Filtrer vos résultats
- 57
- 35
- 66
- 20
- 2
- 2
- 1
- 1
- 92
- 3
- 3
- 2
- 3
- 4
- 4
- 7
- 6
- 8
- 10
- 4
- 5
- 14
- 3
- 8
- 4
- 1
- 1
- 2
- 3
- 87
- 5
- 74
- 9
- 8
- 5
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 92
- 22
- 19
- 19
- 9
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
92 résultats
|
Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metricsSECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩
Communication dans un congrès
hal-01332331v1
|
||
A service dependency model for cost-sensitive intrusion responseESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩
Communication dans un congrès
istex
hal-01164601v1
|
|||
One year of SSL internet measurementACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20
Communication dans un congrès
hal-00768258v1
|
|||
Limitation of Honeypot/Honeynet Databases to Enhance Alert CorrelationInternational Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N
Article dans une revue
hal-00738459v1
|
|||
Limitation of honeypot/honeynet databases to enhance alert correlationMMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩
Communication dans un congrès
hal-00747133v1
|
|||
Self-defending clouds : myth and realitiesC&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France
Communication dans un congrès
hal-01464909v1
|
|||
|
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩
Communication dans un congrès
hal-01154820v1
|
||
|
Security and privacy in communication networksSpringer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩
Ouvrages
hal-03628450v1
|
||
|
IoT devices recognition through network traffic analysisBIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩
Communication dans un congrès
hal-01994156v1
|
||
|
Enabling automated threat response through the use of a dynamic security policyJournal in Computer Virology (JCV), 2007, 3 (3), pp.195-210
Article dans une revue
hal-00439845v1
|
||
|
XeNA: an access negotiation framework using XACMLAnnals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩
Article dans une revue
hal-00448945v1
|
||
|
Combining technical and financial impacts for countermeasure selectionAIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩
Communication dans un congrès
hal-01257903v1
|
||
Dynamic risk management response system to handle cyber threatsFuture Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩
Article dans une revue
hal-01745780v1
|
|||
Automated saturation mitigation controlled by deep reinforcement learningICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩
Communication dans un congrès
hal-03124039v1
|
|||
|
Anomalous communications detection in IoT networks using sparse autoencodersNCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-5, ⟨10.1109/NCA.2019.8935007⟩
Communication dans un congrès
hal-02423336v1
|
||
|
On automatic network environment cloning for facilitating cybersecurity training and testingRESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3
Communication dans un congrès
hal-02438757v1
|
||
Formalization of viruses and malware through process algebrasWAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩
Communication dans un congrès
hal-01355337v1
|
|||
VESPA : multi-layered self-protection for cloud resourcesICAC '12 : The 9th ACM International Conference on Autonomic Computing, Sep 2012, San José, United States. pp.155-160, ⟨10.1145/2371536.2371564⟩
Communication dans un congrès
hal-00738174v1
|
|||
Cross-domain vulnerabilities over social networksCASoN '12 : 4th International Conference on Computational Aspects of Social Networks, Nov 2012, Sao Carlos, Brazil. pp.8-13, ⟨10.1109/CASoN.2012.6412370⟩
Communication dans un congrès
hal-00813344v1
|
|||
Attribute-based mining process for the organization-based access control modelTRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩
Communication dans un congrès
hal-01275020v1
|
|||
|
Towards network resiliency with AI driven automated load sharing in content delivery environmentsRESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En Ligne, France
Poster de conférence
hal-04165399v1
|
||
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP TrafficAnnual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p
Communication dans un congrès
hal-00356403v1
|
|||
Caching P2P traffic: what are the benefits for an ISP?9th International Conference on Networks - ICN 2010, Apr 2010, Menuires, France. pp.NC
Communication dans un congrès
hal-00534574v1
|
|||
|
An n-sided polygonal model to calculate the impact of cyber security eventsCRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩
Communication dans un congrès
hal-01487752v1
|
||
Towards multi-layer autonomic isolation of cloud computing and networking resourcesCSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland
Communication dans un congrès
hal-01300936v1
|
|||
Challenges for advanced security monitoring : the MASSIF projectTrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩
Communication dans un congrès
hal-00747573v1
|
|||
Policy enforcement point modelSECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩
Communication dans un congrès
hal-01263380v1
|
|||
|
Towards autonomic DDoS mitigation using Software Defined NetworkingSENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩
Communication dans un congrès
hal-01257899v1
|
||
|
Hybrid Risk Assessment Model Based on Bayesian Networks11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩
Communication dans un congrès
hal-01393744v1
|
||
Détection d'intrusions : corrélation d'alertesRevue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p
Article dans une revue
hal-00356418v1
|