Jean-Francois Lalande
Jean-Francois Lalande
Professor at CentraleSupélec
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
WW Smari, P Clemente, JF Lalande
Future Generation Computer Systems 31, 147-168, 2014
Seeing the unseen: Revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 International Conference on Availability, Reliability and Security, 701-710, 2013
Repackaging android applications for auditing access to private data
P Berthome, T Fecherolle, N Guilloteau, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
Software countermeasures for control flow integrity of smart card C codes
JF Lalande, K Heydemann, P Berthomé
European Symposium on Research in Computer Security, 200-218, 2014
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The {LASER} Workshop: learning from authoritative security experiment …, 2016
A practical set-membership proof for privacy-preserving NFC mobile ticketing
G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout
arXiv preprint arXiv:1505.03048, 2015
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
Security and Results of a Large-Scale High-Interaction Honeypot.
J Briffaut, JF Lalande, C Toinard
J. Comput. 4 (5), 395-404, 2009
High level model of control flow attacks for smart card functional security
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
Mascopt-a network optimization library: Graph manipulation
JF Lalande, M Syska, Y Verhoeven
INRIA, 2004
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies
J Briffaut, JF Lalande, C Toinard
International journal on advances in security 2 (4), 325-343, 2009
Quasi-optimal resource allocation in multispot MFTDMA satellite networks
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Combinatorial optimization in communication networks, 325-365, 2006
Approximate multicommodity flow for WDM networks design
M Bouklit, D Coudert, JF Lalande, C Paul, H Rivano
SIROCCO: Structural Information and Communication Complexity 10 (17), 43-56, 2003
Analysis of human awareness of security and privacy threats in smart environments
L Caviglione, JF Lalande, W Mazurczyk, S Wendzel
International Conference on Human Aspects of Information Security, Privacy …, 2015
Attack model for verification of interval security properties for smart card C codes
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach
M Blanc, J Briffaur, JJ Lalande, C Toinard
Seventh IEEE International Workshop on Policies for Distributed Systems and …, 2006
Detecting local covert channels using process activity correlation on android smartphones
M Urbanski, W Mazurczyk, JF Lalande, L Caviglione
International Journal of Computer Systems Science and Engineering 32 (2), 71-80, 2017
Improving mandatory access control for HPC clusters
M Blanc, JF Lalande
Future Generation Computer Systems 29 (3), 876-885, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20