Survey on security threats and protection mechanisms in embedded automotive networks I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 265 | 2013 |
Lessons learned from the deployment of a high-interaction honeypot E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb 2006 Sixth European Dependable Computing Conference, 39-46, 2006 | 181 | 2006 |
A language-based intrusion detection approach for automotive embedded networks I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi International Journal of Embedded Systems 10 (1), 1-12, 2018 | 114 | 2018 |
State of the art of network protocol reverse engineering tools J Duchêne, C Le Guernic, E Alata, V Nicomette, M Kaâniche Journal of Computer Virology and Hacking Techniques 14, 53-68, 2018 | 84 | 2018 |
Empirical analysis and statistical modeling of attack processes based on honeypots M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette arXiv preprint arXiv:0704.0861, 2007 | 74 | 2007 |
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned V Nicomette, M Kaâniche, E Alata, M Herrb Journal in computer virology 7, 143-157, 2011 | 70 | 2011 |
Toward an intrusion detection approach for IoT based on radio communications profiling J Roux, E Alata, G Auriol, V Nicomette, M Kaâniche 2017 13th European dependable computing conference (EDCC), 147-150, 2017 | 47 | 2017 |
Smart-TV security analysis: practical experiments Y Bachy, F Basse, V Nicomette, E Alata, M Kaâniche, JC Courrege, ... 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 47 | 2015 |
Survey of security problems in cloud computing virtual machines I Studnia, E Alata, Y Deswarte, M Kaâniche, V Nicomette Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012 …, 2012 | 44 | 2012 |
A clustering approach for web vulnerabilities detection A Dessiatnikoff, R Akrout, E Alata, M Kaâniche, V Nicomette 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011 | 44 | 2011 |
Collection and analysis of attack data based on honeypots deployed on the internet E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ... Quality of Protection: Security Measurements and Metrics, 79-91, 2006 | 44 | 2006 |
Computer-security-oriented escape room E Beguin, S Besnard, A Cros, B Joannes, O Leclerc-Istria, A Noel, ... IEEE Security & Privacy 17 (4), 78-83, 2019 | 37 | 2019 |
An automated black box approach for web vulnerability identification and attack scenario generation R Akrout, E Alata, M Kaaniche, V Nicomette Journal of the Brazilian Computer Society 20, 1-16, 2014 | 37 | 2014 |
Security of embedded automotive networks: state of the art and a research proposal I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi SAFECOMP 2013-workshop CARS (2nd workshop on critical automotive …, 2013 | 33 | 2013 |
Bypassing IOMMU protection against I/O attacks B Morgan, E Alata, V Nicomette, M Kaâniche 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), 145-150, 2016 | 32 | 2016 |
Radiot: Radio communications intrusion detection for iot-a protocol independent approach J Roux, E Alata, G Auriol, M Kaâniche, V Nicomette, R Cayre 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 28 | 2018 |
IOMMU protection against I/O attacks: a vulnerability and a proof of concept B Morgan, E Alata, V Nicomette, M Kaâniche Journal of the Brazilian Computer Society 24, 1-11, 2018 | 23 | 2018 |
Potential attacks on onboard aerospace systems A Dessiatnikoff, Y Deswarte, E Alata, V Nicomette IEEE Security & Privacy 10 (4), 71-74, 2012 | 21 | 2012 |
Smart-TV security: risk analysis and experiments on Smart-TV communication channels Y Bachy, V Nicomette, M Kaâniche, E Alata Journal of Computer Virology and Hacking Techniques 15, 61-76, 2019 | 18 | 2019 |
Shark: Spy honeypot with advanced redirection kit I Alberdi, É Philippe, O Vincent, NM Kaâniche Proceedings of the IEEE workshop on monitoring, attack detection and …, 2007 | 18 | 2007 |