EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1E. Anceaume, R. Ludinard, B. Sericola.

    Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]

    http://hal.archives-ouvertes.fr/hal-00736918
  • 2M. A. Ayachi, C. Bidan, N. Prigent.

    A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010.
  • 3M. Ben Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.

    Delegation of Obligations and Responsibility, in: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference (SEC2011), J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, C. Rieder (editors), IFIP AICT, Springer, 2011, vol. 354, pp. 197–209.
  • 4J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 5S. Gambs, B. Kégl, E. Aïmeur.

    Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, pp. 131-170.
  • 6G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, pp. 265–279.
  • 7L. , H. Debar.

    New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1.
  • 8G. Piolle, Y. Demazeau.

    Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, pp. 209-226.
  • 9E. Totel, F. Majorczyk, L. .

    COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005.
  • 10D. Zou, N. Prigent, J. Bloom.

    Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 11C. Hauser.

    Détection d'intrusions dans les systèmes distribués par propagation de teinte au niveau noyau, Université Rennes 1, June 2013.

    http://hal.inria.fr/tel-00932618

Articles in International Peer-Reviewed Journals

  • 12E. Anceaume, Y. Busnel.

    A Distributed Information Divergence Estimation over Data Streams, in: IEEE Transactions on Parallel and Distributed Systems, 2013, 10 p.

    http://hal.inria.fr/hal-00804437
  • 13E. Anceaume, Y. Busnel, S. Gambs.

    On the Power of the Adversary to Solve the Node Sampling Problem, in: Transactions on Large-Scale Data- and Knowledge-Centered Systems (TLDKS), December 2013, vol. 8290, pp. 102-126. [ DOI : 10.1007/978-3-642-45269-7_5 ]

    http://hal.inria.fr/hal-00926485
  • 14E. Anceaume, F. Castella, R. Ludinard, B. Sericola.

    Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems, in: Methodology and Computing in Applied Probability, June 2013, vol. 15, no 2, pp. 305–332. [ DOI : 10.1007/s11009-011-9239-6 ]

    http://hal.inria.fr/hal-00650081
  • 15E. Anceaume, F. Castella, B. Sericola.

    Analysis of a large number of Markov chains competing for transitions, in: International Journal of Systems Science, March 2014, vol. 45, no 3, pp. 232–240. [ DOI : 10.1080/00207721.2012.704090 ]

    http://hal.inria.fr/hal-00736916
  • 16E. Aïmeur, G. Brassard, S. Gambs.

    Quantum speed-up for unsupervised learning, in: Machine Learning, February 2013, vol. 90, no 2, pp. 261-287. [ DOI : 10.1007/s10994-012-5316-5 ]

    http://hal.inria.fr/hal-00736948

Articles in National Peer-Reviewed Journals

  • 17G. Piolle.

    La protection des données personnelles, un enjeu organisationnel et technique, in: Flux, March 2013, no 274, VIII p.

    http://hal.inria.fr/hal-00845803

Invited Conferences

  • 18L. .

    Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI), in: 11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Rennes, France, June 2013.

    http://hal.inria.fr/hal-00926075
  • 19G. Piolle.

    La vie privée sur Internet, une question de confiance ?, in: Journée Web et Confiance, Lyon, France, January 2013.

    http://hal.inria.fr/hal-00777430

International Conferences with Proceedings

  • 20E. Anceaume, Y. Busnel.

    Sketch *-metric: Comparing Data Streams via Sketching, in: 12th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2013), Boston, United States, D. Avresky (editor), August 2013, vol. 12, 11 p. [ DOI : 10.1109/NCA.2013.11 ]

    http://hal.inria.fr/hal-00926685
  • 21E. Anceaume, Y. Busnel.

    Sketch -metric: Comparing Data Streams via Sketching, in: The 12th IEEE International Symposium on Network Computing and Applications (IEEE NCA13), Boston, France, IEEE (editor), August 2013, 8 p.

    http://hal.inria.fr/hal-00764772
  • 22E. Anceaume, Y. Busnel, B. Sericola.

    Uniform Node Sampling Service Robust against Collusions of Malicious Nodes, in: 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), Budapest, Hungary, June 2013, vol. 43, 249 p.

    http://hal.inria.fr/hal-00804430
  • 23E. Anceaume, G. Guette, P. Lajoie Mazenc, N. Prigent, V. Viet Triem Tong.

    A Privacy Preserving Distributed Reputation Mechanism, in: International Conference on communications (ICC), Budapest, France, June 2013, 6 p.

    http://hal.inria.fr/hal-00763212
  • 24E. Anceaume, E. Le Merrer, R. Ludinard, B. Sericola, G. Straub.

    A Self-organising Isolated Anomaly Detection Architecture for Large Scale Systems, in: Nem-Summit, France, October 2013, 12 p.

    http://hal.inria.fr/hal-00907374
  • 26G. Arfaoui, S. Gambs, P. Lacharme, J.-F. Lalande, L. Roch, J.-C. Paillès.

    A Privacy-Preserving Contactless Transport Service for NFC Smartphones, in: Fifth International Conference on Mobile Computing, Applications and Services, Paris, France, LNICST, Springer, November 2013.

    http://hal.inria.fr/hal-00875098
  • 28C. Bidan, D. Boucard, M. Chapon, P. Cloitre, G. Donias, G. Guette, T. Plesse, N. Prigent, S. Tarrapey.

    Preventive and corrective security solutions for routing in military tactical ad hoc networks, in: MCC 2013, Saint Malo, France, October 2013, pp. 149-165.

    http://hal.inria.fr/hal-00919218
  • 29E. Elsalamouny, V. Sassone.

    An HMM-based reputation model, in: Advances in Security of Information and Communication Networks, Cairo, Egypt, Springer Berlin Heidelberg, 2013, vol. 381, pp. 111-121. [ DOI : 10.1007/978-3-642-40597-6_9 ]

    http://hal.inria.fr/hal-00831401
  • 30S. Gambs, M.-O. Killijian, I. Moise, M. Nunez Del Prado Cortez.

    MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, Cambridge, United States, May 2013, pp. 1937-1946. [ DOI : 10.1109/IPDPSW.2013.180 ]

    http://hal.inria.fr/hal-00911238
  • 32S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez, M. Traoré.

    Towards a recommender system for bush taxis, in: 3rd Conference on the Analysis of Mobile Phone Datasets (NetMob'13), Boston, United States, May 2013.

    http://hal.inria.fr/hal-00911241
  • 33S. Geller, V. Viet Triem Tong, L. .

    BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies, in: SECUREWARE - 7th International Conference on Emerging Security Information, Systems and Technologies, Barcelona, Spain, 2013.

    http://hal.inria.fr/hal-00909400
  • 34C. Hauser, F. Tronel, C. Fidge, L. .

    Intrusion detection in distributed systems, an approach based on taint marking, in: IEEE ICC2013 - IEEE International Conference on Communications, Budapest, Hungary, July 2013.

    http://hal.inria.fr/hal-00840338
  • 35C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.

    ELVIS: Extensible Log VISualization, in: VIZSEC, ATLANTA, United States, October 2013.

    http://hal.inria.fr/hal-00875668
  • 36M. Jaume, R. Andriatsimandefitra, V. Viet Triem Tong, L. .

    Secure states versus Secure executions: From access control to flow control, in: ICISS - 9th International Conference on Information Systems Security - 2013, Kolkata, India, 2013.

    http://hal.inria.fr/hal-00909395
  • 37P. Meye, P. Raïpin-Parvédy, F. Tronel, E. Anceaume.

    Toward a distributed storage system leveraging the DSL infrastructure of an ISP, in: 11th IEEE Consumer Communications and Networking Conference, United States, January 2014, 2 p.

    http://hal.inria.fr/hal-00924051
  • 38R. Paiva Melo Marin, G. Piolle, C. Bidan.

    An Analysis Grid for Privacy-related Properties of Social Network Systems, in: SOCIALCOM 2013, Washington D.C., United States, IEEE Computer Society, September 2013, pp. 520-525. [ DOI : 10.1109/PASSAT/SocialCom.2013.79 ]

    http://hal.inria.fr/hal-00908339
  • 39J.-M. Robert, C. Bidan.

    A proactive routing protocol for wireless ad hoc networks assuring some privacy, in: HotWiSec '13, Budapest, Hungary, September 2013, pp. 25-30. [ DOI : 10.1145/2463183.2463190 ]

    http://hal.inria.fr/hal-00920036

National Conferences with Proceedings

  • 40R. Andriatsimandefitra, V. Viet Triem Tong, L. .

    Diagnosing intrusions in Android operating system using system flow graph, in: Workshop Interdisciplinaire sur la Sécurité Globale, Troyes, France, January 2013.

    http://hal.inria.fr/hal-00875211
  • 41N. Aubert, M. Ali Ayachi, C. Bidan, N. Prigent.

    The Hecate Attack, in: SAR-SSI 2013, Mont de Marsan, France, September 2013, pp. 205-215.

    http://hal.inria.fr/hal-00919227
  • 42S. Boche, G. Guette, C. Bidan, N. Prigent.

    NoName, un protocole de routage ad hoc respectant la vie privée, in: SAR-SSI 2013, Mont de Marsan, France, September 2013, pp. 122-134.

    http://hal.inria.fr/hal-00919178
  • 43A. Guellier, C. Bidan, N. Prigent.

    Protocole Ad hoc Proactif Anonyme à Base de Cryptographie Homomorphique, in: SAR-SSSI 2013, Mont-de-Marsan, France, September 2013, 11 p.

    http://hal.inria.fr/hal-00881049

Conferences without Proceedings

  • 44E. Anceaume, E. Le Merrer, R. Ludinard, B. Sericola, G. Straub.

    FixMe : détection répartie de défaillances isolées, in: 15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), Pornic, France, N. Nisse, F. Rousseau, Y. Busnel (editors), May 2013, pp. 1-4.

    http://hal.inria.fr/hal-00818650
  • 45M. Assaf, J. Signoles, F. Tronel, E. Totel.

    Moniteur hybride de flux d'information pour un langage supportant des pointeurs, in: SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Mont de Marsan, France, September 2013.

    http://hal.inria.fr/hal-00909293
  • 46A. Blandin-Obernesser, M. Boizard, S. Gambs, G. Piolle.

    Le droit à l'oubli : Présentation du projet DAO, in: 4ème Atelier sur la Protection de la Vie Privée (APVP'13), Les Loges en Josas, France, June 2013.

    http://hal.inria.fr/hal-00845780
  • 47S. Bouget, S. Gambs, G. Piolle.

    Dégradation de données par publication éphémère, in: 4ème Atelier sur la Protection de la Vie Privée (APVP'13), Les Loges en Josas, France, June 2013.

    http://hal.inria.fr/hal-00845567

Internal Reports

  • 48E. Anceaume, Y. Busnel.

    CoMMEDIA: Separating Scaramouche from Harlequin to Accurately Estimate Items Frequency in Distributed Data Streams, June 2013, 16 pages.

    http://hal.inria.fr/hal-00847764
  • 49R. Andriatsimandefitra, V. Viet Triem Tong, T. Saliou.

    Information Flow Policies vs Malware, September 2013.

    http://hal.inria.fr/hal-00862468
  • 50M. Assaf, J. Signoles, F. Tronel, E. Totel.

    Moniteur hybride de flux d'information pour un langage supportant des pointeurs, Inria, July 2013, no RR-8326, 25 p.

    http://hal.inria.fr/hal-00841048

Other Publications

  • 51E. Anceaume, G. Guette, P. Lajoie Mazenc, T. Sirvent, V. Viet Triem Tong.

    Extending Signatures of Reputation, June 2013, International Summer School with proceedings.

    http://hal.inria.fr/hal-00907394
  • 52C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.

    Vers une catégorisation par objectif des outils de visualisation pour la sécurité, September 2013, Poster.

    http://hal.inria.fr/hal-00919211
References in notes
  • 53E. Anceaume, R. Ludinard, B. Sericola.

    Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]

    http://hal.inria.fr/hal-00736918
  • 54Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 55T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.

    User Data Confidentiality in an Orchestration of Web Services, in: International Journal of Information Assurance and Security, 2012, vol. 7.

    http://hal.inria.fr/hal-00735996
  • 56G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS), 2008.
  • 57A. Myers, F. Schneider, K. Birman.

    Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.

    http://www.cs.cornell.edu/Projects/secft/
  • 58G. Piolle, Y. Demazeau.

    Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, pp. 162–168.
  • 59O. Sarrouy, E. Totel, B. Jouga.

    Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, pp. 299–306.
  • 60J. Zimmermann, L. , C. Bidan.

    An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.