Valerie Viet Triem Tong
Valerie Viet Triem Tong
Geverifieerd e-mailadres voor centralesupelec.fr
Titel
Geciteerd door
Geciteerd door
Jaar
Reachability analysis over term rewriting systems
G Feuillade, T Genet, VVT Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1252004
Reachability analysis over term rewriting systems
G Feuillade, T Genet, VVT Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1252004
Reachability analysis of term rewriting systems with timbuk
T Genet, VVT Tong
International Conference on Logic for Programming Artificial Intelligence …, 2001
802001
Biometric fuzzy extractors made practical: a proposal based on fingercodes
VVT Tong, H Sibert, J Lecoeur, M Girault
International conference on Biometrics, 604-613, 2007
672007
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
452015
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
442016
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems
T Genet, YM Tang-Talpin, VVT Tong
402003
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The {LASER} Workshop: learning from authoritative security experiment …, 2016
362016
An efficient distributed PKI for structured P2P networks
F Lesueur, L Mé, VVT Tong
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009
352009
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
322008
Detection and identification of Android malware based on information flow monitoring
R Andriatsimandefitra, VVT Tong
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
232015
Liability in software engineering: overview of the LISE approach and illustration on a case study
D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ...
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
232010
Capturing android malware behaviour using system flow graph
R Andriatsimandefitra, VVT Tong
International Conference on Network and System Security, 534-541, 2015
222015
Specifying and enforcing a fine-grained information flow policy: Model and experiments
V Tong, A Clark, L Mé
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
202010
A distributed certification system for structured P2P networks
F Lesueur, L Mé, VVT Tong
IFIP International Conference on Autonomous Infrastructure, Management and …, 2008
192008
Verifying the reliability of operating system-level information flow control systems in linux
L Georget, M Jaume, F Tronel, G Piolle, VVT Tong
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
182017
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
172013
Designing information flow policies for Android's operating system
R Andriatsimandefitra, S Geller, VVT Tong
2012 IEEE International conference on communications (ICC), 976-981, 2012
172012
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
172011
Specification of electronic voting protocol properties using adm logic: Foo case study
M Talbi, B Morin, VVT Tong, A Bouhoula, M Mejri
International Conference on Information and Communications Security, 403-418, 2008
172008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20