Zobrazeno 1 - 10
of 98
pro vyhledávání: '"Debar, Hervé"'
Autor:
Lampropoulos, Konstantinos, Zarras, Apostolis, Lakka, Eftychia, Barmpaki, Polyanthi, Drakonakis, Kostas, Athanatos, Manos, Debar, Herve, Alexopoulos, Andreas, Sotiropoulos, Aristeidis, Tsakirakis, George, Dimakopoulos, Nikos, Tsolovos, Dimitris, Pocs, Matthias, Smyrlis, Michalis, Basdekis, Ioannis, Spanoudakis, Georgios, Mihaila, Ovidiu, Prelipcean, Bogdan, Salant, Eliot, Athanassopoulos, Sotiris, Papachristou, Petros, Ladakis, Ioannis, Chang, John, Floros, Evangelos, Smyrlis, Konstantinos, Besters, Rouven, Randine, Pietro, Lovaas, Karianna Fjeld, Cooper, John, Ilie, Iulia, Danciu, Gabriel, Khabbaz, Marwan Darwish
The healthcare sector is increasingly vulnerable to cyberattacks due to its growing digitalization. Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns. The
Externí odkaz:
http://arxiv.org/abs/2310.10139
Autor:
Shahid, Mustafizur, Debar, Hervé
When a new computer security vulnerability is publicly disclosed, only a textual description of it is available. Cybersecurity experts later provide an analysis of the severity of the vulnerability using the Common Vulnerability Scoring System (CVSS)
Externí odkaz:
http://arxiv.org/abs/2111.08510
Publikováno v:
2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Sep 2019, Cambridge, United States. pp.1-5
Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware are constant
Externí odkaz:
http://arxiv.org/abs/1912.11831
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP
Externí odkaz:
http://arxiv.org/abs/1711.06073
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
EPTCS 165, 2014, pp. 1-14
Research in information security has generally focused on providing a comprehensive interpretation of threats, vulnerabilities, and attacks, in particular to evaluate their danger and prioritize responses accordingly. Most of the current approaches p
Externí odkaz:
http://arxiv.org/abs/1411.0654
Autor:
Boutigny, François, Betgé-Brezetz, Stéphane, Blanc, Gregory, Lavignotte, Antoine, Debar, Hervé, Jmila, Houda
Publikováno v:
In Computers & Security February 2020 89
Since the seminal work from F. Cohen in the eighties, abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. But considering recent malware such as rootkits or k-ary codes, these viral models
Externí odkaz:
http://arxiv.org/abs/0902.0469
Most behavioral detectors of malware remain specific to a given language and platform, mostly PE executables for Windows. The objective of this paper is to define a generic approach for behavioral detection based on two layers respectively responsibl
Externí odkaz:
http://arxiv.org/abs/0902.0322
Publikováno v:
Journal of Computer Virology and Hacking Techniques; 20240101, Issue: Preprints p1-16, 16p