Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Alata, Eric"'
Autor:
Roux, Jonathan, Alata, Eric, Auriol, Guillaume, Kaâniche, Mohamed, Nicomette, Vincent, Cayre, Romain
Publikováno v:
International Symposium on Network Computing and Applications - IEEE-NCA 2018, Nov 2018, Cambridge, Massachusetts, United States. 2018
Internet-of-Things (IoT) devices are nowadays massively integrated in daily life: homes, factories, or public places. This technology offers attractive services to improve the quality of life as well as new economic markets through the exploitation o
Externí odkaz:
http://arxiv.org/abs/1811.03934
Publikováno v:
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2018, Luxembourg City, France. IEEE, 2018
This paper proposes a new obfuscation technique of a communication protocol that is aimed at making the reverse engineering of the protocol more complex. The obfuscation is based on the transformation of protocol message format specification. The obf
Externí odkaz:
http://arxiv.org/abs/1807.09464
Autor:
Alata, Eric
Le développement de méthodes permettant l'observation et la caractérisation d'attaques sur Internet est important pour améliorer notre connaissance sur le comportement des attaquants. En particulier, les informations issues de ces analyses sont u
Externí odkaz:
http://tel.archives-ouvertes.fr/tel-00280126
http://tel.archives-ouvertes.fr/docs/00/28/01/26/PDF/THESE_ERIC_ALATA_TSF.pdf
http://tel.archives-ouvertes.fr/docs/00/28/01/26/PDF/THESE_ERIC_ALATA_TSF.pdf
Autor:
Sanogo, Lamoussa1,2 (AUTHOR) lamoussa.sanogo@laas.fr, Alata, Eric1,2 (AUTHOR), Takacs, Alexandru1,3 (AUTHOR), Dragomirescu, Daniela1,2 (AUTHOR) lamoussa.sanogo@laas.fr
Publikováno v:
Sensors (14248220). Feb2023, Vol. 23 Issue 4, p2353. 22p.
Autor:
Loubet, Gaël1 (AUTHOR) gael.loubet@laas.fr, Alata, Eric1 (AUTHOR), Takacs, Alexandru2 (AUTHOR), Dragomirescu, Daniela1 (AUTHOR) gael.loubet@laas.fr
Publikováno v:
Sensors (14248220). Feb2023, Vol. 23 Issue 4, p1849. 18p.
Publikováno v:
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006) (25/06/2006) 119-124
Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support
Externí odkaz:
http://arxiv.org/abs/0704.0861
Publikováno v:
Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high i
Externí odkaz:
http://arxiv.org/abs/0704.0858
Autor:
Bourdon, Malcolm, Alata, Eric, Kaâniche, Mohamed, Migliore, Vincent, Nicomette, Vincent, Laarouchi, Youssef
International audience; The last recent years witnessed a massive and fast deployment of Internet of Things (IoT) devices. Most of them have not been designed with a careful analysis of security requirements, which makes them likely to include multip
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::aa7ca54baa282881e87fe363aecc9a47
https://hal.laas.fr/hal-03328254/document
https://hal.laas.fr/hal-03328254/document
Publikováno v:
Embedded Real Time Systems (ERTS)
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020
International audience; Intelligent Transportation Systems have a variety of application, from improving transportation safety and traffic management to infotainment. The development of these systems includes the deployment in the vehicle of sensors
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0d07639fc0a32276fcf60534b14b34a0
https://hal.laas.fr/hal-03139783/document
https://hal.laas.fr/hal-03139783/document
Publikováno v:
Symposium sur la Sécurité des Technologies de l'Information et des Communications
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019)
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019)
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258
International audience; Nous assistons aujourd'hui à une mutation profonde de l'industrie informatique : des systèmes connectés d'un nouveau genre, désignés sous le terme d'objets connectés, apparaissent au sein des foyers et des entreprises, o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::37b40c2f334375d1ca74b1257e86a515
https://hal.archives-ouvertes.fr/hal-02268774
https://hal.archives-ouvertes.fr/hal-02268774