101 results on '"Valérie Viet Triem Tong"'
Search Results
2. BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports.
3. URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures.
4. CVE representation to build attack positions graphs.
5. CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
6. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
7. PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns.
8. URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment.
9. Accurate Measurement of the Energy Consumption of Security Functions.
10. Preventing serialization vulnerabilities through transient field detection.
11. Abusing Android Runtime for Application Obfuscation.
12. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures.
13. GroDDViewer: Dynamic Dual View of Android Malware.
14. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting.
15. Obfuscated Android Application Development.
16. Teaching Android Mobile Security.
17. SEER4US, Secured Energy Efficient Routing for UAV Swarms.
18. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux.
19. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory.
20. Information Flows at OS Level Unmask Sophisticated Android Malware.
21. GPFinder: Tracking the invisible in Android malware.
22. Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis.
23. TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking.
24. Kayrebt: An activity diagram extraction and visualization toolset designed for the Linux codebase.
25. Detection and Identification of Android Malware Based on Information Flow Monitoring.
26. Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.
27. GroddDroid: a gorilla for triggering malicious behaviors.
28. OATs’inside : Retrieving Object BehaviorsFrom Native-Based Obfuscated Android Applications
29. Capturing Android Malware Behaviour Using System Flow Graph.
30. Secure States versus Secure Executions - From Access Control to Flow Control.
31. Extending Signatures of Reputation.
32. A privacy preserving distributed reputation mechanism.
33. Designing information flow policies for Android's operating system.
34. Flow Based Interpretation of Access Control: Detection of Illegal Information Flows.
35. From SSIR to CIDre: A New Security Research Group in Rennes, France.
36. Information Flow Control for Intrusion Detection Derived from MAC Policy.
37. Liability in software engineering: overview of the LISE approach and illustration on a case study.
38. An Efficient Distributed PKI for Structured P2P Networks.
39. Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
40. Policy-based intrusion detection in Web applications by monitoring Java information flows.
41. A sybilproof distributed identity management for P2P networks.
42. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification.
43. Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
44. A Distributed Certification System for Structured P2P Networks.
45. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
46. Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes.
47. Challenges in Android Malware Analysis.
48. Reachability Analysis of Term Rewriting Systems with Timbuk.
49. Spécification et mécanisme de détection de flots d'information illégaux.
50. Liability issues in software engineering: the use of formal methods to reduce legal uncertainties.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.