Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Marc Lemercier"'
Publikováno v:
Transactions on emerging telecommunications technologies
Transactions on emerging telecommunications technologies, 2022, 33 (7), ⟨10.1002/ett.4456⟩
Transactions on emerging telecommunications technologies, 2022, 33 (7), ⟨10.1002/ett.4456⟩
International audience
Publikováno v:
2021 IEEE 46th Conference on Local Computer Networks (LCN)
The 46th IEEE Conference on Local Computer Networks (LCN) 2021
The 46th IEEE Conference on Local Computer Networks (LCN) 2021, Oct 2021, Edmonton (virtual), Canada. ⟨10.1109/LCN52139.2021.9524960⟩
LCN
The 46th IEEE Conference on Local Computer Networks (LCN) 2021
The 46th IEEE Conference on Local Computer Networks (LCN) 2021, Oct 2021, Edmonton (virtual), Canada. ⟨10.1109/LCN52139.2021.9524960⟩
LCN
International audience; In this paper, we propose a multidimensional trust model for vehicular networks. Our model evaluates the trustworthiness of each vehicle using two main modes: 1) Direct Trust Computation DTC related to a direct connection betw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0ea61911fcec6c2d7bef445c1437bf08
https://hal-utt.archives-ouvertes.fr/hal-03339067
https://hal-utt.archives-ouvertes.fr/hal-03339067
Publikováno v:
ICC
ICC 2021-IEEE International Conference on Communications
ICC 2021-IEEE International Conference on Communications, Jun 2021, Montreal, France. pp.1-6, ⟨10.1109/ICC42927.2021.9500491⟩
ICC 2021-IEEE International Conference on Communications, Jun 2021, Montreal, Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500491⟩
ICC 2021-IEEE International Conference on Communications
ICC 2021-IEEE International Conference on Communications, Jun 2021, Montreal, France. pp.1-6, ⟨10.1109/ICC42927.2021.9500491⟩
ICC 2021-IEEE International Conference on Communications, Jun 2021, Montreal, Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500491⟩
Vehicular Ad hoc Network (VANET) is a wireless technology dedicated to vehicular communications. VANET is unsecure because of its lack of central administration and is also vulnerable due to its unique characteristics. Therefore, security is one of t
Publikováno v:
LCN
In this paper, we investigate the concept of reputation to improve the resistance of vehicular networks against malicious and misbehaving vehicles. We propose a robust reputation management system, which consists of a model for reputation calculation
Publikováno v:
Social Network Analysis and Mining
Social Network Analysis and Mining, Springer, 2013, 3 (4), pp.1293-1310. ⟨10.1007/s13278-013-0138-4⟩
Social Network Analysis and Mining, 2013, 3 (4), pp.1293-1310. ⟨10.1007/s13278-013-0138-4⟩
Social Network Analysis and Mining, Springer, 2013, 3 (4), pp.1293-1310. ⟨10.1007/s13278-013-0138-4⟩
Social Network Analysis and Mining, 2013, 3 (4), pp.1293-1310. ⟨10.1007/s13278-013-0138-4⟩
The number of smartphone users has increased significantly over the last decade. The number of people using social networking sites is also increasing, and these platforms offer many features through which individuals can communicate with their conta
Publikováno v:
Decision Support Systems
Decision Support Systems, Elsevier, 2017, 93, pp.62-76. ⟨10.1016/j.dss.2016.09.006⟩
Decision Support Systems, 2017, 93, pp.62-76. ⟨10.1016/j.dss.2016.09.006⟩
Decision Support Systems, Elsevier, 2017, 93, pp.62-76. ⟨10.1016/j.dss.2016.09.006⟩
Decision Support Systems, 2017, 93, pp.62-76. ⟨10.1016/j.dss.2016.09.006⟩
Android is one of the mobile market leaders, offering more than a million applications on Google Play store. Google checks the application for known malware, but applications abusively collecting users' data and requiring access to sensitive services
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6c7d79f7f297e5533568cd5d168ec640
https://hal-utt.archives-ouvertes.fr/hal-02272236
https://hal-utt.archives-ouvertes.fr/hal-02272236
Publikováno v:
2014 Fifth Cybercrime and Trustworthy Computing Conference (CTC)
2014 Fifth Cybercrime and Trustworthy Computing Conference (CTC), Nov 2014, Auckland, New Zealand. pp.30-37
2014 Fifth Cybercrime and Trustworthy Computing Conference (CTC), Nov 2014, Auckland, New Zealand. pp.30-37
International audience; Social networking services (SNS) have increased in popularity over the last decade. They have become major platforms for e-commerce, personal branding, socialization and information. The success of social networking services l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0e2c441054c28655f359fe60e35d6d5a
https://hal-utt.archives-ouvertes.fr/hal-02274630
https://hal-utt.archives-ouvertes.fr/hal-02274630
Publikováno v:
2014 Global Information Infrastructure and Networking Symposium (GIIS)
2014 Global Information Infrastructure and Networking Symposium (GIIS), Sep 2014, Montreal, Canada. pp.1-6
2014 Global Information Infrastructure and Networking Symposium (GIIS), Sep 2014, Montreal, France. pp.1-6, ⟨10.1109/GIIS.2014.6934278⟩
GIIS
2014 Global Information Infrastructure and Networking Symposium (GIIS), Sep 2014, Montreal, Canada. pp.1-6
2014 Global Information Infrastructure and Networking Symposium (GIIS), Sep 2014, Montreal, France. pp.1-6, ⟨10.1109/GIIS.2014.6934278⟩
GIIS
Nowadays smartphones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected devi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::75cf06747a8f9d87c75bd8202174b19b
https://hal-utt.archives-ouvertes.fr/hal-02271768
https://hal-utt.archives-ouvertes.fr/hal-02271768
Publikováno v:
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug 2014, Milano, Italy. pp.315-320
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug 2014, Milano, France. pp.315-320, ⟨10.1109/EUC.2014.54⟩
EUC
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug 2014, Milano, Italy. pp.315-320
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug 2014, Milano, France. pp.315-320, ⟨10.1109/EUC.2014.54⟩
EUC
International audience; Nowadays, smart phones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can serious
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fe48e64d98f872446e65c37623ab70c7
https://hal-utt.archives-ouvertes.fr/hal-02274905
https://hal-utt.archives-ouvertes.fr/hal-02274905
Publikováno v:
2013 Global Information Infrastructure Symposium
2013 Global Information Infrastructure Symposium, Oct 2013, Trento, Italy. pp.1-3
GIIS
2013 Global Information Infrastructure Symposium, Oct 2013, Trento, Italy. pp.1-3
GIIS
Smartphones have become increasingly popular and nowadays with the using of 3G networks, the needs in terms of connectivity in a business environment are substantial. Malicious use of such devices is highly dangerous since users may be victims of suc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01393d7d90c596001f58f824b5963da2
https://utt.hal.science/hal-02272999
https://utt.hal.science/hal-02272999