Accéder directement au contenu Accéder directement à la navigation


...
hal-01933792v1  Communication dans un congrès
Vincent LeildeVincent RibaudCiprian TeodorovPhilippe Dhaussy. A Problem-Oriented Approach to Critical System Design and Diagnosis Support
1st International Workshop on Modeling, Verification and Testing of Dependable Critical Systems (DETECT 2018), Oct 2018, Marrakesh, Morocco
...
hal-00947395v1  Article dans une revue
Renaud Bellais. Technology and the defense industry: real threats, bad habits, or new (market) opportunities?
Journal of Innovation Economics & Management, De Boeck Supérieur 2013, 2013/02 (12), pp.59-78
hal-01404508v1  Communication dans un congrès
Frédéric Le RoyThierry QuiniouAli MansourRafaat LababidiDenis Le Jeune. RFID Eavesdropping Using SDR Platforms
5th International Conference on Applications in Electronics Pervading Industry, Environment and Society (APPLEPIES 2016), Sep 2016, Rome, Italy. pp.208 - 214, ⟨10.1007/978-3-319-55071-8_27⟩
hal-02515709v1  Communication dans un congrès
Fadi ObeidPhilippe Dhaussy. RITA secure communication protocol : application to SCADA
8th International Conference on Network and Communications Security - NCS 2016, Dec 2016, Sydney, Australia. ⟨10.5121/csit.2016.61518⟩
hal-02123124v1  Communication dans un congrès
Ghattas AkkadRafic AyoubiAntoine Abche. Constant Time Hardware Architecture for a Gaussian Smoothing Filter
2018 International Conference on Signal Processing and Information Security (ICSPIS), IEEE, Nov 2018, DUBAI, United Arab Emirates. pp.1-4
...
hal-02502387v1  Communication dans un congrès
Tithnara SunBastien DrouotFahad Rafique GolraJoël ChampeauSylvain Guerin et al.  A Domain-specific Modeling Framework for Attack Surface Modeling
ICISSP 2020 : 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valetta, Malta. pp.341 - 348, ⟨10.5220/0008916203410348⟩
...
hal-01595789v1  Communication dans un congrès
Cyrielle FeronVianney LapotreLoïc Lagadec. PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes
SECRYPT: 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain
hal-01016924v1  Article dans une revue
Renaud Bellais. Fighting Piracy and International Public Goods: The Atalanta Experiment in the Horn of Africa
Peace Economics, Peace Science and Public Policy, Walter de Gruyter, 2013, 19 (1), pp.73-101. ⟨10.1515/peps-2013-0008⟩
hal-02958111v1  Communication dans un congrès
Caine SilvaSylvain GuérinRaúl MazoJoël Champeau. Contract-based design patterns: a design by contract approach to specify security patterns
15th International Conference on Availibitlity, Reliability ans Security, ARES 2020, Association for Computing Machinery (ACM), Aug 2020, Virtual Event, Ireland. pp.1-9, ⟨10.1145/3407023.3409185⟩
...
hal-01757093v1  Communication dans un congrès
Cyrielle FeronVianney LapotreLoïc Lagadec. Fast Evaluation of Homomorphic Encryption Schemes Based on Ring-LWE
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Feb 2018, Paris, France. ⟨10.1109/NTMS.2018.8328693⟩
...
hal-00507932v1  Communication dans un congrès
Jean DezertFlorentin Smarandache. Threat assessment of a possible Vehicle-Born Improvised Explosive Device using DSmT
Fusion 2010, Jul 2010, Edinburgh, United Kingdom
hal-03188864v1  Communication dans un congrès
Hiba HnainiLuka LerouxJoël ChampeauCiprian Teodorov. Security property modeling
7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Feb 2021, Vienne - Virtual Online, Austria. pp.694-701
...
tel-02319224v1  Thèse
Fadi Obeid. Validation formelle d'implantation de patrons de sécurité
Génie logiciel [cs.SE]. ENSTA Bretagne - École nationale supérieure de techniques avancées Bretagne, 2018. Français. ⟨NNT : 2018ENTA0002⟩