Affichage des résultats 1 à 7 sur 7 au total
Cryptographie et sécurité : 1 à 7 sur 7 au total
-
Communication dans un congrès
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui. Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. The 19th International Workshop on Security (IWSEC 2024), Sep 2024, Kyoto, Japan. pp.257--276, ⟨10.1007/978-981-97-7737-2_15⟩. ⟨hal-04701979⟩
-
Pré-publication, Document de travail
Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui. A Survey on Malware Detection with Graph Representation Learning. 2023. ⟨hal-04099618⟩
-
Article dans une revue
Ziad Ismail, Christophe Kiennert, Jean Leneutre, David Bateman, Lin Chen. Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis. IEEE Transactions on Information Forensics and Security, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩. ⟨hal-01418390⟩
-
Communication dans un congrès
Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong. On Privacy-preserving Cloud Auction. SRDS, Sep 2016, Budapest, Hungary. ⟨hal-01418458⟩
-
Communication dans un congrès
Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen. A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. GameSec, Nov 2016, New York, United States. ⟨hal-01418446⟩
-
Communication dans un congrès
Camille Guinaudeau, Antoine Laurent, Hervé Bredin. LIMSI @ MediaEval SED 2014. MediaEval 2014, Oct 2014, Barcelone, Spain. ⟨hal-01744264⟩
-
Communication dans un congrès
Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen. Data Integrity and Availability Verification Game in Untrusted Cloud Storage. GameSec, Nov 2014, Los Angeles, United States. ⟨hal-01110522⟩