Filtrer vos résultats
- 90
- 11
- 64
- 29
- 6
- 1
- 1
- 5
- 1
- 101
- 5
- 9
- 2
- 4
- 6
- 9
- 11
- 5
- 4
- 13
- 8
- 4
- 6
- 2
- 4
- 6
- 3
- 86
- 15
- 70
- 57
- 10
- 8
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 101
- 25
- 24
- 20
- 16
- 16
- 16
- 12
- 11
- 9
- 9
- 9
- 7
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
101 résultats
Caractérisation des attaques DDoS générées par un Botcloud8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), Sep 2013, Mont de Marsan, France
Communication dans un congrès
hal-02611041v1
|
|||
|
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, China. pp.1-7, ⟨10.1109/SSIC.2018.8556668⟩
Communication dans un congrès
hal-04401199v1
|
||
Autonomic platform for security managementThe autonomic platform day, 29 September 2009, Sep 2009, Paris, France
Communication dans un congrès
hal-02623698v1
|
|||
Understanding botclouds from a system perspective: A principal component analysisNOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium, May 2014, Krakow, France. pp.1-9, ⟨10.1109/NOMS.2014.6838310⟩
Communication dans un congrès
hal-02342695v1
|
|||
CDBE: A cooperative way to improve end-to-end congestion control in mobile network2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2018, Limassol, France. pp.216-223, ⟨10.1109/WiMOB.2018.8589175⟩
Communication dans un congrès
hal-02342646v1
|
|||
Smart citiesCommunications of the ACM, 2016, 59 (8), pp.46-57. ⟨10.1145/2858789⟩
Article dans une revue
hal-02342662v1
|
|||
Detecting DDoS attacks using adversarial neural networkComputers and Security, 2023, 127, pp.103117. ⟨10.1016/j.cose.2023.103117⟩
Article dans une revue
hal-04370499v1
|
|||
3ème rapport d'avancement du projet CPER CyNIC[Rapport de recherche] ANR (Agence Nationale de la Recherche - France); Université de technologie de Troyes. 2014
Rapport
hal-02519506v1
|
|||
Performance evaluation of CQIC and TCP BBR in mobile network2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Feb 2018, Paris, France. pp.1-5, ⟨10.1109/ICIN.2018.8401585⟩
Communication dans un congrès
hal-02342645v1
|
|||
|
Content Pollution Quantification in Large P2P networks : a Measurement Study on KADP2P 2011 - 11th IEEE International Conference on Peer-to-Peer Computing, IEEE Communications Society, Aug 2011, Kyoto, Japan. pp.30-33, ⟨10.1109/P2P.2011.6038658⟩
Communication dans un congrès
inria-00619965v1
|
||
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applicationsAnnals of Telecommunications - annales des télécommunications, 2021, 76 (9-10), pp.617-632. ⟨10.1007/s12243-021-00846-y⟩
Article dans une revue
hal-03404239v1
|
|||
Clustering-based anomaly detection for smartphone applicationsNOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium, May 2014, Krakow, Poland. pp.1-4, ⟨10.1109/NOMS.2014.6838385⟩
Communication dans un congrès
hal-02342694v1
|
|||
La sécurité dans les systèmes de transports intelligents.Multi-System & Internet Security Cookbook (MISC), 2016
Article dans une revue
hal-02287424v1
|
|||
|
Cybersecurity in networkingAnnals of Telecommunications - annales des télécommunications, 2019, 74 (3-4), pp.123-124. ⟨10.1007/s12243-019-00706-w⟩
Article dans une revue
hal-02342638v1
|
||
Optimizing Intrusion Detection Using Global SPADE PreprocessorInternational Conference on Risks and Security of Internet and Systems (CRiSIS 2007), Jul 2007, Marrakech, Morocco. pp.23-28
Communication dans un congrès
hal-02623776v1
|
|||
Wormhole Attacks Detection in MANETs using Graph Theory10th edition of the French Seminar for Networks Management and Services (GRES'14), Dec 2014, Paris, France
Communication dans un congrès
hal-02531551v1
|
|||
Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT), Nov 2014, Delft, Netherlands. pp.7-12, ⟨10.1109/SCVT.2014.7046699⟩
Communication dans un congrès
hal-02342697v1
|
|||
|
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Communication dans un congrès
hal-01401284v1
|
||
|
ASROP : AD HOC Secure Routing ProtocolInternational journal of wireless & mobile networks (IJWMN), 2012, 4 (5), pp.1-20. ⟨10.5121/ijwmn.2012.4501⟩
Article dans une revue
hal-02272262v1
|
||
Snort-OO: Improving Intrusion Detection Performance by Snort Cooperation4th International Workshop on Management of Ubiquitous Communication and Services as part of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM 2007), May 2007, Munich, Germany
Communication dans un congrès
hal-02623765v1
|
|||
Diagnosing smartphone's abnormal behavior through robust outlier detection methods2013 Global Information Infrastructure Symposium, Oct 2013, Trento, Italy. pp.1-3
Communication dans un congrès
hal-02272999v1
|
|||
A Decentralized Approach to Make Application Layer Multicast Systems Dynamics-aware10èmes Journées Doctorales en Informatique et Réseaux, JDIR' 09, Feb 2009, Belfort, France
Communication dans un congrès
hal-02611023v1
|
|||
Towards a generic environment for the large-scale evaluation of peer-to-peer protocolsNetworking and Electronic Commerce Research Conference 2008, Sep 2008, Riva Del Garda, Italy
Communication dans un congrès
hal-02611026v1
|
|||
1er rapport d'avancement du projet CPER CyNIC[Research Report] ANR (Agence Nationale de la Recherche - France); Université de technologie de Troyes. 2012
Rapport
hal-02519498v1
|
|||
Protection of IT infrastructures against cybercrimeInterdisciplinary Workshop on Global Security (WISG 2013), Jan 2013, Troyes, France
Communication dans un congrès
hal-02519449v1
|
|||
Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment2022 5th Conference on Cloud and Internet of Things (CIoT), Mar 2022, Marrakech, Morocco. pp.24-31, ⟨10.1109/CIoT53061.2022.9766588⟩
Communication dans un congrès
hal-03860336v1
|
|||
TLS Early Data Resistance to Replay Attacks in Wireless Internet of ThingsGLOBECOM 2022 - 2022 IEEE Global Communications Conference, Dec 2022, Rio de Janeiro, France. pp.3539-3544, ⟨10.1109/GLOBECOM48099.2022.10001106⟩
Communication dans un congrès
hal-04370533v1
|
|||
|
MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratiqueRESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4
Communication dans un congrès
hal-03754082v1
|
||
A stochastic approach for packet dropping attacks detection in mobile Ad hoc networksComputer Networks, 2017, 121, pp.53-64. ⟨10.1016/j.comnet.2017.04.027⟩
Article dans une revue
hal-02342649v1
|
|||
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks2017 IEEE Global Communications Conference (GLOBECOM 2017), Dec 2017, Singapore, France. pp.1-6, ⟨10.1109/GLOCOM.2017.8253978⟩
Communication dans un congrès
hal-02342653v1
|