Bibliography
Major publications by the team in recent years
-
1E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal.archives-ouvertes.fr/hal-00736918 -
2M. A. Ayachi, C. Bidan, N. Prigent.
A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010. -
3M. Ben Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.
Delegation of Obligations and Responsibility, in: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference (SEC2011), J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, C. Rieder (editors), IFIP AICT, Springer, 2011, vol. 354, pp. 197–209. -
4J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
5S. Gambs, B. Kégl, E. Aïmeur.
Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, pp. 131-170. -
6G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, pp. 265–279. -
7L. Mé, H. Debar.
New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1. -
8G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, pp. 209-226. -
9E. Totel, F. Majorczyk, L. Mé.
COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005. -
10D. Zou, N. Prigent, J. Bloom.
Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Doctoral Dissertations and Habilitation Theses
-
11C. Hauser.
Détection d'intrusions dans les systèmes distribués par propagation de teinte au niveau noyau, Université Rennes 1, June 2013.
http://hal.inria.fr/tel-00932618
Articles in International Peer-Reviewed Journals
-
12E. Anceaume, Y. Busnel.
A Distributed Information Divergence Estimation over Data Streams, in: IEEE Transactions on Parallel and Distributed Systems, 2013, 10 p.
http://hal.inria.fr/hal-00804437 -
13E. Anceaume, Y. Busnel, S. Gambs.
On the Power of the Adversary to Solve the Node Sampling Problem, in: Transactions on Large-Scale Data- and Knowledge-Centered Systems (TLDKS), December 2013, vol. 8290, pp. 102-126. [ DOI : 10.1007/978-3-642-45269-7_5 ]
http://hal.inria.fr/hal-00926485 -
14E. Anceaume, F. Castella, R. Ludinard, B. Sericola.
Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems, in: Methodology and Computing in Applied Probability, June 2013, vol. 15, no 2, pp. 305–332. [ DOI : 10.1007/s11009-011-9239-6 ]
http://hal.inria.fr/hal-00650081 -
15E. Anceaume, F. Castella, B. Sericola.
Analysis of a large number of Markov chains competing for transitions, in: International Journal of Systems Science, March 2014, vol. 45, no 3, pp. 232–240. [ DOI : 10.1080/00207721.2012.704090 ]
http://hal.inria.fr/hal-00736916 -
16E. Aïmeur, G. Brassard, S. Gambs.
Quantum speed-up for unsupervised learning, in: Machine Learning, February 2013, vol. 90, no 2, pp. 261-287. [ DOI : 10.1007/s10994-012-5316-5 ]
http://hal.inria.fr/hal-00736948
Articles in National Peer-Reviewed Journals
-
17G. Piolle.
La protection des données personnelles, un enjeu organisationnel et technique, in: Flux, March 2013, no 274, VIII p.
http://hal.inria.fr/hal-00845803
Invited Conferences
-
18L. Mé.
Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI), in: 11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Rennes, France, June 2013.
http://hal.inria.fr/hal-00926075 -
19G. Piolle.
La vie privée sur Internet, une question de confiance ?, in: Journée Web et Confiance, Lyon, France, January 2013.
http://hal.inria.fr/hal-00777430
International Conferences with Proceedings
-
20E. Anceaume, Y. Busnel.
Sketch *-metric: Comparing Data Streams via Sketching, in: 12th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2013), Boston, United States, D. Avresky (editor), August 2013, vol. 12, 11 p. [ DOI : 10.1109/NCA.2013.11 ]
http://hal.inria.fr/hal-00926685 -
21E. Anceaume, Y. Busnel.
Sketch -metric: Comparing Data Streams via Sketching, in: The 12th IEEE International Symposium on Network Computing and Applications (IEEE NCA13), Boston, France, IEEE (editor), August 2013, 8 p.
http://hal.inria.fr/hal-00764772 -
22E. Anceaume, Y. Busnel, B. Sericola.
Uniform Node Sampling Service Robust against Collusions of Malicious Nodes, in: 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), Budapest, Hungary, June 2013, vol. 43, 249 p.
http://hal.inria.fr/hal-00804430 -
23E. Anceaume, G. Guette, P. Lajoie Mazenc, N. Prigent, V. Viet Triem Tong.
A Privacy Preserving Distributed Reputation Mechanism, in: International Conference on communications (ICC), Budapest, France, June 2013, 6 p.
http://hal.inria.fr/hal-00763212 -
24E. Anceaume, E. Le Merrer, R. Ludinard, B. Sericola, G. Straub.
A Self-organising Isolated Anomaly Detection Architecture for Large Scale Systems, in: Nem-Summit, France, October 2013, 12 p.
http://hal.inria.fr/hal-00907374 -
26G. Arfaoui, S. Gambs, P. Lacharme, J.-F. Lalande, L. Roch, J.-C. Paillès.
A Privacy-Preserving Contactless Transport Service for NFC Smartphones, in: Fifth International Conference on Mobile Computing, Applications and Services, Paris, France, LNICST, Springer, November 2013.
http://hal.inria.fr/hal-00875098 -
28C. Bidan, D. Boucard, M. Chapon, P. Cloitre, G. Donias, G. Guette, T. Plesse, N. Prigent, S. Tarrapey.
Preventive and corrective security solutions for routing in military tactical ad hoc networks, in: MCC 2013, Saint Malo, France, October 2013, pp. 149-165.
http://hal.inria.fr/hal-00919218 -
29E. Elsalamouny, V. Sassone.
An HMM-based reputation model, in: Advances in Security of Information and Communication Networks, Cairo, Egypt, Springer Berlin Heidelberg, 2013, vol. 381, pp. 111-121. [ DOI : 10.1007/978-3-642-40597-6_9 ]
http://hal.inria.fr/hal-00831401 -
30S. Gambs, M.-O. Killijian, I. Moise, M. Nunez Del Prado Cortez.
MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, Cambridge, United States, May 2013, pp. 1937-1946. [ DOI : 10.1109/IPDPSW.2013.180 ]
http://hal.inria.fr/hal-00911238 -
32S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez, M. Traoré.
Towards a recommender system for bush taxis, in: 3rd Conference on the Analysis of Mobile Phone Datasets (NetMob'13), Boston, United States, May 2013.
http://hal.inria.fr/hal-00911241 -
33S. Geller, V. Viet Triem Tong, L. Mé.
BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies, in: SECUREWARE - 7th International Conference on Emerging Security Information, Systems and Technologies, Barcelona, Spain, 2013.
http://hal.inria.fr/hal-00909400 -
34C. Hauser, F. Tronel, C. Fidge, L. Mé.
Intrusion detection in distributed systems, an approach based on taint marking, in: IEEE ICC2013 - IEEE International Conference on Communications, Budapest, Hungary, July 2013.
http://hal.inria.fr/hal-00840338 -
35C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.
ELVIS: Extensible Log VISualization, in: VIZSEC, ATLANTA, United States, October 2013.
http://hal.inria.fr/hal-00875668 -
36M. Jaume, R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé.
Secure states versus Secure executions: From access control to flow control, in: ICISS - 9th International Conference on Information Systems Security - 2013, Kolkata, India, 2013.
http://hal.inria.fr/hal-00909395 -
37P. Meye, P. Raïpin-Parvédy, F. Tronel, E. Anceaume.
Toward a distributed storage system leveraging the DSL infrastructure of an ISP, in: 11th IEEE Consumer Communications and Networking Conference, United States, January 2014, 2 p.
http://hal.inria.fr/hal-00924051 -
38R. Paiva Melo Marin, G. Piolle, C. Bidan.
An Analysis Grid for Privacy-related Properties of Social Network Systems, in: SOCIALCOM 2013, Washington D.C., United States, IEEE Computer Society, September 2013, pp. 520-525. [ DOI : 10.1109/PASSAT/SocialCom.2013.79 ]
http://hal.inria.fr/hal-00908339 -
39J.-M. Robert, C. Bidan.
A proactive routing protocol for wireless ad hoc networks assuring some privacy, in: HotWiSec '13, Budapest, Hungary, September 2013, pp. 25-30. [ DOI : 10.1145/2463183.2463190 ]
http://hal.inria.fr/hal-00920036
National Conferences with Proceedings
-
40R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé.
Diagnosing intrusions in Android operating system using system flow graph, in: Workshop Interdisciplinaire sur la Sécurité Globale, Troyes, France, January 2013.
http://hal.inria.fr/hal-00875211 -
41N. Aubert, M. Ali Ayachi, C. Bidan, N. Prigent.
The Hecate Attack, in: SAR-SSI 2013, Mont de Marsan, France, September 2013, pp. 205-215.
http://hal.inria.fr/hal-00919227 -
42S. Boche, G. Guette, C. Bidan, N. Prigent.
NoName, un protocole de routage ad hoc respectant la vie privée, in: SAR-SSI 2013, Mont de Marsan, France, September 2013, pp. 122-134.
http://hal.inria.fr/hal-00919178 -
43A. Guellier, C. Bidan, N. Prigent.
Protocole Ad hoc Proactif Anonyme à Base de Cryptographie Homomorphique, in: SAR-SSSI 2013, Mont-de-Marsan, France, September 2013, 11 p.
http://hal.inria.fr/hal-00881049
Conferences without Proceedings
-
44E. Anceaume, E. Le Merrer, R. Ludinard, B. Sericola, G. Straub.
FixMe : détection répartie de défaillances isolées, in: 15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), Pornic, France, N. Nisse, F. Rousseau, Y. Busnel (editors), May 2013, pp. 1-4.
http://hal.inria.fr/hal-00818650 -
45M. Assaf, J. Signoles, F. Tronel, E. Totel.
Moniteur hybride de flux d'information pour un langage supportant des pointeurs, in: SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Mont de Marsan, France, September 2013.
http://hal.inria.fr/hal-00909293 -
46A. Blandin-Obernesser, M. Boizard, S. Gambs, G. Piolle.
Le droit à l'oubli : Présentation du projet DAO, in: 4ème Atelier sur la Protection de la Vie Privée (APVP'13), Les Loges en Josas, France, June 2013.
http://hal.inria.fr/hal-00845780 -
47S. Bouget, S. Gambs, G. Piolle.
Dégradation de données par publication éphémère, in: 4ème Atelier sur la Protection de la Vie Privée (APVP'13), Les Loges en Josas, France, June 2013.
http://hal.inria.fr/hal-00845567
Internal Reports
-
48E. Anceaume, Y. Busnel.
CoMMEDIA: Separating Scaramouche from Harlequin to Accurately Estimate Items Frequency in Distributed Data Streams, June 2013, 16 pages.
http://hal.inria.fr/hal-00847764 -
49R. Andriatsimandefitra, V. Viet Triem Tong, T. Saliou.
Information Flow Policies vs Malware, September 2013.
http://hal.inria.fr/hal-00862468 -
50M. Assaf, J. Signoles, F. Tronel, E. Totel.
Moniteur hybride de flux d'information pour un langage supportant des pointeurs, Inria, July 2013, no RR-8326, 25 p.
http://hal.inria.fr/hal-00841048
Other Publications
-
51E. Anceaume, G. Guette, P. Lajoie Mazenc, T. Sirvent, V. Viet Triem Tong.
Extending Signatures of Reputation, June 2013, International Summer School with proceedings.
http://hal.inria.fr/hal-00907394 -
52C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.
Vers une catégorisation par objectif des outils de visualisation pour la sécurité, September 2013, Poster.
http://hal.inria.fr/hal-00919211
-
53E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal.inria.fr/hal-00736918 -
54Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
55T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.
User Data Confidentiality in an Orchestration of Web Services, in: International Journal of Information Assurance and Security, 2012, vol. 7.
http://hal.inria.fr/hal-00735996 -
56G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS), 2008. -
57A. Myers, F. Schneider, K. Birman.
Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.
http://www.cs.cornell.edu/Projects/secft/ -
58G. Piolle, Y. Demazeau.
Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, pp. 162–168. -
59O. Sarrouy, E. Totel, B. Jouga.
Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, pp. 299–306. -
60J. Zimmermann, L. Mé, C. Bidan.
An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.