Ikuti
alata eric
alata eric
INSA Toulouse - LAAS CNRS
Email yang diverifikasi di laas.fr
Judul
Dikutip oleh
Dikutip oleh
Tahun
Survey on security threats and protection mechanisms in embedded automotive networks
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
2772013
Lessons learned from the deployment of a high-interaction honeypot
E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb
2006 Sixth European Dependable Computing Conference, 39-46, 2006
1822006
A language-based intrusion detection approach for automotive embedded networks
I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi
International Journal of Embedded Systems 10 (1), 1-12, 2018
1302018
State of the art of network protocol reverse engineering tools
J Duchêne, C Le Guernic, E Alata, V Nicomette, M Kaâniche
Journal of Computer Virology and Hacking Techniques 14, 53-68, 2018
872018
Empirical analysis and statistical modeling of attack processes based on honeypots
M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette
arXiv preprint arXiv:0704.0861, 2007
732007
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
V Nicomette, M Kaâniche, E Alata, M Herrb
Journal in computer virology 7, 143-157, 2011
712011
Smart-TV security analysis: practical experiments
Y Bachy, F Basse, V Nicomette, E Alata, M Kaâniche, JC Courrege, ...
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
502015
Toward an intrusion detection approach for IoT based on radio communications profiling
J Roux, E Alata, G Auriol, V Nicomette, M Kaâniche
2017 13th European dependable computing conference (EDCC), 147-150, 2017
482017
A clustering approach for web vulnerabilities detection
A Dessiatnikoff, R Akrout, E Alata, M Kaâniche, V Nicomette
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
472011
Survey of security problems in cloud computing virtual machines
I Studnia, E Alata, Y Deswarte, M Kaâniche, V Nicomette
Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012 …, 2012
432012
Collection and analysis of attack data based on honeypots deployed on the internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection: Security Measurements and Metrics, 79-91, 2006
432006
Computer-security-oriented escape room
E Beguin, S Besnard, A Cros, B Joannes, O Leclerc-Istria, A Noel, ...
IEEE Security & Privacy 17 (4), 78-83, 2019
412019
An automated black box approach for web vulnerability identification and attack scenario generation
R Akrout, E Alata, M Kaaniche, V Nicomette
Journal of the Brazilian Computer Society 20, 1-16, 2014
392014
Bypassing IOMMU protection against I/O attacks
B Morgan, E Alata, V Nicomette, M Kaâniche
2016 Seventh Latin-American Symposium on Dependable Computing (LADC), 145-150, 2016
362016
Security of embedded automotive networks: state of the art and a research proposal
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
SAFECOMP 2013-workshop CARS (2nd workshop on critical automotive …, 2013
342013
Radiot: Radio communications intrusion detection for iot-a protocol independent approach
J Roux, E Alata, G Auriol, M Kaâniche, V Nicomette, R Cayre
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
302018
IOMMU protection against I/O attacks: a vulnerability and a proof of concept
B Morgan, E Alata, V Nicomette, M Kaâniche
Journal of the Brazilian Computer Society 24, 1-11, 2018
272018
Mirage: towards a metasploit-like framework for iot
R Cayre, V Nicomette, G Auriol, E Alata, M Kaâniche, G Marconato
2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019
212019
Potential attacks on onboard aerospace systems
A Dessiatnikoff, Y Deswarte, E Alata, V Nicomette
IEEE Security & Privacy 10 (4), 71-74, 2012
212012
Smart-TV security: risk analysis and experiments on Smart-TV communication channels
Y Bachy, V Nicomette, M Kaâniche, E Alata
Journal of Computer Virology and Hacking Techniques 15, 61-76, 2019
192019
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20