Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Philippe Jaillon"'
Publikováno v:
PLoS ONE, Vol 12, Iss 1, p e0169658 (2017)
The extraction of information from social media is an essential yet complicated step for data analysis in multiple domains. In this paper, we present Vigi4Med Scraper, a generic open source framework for extracting structured data from web forums. Ou
Externí odkaz:
https://doaj.org/article/775b7d8c75184cb9a0b6477239b74167
Publikováno v:
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development.
Autor:
Maryline Laurent, Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, Jérôme François, Damien Hotz, Philippe Jaillon, Rida Khatoun, Christophe Kiennert, Marwan Lazrag, Souha Masmoudi
Publikováno v:
RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information
RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-4
HAL
RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-4
HAL
International audience; Le MOOC Sécurité des Réseaux, destiné à l’apprentissage massif à distance de la sécurité dans les réseaux informatiques, s’adresse à un public ayant des prérequis légers en informatique et des prérequis plus s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3a5e481fee490643b383f922fb887516
https://hal.science/hal-02437172
https://hal.science/hal-02437172
Autor:
Damien Couroussé, Nicolas Belleville, Jean-Louis Lanet, Philippe Jaillon, Thierno Barry, Olivier Potin, Bruno Robisson, Hélène Le Bouder, Karine Heydemann
Publikováno v:
Fifth Workshop on Cryptography and Security in Computing Systems
Fifth Workshop on Cryptography and Security in Computing Systems, Jan 2018, Manchester, United Kingdom. pp.17-18, ⟨10.1145/3178291.3178296⟩
CS2@HiPEAC
Fifth Workshop on Cryptography and Security in Computing Systems, Jan 2018, Manchester, United Kingdom. pp.17-18, ⟨10.1145/3178291.3178296⟩
CS2@HiPEAC
International audience; In the landscape of cybersecurity, a large field of research is dedicated to physical attacks since the publication of the first attacks in the early 1990s. Side-channel attacks can reveal the secret values processed in a circ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89f20488ad9b6d04653106e9e3c6dea0
https://hal-emse.ccsd.cnrs.fr/emse-02011053
https://hal-emse.ccsd.cnrs.fr/emse-02011053
Publikováno v:
Web Intelligence and Agent Systems
Web Intelligence and Agent Systems, IOS Press, 2017, 15 (3), pp.251-268. ⟨10.3233/WEB-170361⟩
Web Intelligence and Agent Systems, IOS Press, 2017, 15 (3), pp.251-268. ⟨10.3233/WEB-170361⟩
International audience; In the real world as in the virtual one, trust is a fundamental concept. Without it, humans can neither act nor interact. So unsurprisingly, this concept received in the last years a growing interest from researchers in securi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9109624136619572bdf6642ee1248625
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01745882
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01745882
Publikováno v:
Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17)
Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, ⟨10.1145/3031836.3031842⟩
CS2@HiPEAC
Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, ⟨10.1145/3031836.3031842⟩
CS2@HiPEAC
International audience; Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::811b9ab5eb9ca5516438b027ca26eafe
https://hal-emse.ccsd.cnrs.fr/emse-01490735
https://hal-emse.ccsd.cnrs.fr/emse-01490735
Autor:
Bruno Robisson, Thierno Barry, Damien Couroussé, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
Publikováno v:
Lecture Notes in Computer Science
Information Security Theory and Practice ISBN: 9783319459301
WISTP
Information Security Theory and Practice ISBN: 9783319459301
WISTP
Part 3: Attacks to Software and Network Systems; International audience; We present a generic framework for runtime code polymorphism, applicable to a broad range of computing platforms including embedded systems with low computing resources (e.g. mi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f2b0156b1d3ee6cbac51cdb2d3ddbd8a
https://hal-emse.ccsd.cnrs.fr/emse-01372223/file/WISTP-2016-preprint.pdf
https://hal-emse.ccsd.cnrs.fr/emse-01372223/file/WISTP-2016-preprint.pdf
Autor:
Philippe Jaillon, Gaël Barnabé
Publikováno v:
Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing
2014 International Workshop on Web Intelligence and Smart Sensing (IWWISS '14)
2014 International Workshop on Web Intelligence and Smart Sensing (IWWISS '14), Sep 2014, Saint Etienne, France. 2p., ⟨10.1145/2637064.2637109⟩
2014 International Workshop on Web Intelligence and Smart Sensing (IWWISS '14)
2014 International Workshop on Web Intelligence and Smart Sensing (IWWISS '14), Sep 2014, Saint Etienne, France. 2p., ⟨10.1145/2637064.2637109⟩
International audience; Today, it is hardly conceivable to produce new objects without digital capabilities. We can notice that the development of the ability to communicate of these new objects raises up new questions about using them or not. The UN
Publikováno v:
Web Intelligence and Agent Systems
Web Intelligence and Agent Systems, IOS Press, 2013, Volume 11 (Number 4 / 2013), pp. 315-338. ⟨10.3233/WIA-130278⟩
Web Intelligence and Agent Systems, IOS Press, 2013, Volume 11 (Number 4 / 2013), pp. 315-338. ⟨10.3233/WIA-130278⟩
International audience; The success of virtual communities (VCs) relies on collaboration and resource sharing principles, making trust a priority for each member. The work presented in this paper addresses the problem of trust management in open and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2e1c952f0ab0937304beba1a17a57be5
https://hal-emse.ccsd.cnrs.fr/emse-00948302
https://hal-emse.ccsd.cnrs.fr/emse-00948302
Publikováno v:
Advances in Intelligent and Soft Computing ISBN: 9783642287855
PAAMS
Advances on Practical Applications of Agents and Multi-Agent Systems-10th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2012, Salamanca, Spain, 28-30 March, 2012
PAAMS
Advances on Practical Applications of Agents and Multi-Agent Systems-10th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2012, Salamanca, Spain, 28-30 March, 2012
International audience; The success of a virtual community relies on collaboration and resource sharing principals, making trust a priority for each member. Such systems need a flexible trust model wherein trust policies are automatically adapted and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d43cee6b70ff0dcdc401cdc3d378530
https://doi.org/10.1007/978-3-642-28786-2_24
https://doi.org/10.1007/978-3-642-28786-2_24