IDSICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩
Communication dans un congrès
hal-02176684v1
|