Serveur d'exploration sur la recherche en informatique en Lorraine - Checkpoint (Hal)

Index « Keywords » - entrée « security »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
secure interoperation < security < security assessment  Facettes :

List of bibliographic references

Number of relevant bibliographic references: 37.
[0-20] [0 - 20][0 - 37][20-36][20-40]
Ident.Authors (with country if any)Title
000034 (2016-05) Anthéa Mayzaud [France] ; Rémi Badonnel [France] ; Isabelle Chrisment [France]A Taxonomy of Attacks in RPL-based Internet of Things
000820 (2014-11-03) Guillaume Bonfante [France] ; Jean-Yves Marion [France] ; Thanh Dinh Ta [France]Malware Message Classification by Dynamic Analysis
001772 (2012-05-10) Thibault Cholez [France] ; Isabelle Chrisment [France] ; Olivier Festor [France] ; Guillaume Doyen [France]Detection and mitigation of localized attacks in a widely deployed P2P network
001C03 (2011-09-05) Khaled Gaaloul [France] ; Erik Proper [Luxembourg (pays)] ; François Charoy [France]Injecting Task Delegation Constraints into a Role-based Access Control Model
001D01 (2011-07-09) Romain Lieber [France] ; Didier Fass [France]Human systems integration design: which generalized rationale?
001D52 (2011-06-23) Thibault Cholez [France]Monitoring of structured peer-to-peer networks applied to the security of contents
001E60 (2011-05) Abdelkader Lahmadi [France] ; Emmanuel Nataf [France] ; Olivier Festor [France]YANG-Based Configuration Modeling - The SecSIP IPS Case Study
001F10 (2011-03-10) Hubert Comon-Lundh [France] ; Véronique Cortier [France]How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
001F97 (2011) Tony Bourdier [France]Tree automata based semantics of firewalls
002930 (2009-12-07) Jérôme François [France]Robustness and Identification of Communicating Applications
002958 (2009-11-18) Véronique Cortier [France]Analysis of cryptographic protocols: from symbolic to computational models
002B76 (2009-06-30) Thibault Cholez [France] ; Isabelle Chrisment [France] ; Olivier Festor [France]Evaluation of Sybil Attacks Protection Schemes in KAD
002E71 (2009) Frédéric Beck [France] ; Olivier Festor [France]Syscall Interception in Xen Hypervisor
002F47 (2009) Yohan Boichut [France] ; Roméo Courbis [France] ; Pierre-Cyrille Héam [France] ; Olga Kouchnarenko [France]Handling Non Left-Linear Rules When Completing Tree Automata
003371 (2008-04-07) Jérôme François [France] ; Radu State [France] ; Olivier Festor [France]Towards malware inspired management frameworks
003628 (2008) Frédéric Beck [France] ; Olivier Festor [France] ; Radu State [France]High Security Laboratory - Network Telescope
003673 (2008) Najah Chridi [France] ; Mathieu Turuani [France] ; Michaël Rusinowitch [France]Constraints-based Verification of Parameterized Cryptographic Protocols.
003C73 (2007) Cristian Popi [France] ; Olivier Festor [France]State of the art in Wireless Mesh Networks - delivrable L3.01 - RNRT project "Airnet"
003C85 (2007) Gilles Barthe [France] ; Leonor Prensa Nieto [France]Secure Information Flow for a Concurrent Language with Scheduling
003E25 (2006-12-11) Vincent Cridlig [France]Security of IP network management plane
004168 (2006-01) Vincent Cridlig [France] ; Radu State [France] ; Olivier Festor [France]Role-Based Access Control for XML Enabled Multi-Protocol Management Gateways

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Hal/Checkpoint
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Checkpoint/KwdEn.i -k "security" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Checkpoint/KwdEn.i  \
                -Sk "security" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Hal/Checkpoint/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Hal
   |étape=   Checkpoint
   |type=    indexItem
   |index=    KwdEn.i
   |clé=    security
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022