Follow
Valerie Viet Triem Tong
Valerie Viet Triem Tong
Verified email at centralesupelec.fr
Title
Cited by
Cited by
Year
Reachability analysis over term rewriting systems
G Feuillade, T Genet, V Viet Triem Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1372004
Reachability analysis over term rewriting systems
G Feuillade, T Genet, V Viet Triem Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1372004
Reachability analysis of term rewriting systems with timbuk
T Genet, VVT Tong
International Conference on Logic for Programming Artificial Intelligence …, 2001
882001
Biometric fuzzy extractors made practical: a proposal based on fingercodes
VVT Tong, H Sibert, J Lecoeur, M Girault
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
782007
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
722016
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
572016
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
542015
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems
T Genet
Proc. of Workshop on Issues in the Theory of Security (WITS'03), 2003
432003
An efficient distributed PKI for structured P2P networks
F Lesueur, L Mé, VVT Tong
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009
412009
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
342008
From TTP to IoC: Advanced persistent graphs for threat hunting
A Berady, M Jaume, VVT Tong, G Guette
IEEE Transactions on Network and Service Management 18 (2), 1321-1333, 2021
282021
Capturing android malware behaviour using system flow graph
R Andriatsimandefitra, VVT Tong
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
272014
Detection and identification of android malware based on information flow monitoring
R Andriatsimandefitra, VVT Tong
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
252015
Liability in software engineering: overview of the LISE approach and illustration on a case study
D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ...
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
222010
Verifying the reliability of operating system-level information flow control systems in linux
L Georget, M Jaume, F Tronel, G Piolle, VVT Tong
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
212017
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
212013
Specifying and enforcing a fine-grained information flow policy: Model and experiments
V Tong, A Clark, L Mé
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
202010
Designing information flow policies for Android's operating system
R Andriatsimandefitra, S Geller, VVT Tong
2012 IEEE International conference on communications (ICC), 976-981, 2012
192012
Blare tools: A policy-based intrusion detection system automatically set by the security policy
L George, V Viet Triem Tong, L Mé
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
192009
A distributed certification system for structured P2P networks
F Lesueur, L Mé, V Viet Triem Tong
Resilient Networks and Services: Second International Conference on …, 2008
192008
The system can't perform the operation now. Try again later.
Articles 1–20