Filtrer vos résultats
- 352
- 126
- 3
- 306
- 67
- 31
- 22
- 18
- 12
- 5
- 4
- 4
- 4
- 3
- 2
- 2
- 1
- 14
- 2
- 455
- 12
- 11
- 10
- 8
- 4
- 2
- 1
- 1
- 31
- 3
- 21
- 26
- 21
- 24
- 44
- 38
- 27
- 46
- 54
- 51
- 39
- 44
- 36
- 1
- 1
- 2
- 1
- 2
- 403
- 78
- 477
- 473
- 35
- 28
- 24
- 21
- 18
- 17
- 15
- 14
- 14
- 13
- 13
- 10
- 9
- 8
- 8
- 8
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 125
- 65
- 56
- 51
- 44
- 42
- 38
- 34
- 29
- 29
- 29
- 28
- 27
- 22
- 21
- 21
- 19
- 15
- 14
- 14
- 13
- 13
- 11
- 11
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
481 résultats
|
Isolating malicious code in Android malware in the wildMALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Oct 2019, Nantucket, United States
Communication dans un congrès
hal-02288116v1
|
||
|
Compiling Sandboxes: Formally Verified Software Fault IsolationESOP 2019 - 28th European Symposium on Programming, Apr 2019, Prague, Czech Republic. pp.499-524, ⟨10.1007/978-3-030-17184-1_18⟩
Communication dans un congrès
hal-02316189v1
|
||
|
Brief: Explicit and Tight Bounds of the Convergence Time of Average-based Population ProtocolsSIROCCO 2019 - 26th International Colloquium Structural Information and Communication Complexity, Jul 2019, L'Aquila, Italy. pp.1-4, ⟨10.1007/978-3-030-24922-9_29⟩
Communication dans un congrès
hal-02380422v1
|
||
Classification of ransomwares using Artificial Neural Networks and Bayesian NetworksThird International Conference on Intelligent Computing in Data Sciences, Nov 2019, Marrakech, Morocco
Communication dans un congrès
hal-02416086v1
|
|||
Formalization of Blockchain PropertiesPrinciples of Blockchain Systems, 2021
Chapitre d'ouvrage
hal-03439073v1
|
|||
|
Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesureC&ESAR 2020 - Computer & Electronics Security Applications Rendez-vous, Dec 2020, Rennes, France
Communication dans un congrès
hal-03139240v1
|
||
|
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. ⟨10.1109/ntms.2016.7792480⟩
Communication dans un congrès
hal-01417612v1
|
||
|
The complexity of unsupervised learning of lexicographic preferencesMPREF 2022 - 13th Multidisciplinary Workshop on Advances in Preference Handling, Jul 2022, Vienne, Austria. pp.1-8
Communication dans un congrès
hal-03784693v1
|
||
|
Finding MNEMON: Reviving Memories of Node EmbeddingsCCS 2022 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.2643-2657, ⟨10.1145/3548606.3559358⟩
Communication dans un congrès
hal-03893484v1
|
||
|
Stochastic Analysis of Average Based Distributed AlgorithmsJournal of Applied Probability, 2021, 58 (2), pp.394 - 410. ⟨10.1017/jpr.2020.97⟩
Article dans une revue
hal-02473856v1
|
||
|
Information flows at OS level unmask sophisticated Android malware14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.578-585, ⟨10.5220/0006476705780585⟩
Communication dans un congrès
hal-01535678v1
|
||
|
Handling Bitcoin Conflicts Through a Glimpse of StructureProceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Apr 2017, Marrakesh, Morocco. ⟨10.1145/3019612.3019657⟩
Communication dans un congrès
hal-01634368v1
|
||
|
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management ModeACSAC 2017 - 33rd Annual Computer Security Applications Conference, Dec 2017, Orlando, United States. pp.399-411, ⟨10.1145/3134600.3134622⟩
Communication dans un congrès
hal-01634566v1
|
||
|
Alternatives to Binary Routing Policies Applied to a Military MANET CoalitionIWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩
Communication dans un congrès
hal-01851409v1
|
||
Sycomore, a Directed Acyclic Graph of BlocksThe International Industrial & Academic Conference on Blockchain Technology - Chain-In, Jul 2018, Porto, Portugal
Communication dans un congrès
hal-01888302v1
|
|||
|
Sharing and replaying attack scenarios with MoiraiRESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France
Communication dans un congrès
hal-01533275v1
|
||
|
Abusing Android Runtime for Application ObfuscationSAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
Communication dans un congrès
hal-02877815v1
|
||
|
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary ModificationSILM 2021 - Workshop on the Security of Software / Hardware Interfaces, Sep 2021, digital event, Austria. pp.86-95, ⟨10.1109/EuroSPW54576.2021.00016⟩
Communication dans un congrès
hal-03340008v1
|
||
|
An Information Divergence Estimation over Data Streams11th IEEE International Symposium on Network Computing and Applications (IEEE NCA12), Aug 2012, Cambridge, MA, United States. pp.Number 72
Communication dans un congrès
hal-00725097v1
|
||
|
Identifying Global Icebergs in Distributed Streams34th International Symposium on Reliable Distributed Systems (SRDS), Sep 2015, Montreal, Canada. pp.10, ⟨10.1109/SRDS.2015.19⟩
Communication dans un congrès
hal-01194511v1
|
||
|
Identifier des icebergs parmi des flux de données distribuésALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016, Bayonne, France
Communication dans un congrès
hal-01303873v1
|
||
|
Safety Analysis of Bitcoin Improvement Proposals2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, Oct 2016, Cambridge, United States
Communication dans un congrès
hal-01397685v1
|
||
|
FixMe : détection répartie de défaillances isolées15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4
Communication dans un congrès
hal-00818650v1
|
||
Scalable and Secure Polling in Dynamic Distributed Networks31st International Symposium on Reliable Distributed Systems (SRDS), Oct 2012, Irvine, California, United States
Communication dans un congrès
hal-00723566v1
|
|||
|
Markov Chains Competing for Transitions: Application to Large-Scale Distributed SystemsMethodology and Computing in Applied Probability, 2013, 15 (2), pp.305--332. ⟨10.1007/s11009-011-9239-6⟩
Article dans une revue
hal-00650081v1
|
||
Information Flow Policies vs MalwareIAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
Communication dans un congrès
hal-00909406v1
|
|||
The Hecate AttackSAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215
Communication dans un congrès
hal-00919227v1
|
|||
A proactive routing protocol for wireless ad hoc networks assuring some privacyHotWiSec '13, Apr 2013, Budapest, Hungary. pp.25-30, ⟨10.1145/2463183.2463190⟩
Communication dans un congrès
hal-00920036v1
|
|||
|
ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contactRendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
Communication dans un congrès
hal-01154374v1
|
||
|
La protection des données personnelles, un enjeu organisationnel et techniqueFlux - Cahiers scientifiques internationaux Réseaux et territoires, 2013, 274, pp.VIII-IX
Article dans une revue
hal-00845803v1
|