Nicolas Prigent
Nicolas Prigent
Chief Scientist - LSTI
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Method for the discovery of devices connected to an IP network and device to carry out said method
N Prigent, O Heen, Y Maetz, C Salmon-Legagneur, YM Tang-Talpin
US Patent App. 11/082,562, 2005
Challenges in peer-to-peer gaming
C Neumann, N Prigent, M Varvello, K Suh
ACM SIGCOMM Computer Communication Review 37 (1), 79-82, 2007
PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics
M Angelini, N Prigent, G Santucci
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2015
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system
N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux
US Patent 7,676,836, 2010
Elvis: Extensible log visualization
C Humphries, N Prigent, C Bidan, F Majorczyk
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 9-16, 2013
Secure long term communities in ad hoc networks
N Prigent, C Bidan, JP Andreaux, O Heen
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor …, 2003
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
Amores: an architecture for mobiquitous resilient systems
C Artigues, Y Deswarte, J Guiochet, MJ Huguet, MO Killijian, D Powell, ...
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous …, 2012
Starlord: Linked security data exploration in a 3d graph
L Leichtnam, E Totel, N Prigent, L Mé
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2017
Corgi: Combination, organization and reconstruction through graphical interactions
C Humphries, N Prigent, C Bidan, F Majorczyk
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 57-64, 2014
Compressed video stream watermarking for peer-to-peer based content distribution network
D Zou, N Prigent, J Bloom
2009 IEEE International Conference on Multimedia and Expo, 1390-1393, 2009
Sec2graph: Network attack detection based on novelty detection on graph structured data
L Leichtnam, E Totel, N Prigent, L Mé
International Conference on Detection of Intrusions and Malware, and …, 2020
Method for secure transfer of multiple small messages
A Kashyap, J Schmid, NFE Prigent, D Li, S Mathur
US Patent App. 13/138,758, 2012
Secure public cloud platform for medical images sharing.
W Pan, G Coatrieux, D Bouslimi, N Prigent
Studies in health technology and informatics 210, 251-255, 2015
An industrial and academic joint experiment on automated verification of a security protocol
O Heen, T Genet, S Geller, N Prigent
Mobile and Wireless Networks Security, 39-53, 2008
Homomorphic cryptography-based privacy-preserving network communications
A Guellier, C Bidan, N Prigent
International Conference on Applications and Techniques in Information …, 2014
Device and method using non-cycle accurate measurements for discovering emulated clients
O Heen, E Diehl, A Durand, M Karroumi, N Prigent
US Patent 9,137,248, 2015
A trust-based ids for the aodv protocol
MA Ayachi, C Bidan, N Prigent
International Conference on Information and Communications Security, 430-444, 2010
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
L Leichtnam, E Totel, N Prigent, L Mé
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
VEGAS: Visualizing, exploring and grouping alerts
D Crémilleux, C Bidan, F Majorczyk, N Prigent
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1097-1100, 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20