Android application classification and anomaly detection with graph-based permission patterns K Sokolova, C Perez, M Lemercier Decision Support Systems 93, 62-76, 2017 | 68 | 2017 |
Multi-layer crisis mapping: a social media-based approach B Birregah, T Top, C Perez, E Chatelet, N Matta, M Lemercier, H Snoussi 2012 IEEE 21st International Workshop on Enabling Technologies …, 2012 | 35 | 2012 |
Android passive MVC: a novel architecture model for the android application development K Sokolova, M Lemercier, L Garcia International Conference on Pervasive Patterns and Applications, 7-12, 2013 | 33 | 2013 |
Spot 1.0: Scoring suspicious profiles on twitter C Perez, M Lemercier, B Birregah, A Corpel 2011 International Conference on Advances in Social Networks Analysis and …, 2011 | 25 | 2011 |
Indirect information linkage for OSINT through authorship analysis of aliases R Layton, C Perez, B Birregah, P Watters, M Lemercier Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2013 …, 2013 | 22 | 2013 |
Towards high quality mobile applications: Android passive MVC architecture K Sokolova, M Lemercier, L Garcia, LC Saint Luc International Journal On Advances in Software 7 (2), 123-138, 2014 | 20 | 2014 |
A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications A El Attar, R Khatoun, M Lemercier 2014 global information infrastructure and networking symposium (GIIS), 1-6, 2014 | 19 | 2014 |
The multi-layer imbrication for data leakage prevention from mobile devices C Perez, B Birregah, M Lemercier 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 19 | 2012 |
A dynamic approach to detecting suspicious profiles on social platforms C Perez, M Lemercier, B Birregah 2013 IEEE International Conference on Communications Workshops (ICC), 174-178, 2013 | 16 | 2013 |
Continuous capitalization of design knowledge N Matta, B Eynard, L Roucoules, M Lemercier Proceedings of ECAI 2, 2002 | 15 | 2002 |
Effet électro-optique dans les cristaux de ZnSe J Baillou, M Lemercier, G Rivaud, B Pavis Revue de Physique Appliquée 8 (2), 121-126, 1973 | 15 | 1973 |
A smartphone-based online social network trust evaluation system C Perez, B Birregah, M Lemercier Social Network Analysis and Mining 3, 1293-1310, 2013 | 14 | 2013 |
A multidimensional trust model for vehicular ad-hoc networks M Najafi, L Khoukhi, M Lemercier 2021 IEEE 46th Conference on Local Computer Networks (LCN), 419-422, 2021 | 8 | 2021 |
Apports des technologies internet et du langage XML dans la constitution de mémoires de projet en conception de produits B Eynard, M Lemercier, N Matta Colloque Coopération, Innovation et Technologies 2001, 2001 | 8 | 2001 |
Decentralized prediction and reputation approach in vehicular networks M Najafi, L Khoukhi, M Lemercier Transactions on Emerging Telecommunications Technologies 33 (7), e4456, 2022 | 7 | 2022 |
Decentralized reputation model based on bayes' theorem in vehicular networks M Najafi, L Khoukhi, M Lemercier ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 7 | 2021 |
Privacy threats from social networking service aggregators O Jaafor, B Birregah, C Perez, M Lemercier 2014 Fifth Cybercrime and Trustworthy Computing Conference, 30-37, 2014 | 7 | 2014 |
Robust clustering methods for detecting smartphone's abnormal behavior A El Attar, R Khatoun, B Birregah, M Lemercier 2014 IEEE wireless communications and networking conference (WCNC), 2552-2557, 2014 | 7 | 2014 |
Familiar Strangers detection in online social networks C Perez, B Birregah, M Lemercier Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 7 | 2013 |
REPLOT: retrieving profile links on twitter for suspicious networks detection C Perez, B Birregah, R Layton, M Lemercier, P Watters Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 7 | 2013 |