Reachability analysis over term rewriting systems G Feuillade, T Genet, V Viet Triem Tong Journal of Automated Reasoning 33 (3), 341-383, 2004 | 138 | 2004 |
Reachability analysis of term rewriting systems with timbuk T Genet, VVT Tong International Conference on Logic for Programming Artificial Intelligence …, 2001 | 89 | 2001 |
Terminaptor: Highlighting advanced persistent threats through information flow tracking G Brogi, VVT Tong 2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016 | 79 | 2016 |
Biometric fuzzy extractors made practical: a proposal based on fingercodes VVT Tong, H Sibert, J Lecoeur, M Girault Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 78 | 2007 |
Kharon dataset: Android malware under a microscope N Kiss, JF Lalande, M Leslous, VVT Tong The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016 | 57 | 2016 |
GroddDroid: a gorilla for triggering malicious behaviors A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong 2015 10th international conference on malicious and unwanted software …, 2015 | 56 | 2015 |
An efficient distributed PKI for structured P2P networks F Lesueur, L Mé, VVT Tong 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009 | 43 | 2009 |
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems T Genet Proc. of Workshop on Issues in the Theory of Security (WITS'03), 2003 | 42 | 2003 |
Policy-based intrusion detection in web applications by monitoring java information flows G Hiet, VVT Tong, L Me, B Morin 2008 Third International Conference on Risks and Security of Internet and …, 2008 | 33 | 2008 |
From TTP to IoC: Advanced persistent graphs for threat hunting A Berady, M Jaume, VVT Tong, G Guette IEEE Transactions on Network and Service Management 18 (2), 1321-1333, 2021 | 29 | 2021 |
Capturing android malware behaviour using system flow graph R Andriatsimandefitra, VVT Tong Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 26 | 2014 |
Detection and identification of android malware based on information flow monitoring R Andriatsimandefitra, VVT Tong 2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015 | 25 | 2015 |
Liability in software engineering: overview of the LISE approach and illustration on a case study D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ... Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 24 | 2010 |
Specifying and enforcing a fine-grained information flow policy: Model and experiments V Tong, A Clark, L Mé Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010 | 22 | 2010 |
Verifying the reliability of operating system-level information flow control systems in linux L Georget, M Jaume, F Tronel, G Piolle, VVT Tong 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017 | 21 | 2017 |
A privacy preserving distributed reputation mechanism E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong 2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013 | 21 | 2013 |
Teaching android mobile security JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ... Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 20 | 2019 |
Information flow control for intrusion detection derived from mac policy S Geller, C Hauser, F Tronel, VVT Tong 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 19 | 2011 |
Blare tools: A policy-based intrusion detection system automatically set by the security policy L George, V Viet Triem Tong, L Mé Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 19 | 2009 |
A distributed certification system for structured P2P networks F Lesueur, L Mé, V Viet Triem Tong Resilient Networks and Services: Second International Conference on …, 2008 | 19 | 2008 |