EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, F. Tronel.

    Dependability Evaluation of Cluster-based Distributed Systems, in: International Journal of Foundations of Computer Science (IJFCS), Aug 2011, vol. 22, no 5, p. 1123-1142.
  • 2M. A. Ayachi, C. Bidan, N. Prigent.

    A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010.
  • 3J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 4S. Gambs, B. Kégl, E. Aïmeur.

    Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, p. 131-170.
  • 5G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, p. 265–279.
  • 6L. , H. Debar.

    New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1.
  • 7G. Piolle, Y. Demazeau.

    Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, p. 209-226.
  • 8G. Piolle.

    A dyadic operator for the gradation of desirability, in: Proc. of the 10th international conference on deontic logic in computer science (DEON'10), Fiesole, Italy, LNAI, Springer, July 2010, vol. 6181, p. 33-49.
  • 9E. Totel, F. Majorczyk, L. .

    COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005.
  • 10D. Zou, N. Prigent, J. Bloom.

    Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 11H. Borba Ribeiro.

    L'Exploitation de Codes Fontaines pour un Stockage Persistant des Données dans les Réseaux d'Overlay Structurés, Université Rennes 1, October 2012.

    http://hal.inria.fr/tel-00763284
  • 12E. Totel.

    Techniques de détection d'erreur appliquées à la détection d'intrusion, Université Rennes 1, December 2012, Habilitation à Diriger des Recherches.

    http://hal.inria.fr/tel-00763746

Articles in International Peer-Reviewed Journals

  • 13E. Anceaume, F. Castella, B. Sericola.

    Analysis of a large number of Markov chains competing for transitions, in: International Journal of Systems Science, July 2012, 9 p. [ DOI : 10.1080/00207721.2012.704090 ]

    http://hal.inria.fr/hal-00736916
  • 14E. Anceaume, R. Ludinard, B. Sericola.

    Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, p. 108-117. [ DOI : 10.1145/2185395.2185447 ]

    http://hal.inria.fr/hal-00736918
  • 15R. Andriatsimandefitra, V. Viet Triem Tong, L. .

    User Data on Androïd Smartphone Must be Protected, in: ERCIM News, July 2012, no 90, 18 p.

    http://hal.inria.fr/hal-00735993
  • 16E. Aïmeur, G. Brassard, S. Gambs.

    Quantum speed-up for unsupervised learning, in: Machine Learning, September 2012.

    http://hal.inria.fr/hal-00736948
  • 17E. Aïmeur, G. Brassard, S. Gambs, D. Schönfeld.

    P3ERS: Privacy-Preserving PEer Review System, in: Transactions on Data Privacy, October 2012.

    http://hal.inria.fr/hal-00737755
  • 18T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.

    User Data Confidentiality in an Orchestration of Web Services, in: International Journal of Information Assurance and Security, 2012, vol. 7.

    http://hal.inria.fr/hal-00735996
  • 19S. Gambs.

    Inference attacks on geolocated data, in: ERCIM News, July 2012, 23 p.

    http://hal.inria.fr/hal-00736946
  • 20C. Humphries, N. Prigent, C. Bidan.

    Visualization for Monitoring Network Security Events, in: ERCIM News, July 2012, no 90, 31 p.

    http://hal.inria.fr/hal-00735995

Articles in National Peer-Reviewed Journals

  • 21Y. Deswarte, S. Gambs.

    Cyber-attaques et cyber-défenses: problématique et évolution, in: La Revue de l'Electricité et de l'Electronique, May 2012, no 2, p. 23-35.

    http://hal.inria.fr/hal-00736950
  • 22M. Jaume, V. Viet Triem Tong, G. Hiet.

    Spécification et mécanisme de détection de flots d'information illégaux, in: Technique et Science Informatiques (TSI), 2012, vol. 31, no 6, p. 713-742. [ DOI : 10.3166/tsi.31.713-742 ]

    http://hal.inria.fr/hal-00761351
  • 23I. Moise, M. Hurfin, J.-P. Le Narzul, F. Majorczyk.

    Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type " Fast Paxos ", in: Technique et Science Informatiques (TSI), December 2012, vol. 31, no 8-9-10, p. 1301-1325. [ DOI : 10.3166/TSI.31.1301-1325 ]

    http://hal.inria.fr/hal-00765487

Invited Conferences

  • 24G. Piolle.

    Protection de la vie privée : appréhension de concepts éthiques par un agent autonome, in: Atelier D2A2 "Agents Autonomes et Éthique" à RFIA 2012, Lyon, France, January 2012.

    http://hal.inria.fr/hal-00682660

International Conferences with Proceedings

  • 25M. Alaggan, S. Gambs, A.-M. Kermarrec.

    BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom Filters, in: 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Toronto, Canada, October 2012.

    http://hal.inria.fr/hal-00724829
  • 26E. Anceaume, Y. Busnel.

    An Information Divergence Estimation over Data Streams, in: 11th IEEE International Symposium on Network Computing and Applications (IEEE NCA12), Cambridge, MA, United States, C. Elks (editor), IEEE, August 2012, vol. 11, Number 72 p, 11 pages.

    http://hal.inria.fr/hal-00725097
  • 27E. Anceaume, Y. Busnel, S. Gambs.

    AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence, in: Ninth European Dependable Computing Conference (EDCC 2012), Sibiu, Romania, LNCS, Springer-Verlag, May 2012, 12 p.

    http://hal.inria.fr/hal-00677077
  • 28E. Anceaume, Y. Busnel, S. Gambs.

    AnKLe: détection automatique d'attaques par divergence d'information, in: 14èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), La Grande Motte, France, F. Mathieu, N. Hanusse (editors), 2012, p. 1-4, 4 pages.

    http://hal.inria.fr/hal-00688352
  • 29E. Anceaume, R. Ludinard, B. Sericola, E. Le Merrer, G. Straub.

    FixMe: A Self-organizing Isolated Anomaly Detection Architecture for Large Scale Distributed Systems, in: Proceedings of the 16th International Conference On Principles Of Distributed Systems (OPODIS), Rome, Italy, December 2012, 12 p.

    http://hal.inria.fr/hal-00736922
  • 30R. Andriatsimandefitra, S. Geller, V. Viet Triem Tong.

    Designing information flow policies for Android's operating system, in: IEEE ICC 2012, Ottawa, Canada, June 2012, p. 976-981.

    http://hal.inria.fr/hal-00736034
  • 31C. Artigues, Y. Deswarte, J. Guiochet, M.-J. Huguet, M.-O. Killijian, D. Powell, M. Roy, C. Bidan, N. Prigent, E. Anceaume, S. Gambs, G. Guette, M. Hurfin, F. Schettini.

    AMORES: an architecture for mobiquitous resilient systems, in: ARMOR'12, Sibiu, Romania, April 2012, no 7, 7 p, ISBN: 978-1-4503-1150-2. [ DOI : 10.1145/2222436.2222443 ]

    http://hal.inria.fr/hal-00736020
  • 32G. Bossert, F. Guihéry, G. Hiet.

    Netzob : un outil pour la rétro-conception de protocoles de communication, in: SSTIC 2012, Rennes, France, June 2012, 43 p.

    http://hal.inria.fr/hal-00763751
  • 33S. Gambs, A. Gmati, M. Hurfin.

    Reconstruction attack through classifier analysis, in: DBSEC - 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy - 2012, Paris, France, Springer, July 2012, vol. 7371, p. 274-281.

    http://hal.inria.fr/hal-00736945
  • 34S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez.

    Next place prediction using mobility Markov chains, in: MPM - EuroSys 2012 Workshop on Measurement, Privacy, and Mobility - 2012, Bern, Switzerland, April 2012.

    http://hal.inria.fr/hal-00736947
  • 35S. Gambs, M.-O. Killijian, M. Roy, M. Traoré.

    Locanyms: Towards Privacy-Preserving Location-Based Services, in: 1st European Workshop on AppRoaches to MObiquiTous Resilience, Sibiu, Romania, May 2012, 6 p.

    http://hal.inria.fr/hal-00699742
  • 36S. Gambs, J. Lolive.

    SlopPy: Slope One with Privacy, in: DPM - 7th DPM International Workshop on Data Privacy Management - 2012, Pisa, Italy, September 2012.

    http://hal.inria.fr/hal-00736949
  • 37S. Gambs, G. Rachid, H. Hamza, F. Huc, A.-M. Kermarrec.

    Scalable and Secure Polling in Dynamic Distributed Networks, in: 31st International Symposium on Reliable Distributed Systems (SRDS), Irvine, California, United States, October 2012.

    http://hal.inria.fr/hal-00723566
  • 38C. Hauser, F. Tronel, J. Reid, C. Fidge.

    A taint marking approach to confidentiality violation detection, in: AISC 2012, Melbourne, Australia, CRPIT, Pieprzyk, Josef & Thomborson, Clark (Eds.), February 2012, vol. 125, p. 83-90.

    http://hal.inria.fr/hal-00736045
  • 39M. Hurfin, I. E. Moise, J.-P. Le Narzul, F. Majorczyk.

    Adaptive Strategies for Speeding Up Sequences of Consensus, in: 26th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, 2012, p. 435-442.

    http://hal.inria.fr/hal-00725049
  • 40C. Li, M. Hurfin, Y. Wang.

    Brief Announcement: Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks, in: DISC - 26th International Symposium on Distributed Computing, Salvador, Brazil, M. K. Aguilera (editor), LNCS, Springer, October 2012, vol. 7611, p. 405-406. [ DOI : 10.1007/978-3-642-33651-5 ]

    http://hal.inria.fr/hal-00745112
  • 41R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaaniche, E. Alata, R. Akrout, Y. Bachy.

    Detecting Attacks against Data in Web Applications, in: CRiSIS 2012, Cork, Ireland, October 2012.

    http://hal.inria.fr/hal-00735997
  • 42L. Zeghache, N. Badache, M. Hurfin, I. Moise.

    Providing Reliability for transactional mobile agents, in: 5th International Conference on Advanced Infocomm Technology, Paris, France, V. Guyot (editor), Springer, July 2012.

    http://hal.inria.fr/hal-00763197

National Conferences with Proceeding

  • 43T. Demongeot, E. Totel, V. Viet Triem Tong.

    User Defined Control Flow Policy for Web Service Orchestration, in: C&ESAR 2012, Rennes, France, November 2012.

    http://hal.inria.fr/hal-00761354

Conferences without Proceedings

  • 44S. Gambs, A. Gmati, M. Hurfin.

    Reconstruction Attack through Classifier Analysis, in: APVP'12 - 3ième édition Atelier Protection de la Vie Privée, Ile de Groix, France, June 2012.

    http://hal.inria.fr/hal-00747531
  • 45S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez.

    De-anonymization attack on geolocated datasets, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.

    http://hal.inria.fr/hal-00765525
  • 46S. Gambs, M.-O. Killijian, M. Roy, M. Traoré.

    Locanyms: Towards privacy-preserving location-based services, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.

    http://hal.inria.fr/hal-00765530
  • 47S. Gambs, J. Lolive.

    SlopPy: Slope One with privacy, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.

    http://hal.inria.fr/hal-00765519
  • 48P. Lajoie Mazenc.

    Système de réputation préservant la vie privée, in: 3ième édition Atelier Protection de la vie privée, Groix, France, November 2012.

    http://hal.inria.fr/hal-00763377
  • 49R. Paiva Melo Marin, G. Piolle, C. Bidan.

    Privacy Policy Requirements for Distributed Social Network Systems, in: APVP'12, Groix, France, June 2012.

    http://hal.inria.fr/hal-00736023

Scientific Books (or Scientific Book chapters)

  • 50Y. Deswarte, S. Gambs.

    The challenges raised by the privacy-preserving identity card, in: Cryptography and Security: From Theory to Applications, D. Naccache (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 6805, p. 383-404. [ DOI : 10.1007/978-3-642-28368-0 ]

    http://hal.inria.fr/hal-00736944

Internal Reports

  • 51E. Anceaume, Y. Busnel.

    Sketch -metric: Comparing Data Streams via Sketching, IRISA, December 2012, no 2001.

    http://hal.inria.fr/hal-00764772
  • 52E. Anceaume, G. Guette, P. Lajoie Mazenc, N. Prigent, V. Viet Triem Tong.

    A Privacy Preserving Distributed Reputation Mechanism, IRISA, October 2012, no 2000.

    http://hal.inria.fr/hal-00763212
  • 53C. Li, M. Hurfin, Y. Wang.

    Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks, Inria, May 2012, no RR-7985, 17 p.

    http://hal.inria.fr/hal-00703111
References in notes
  • 54Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 55G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), 2008.
  • 56A. Myers, F. Schneider, K. Birman.

    Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.

    http://www.cs.cornell.edu/Projects/secft/
  • 57G. Piolle, Y. Demazeau.

    Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, p. 162–168.
  • 58O. Sarrouy, E. Totel, B. Jouga.

    Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, p. 299–306.
  • 59J. Zimmermann, L. , C. Bidan.

    An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.