Survey on security threats and protection mechanisms in embedded automotive networks I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 277 | 2013 |
Lessons learned from the deployment of a high-interaction honeypot E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb 2006 Sixth European Dependable Computing Conference, 39-46, 2006 | 182 | 2006 |
A language-based intrusion detection approach for automotive embedded networks I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi International Journal of Embedded Systems 10 (1), 1-12, 2018 | 130 | 2018 |
State of the art of network protocol reverse engineering tools J Duchêne, C Le Guernic, E Alata, V Nicomette, M Kaâniche Journal of Computer Virology and Hacking Techniques 14, 53-68, 2018 | 87 | 2018 |
Empirical analysis and statistical modeling of attack processes based on honeypots M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette arXiv preprint arXiv:0704.0861, 2007 | 73 | 2007 |
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned V Nicomette, M Kaâniche, E Alata, M Herrb Journal in computer virology 7, 143-157, 2011 | 71 | 2011 |
Smart-TV security analysis: practical experiments Y Bachy, F Basse, V Nicomette, E Alata, M Kaâniche, JC Courrege, ... 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 50 | 2015 |
Toward an intrusion detection approach for IoT based on radio communications profiling J Roux, E Alata, G Auriol, V Nicomette, M Kaâniche 2017 13th European dependable computing conference (EDCC), 147-150, 2017 | 48 | 2017 |
A clustering approach for web vulnerabilities detection A Dessiatnikoff, R Akrout, E Alata, M Kaâniche, V Nicomette 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011 | 47 | 2011 |
Survey of security problems in cloud computing virtual machines I Studnia, E Alata, Y Deswarte, M Kaâniche, V Nicomette Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012 …, 2012 | 43 | 2012 |
Collection and analysis of attack data based on honeypots deployed on the internet E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ... Quality of Protection: Security Measurements and Metrics, 79-91, 2006 | 43 | 2006 |
Computer-security-oriented escape room E Beguin, S Besnard, A Cros, B Joannes, O Leclerc-Istria, A Noel, ... IEEE Security & Privacy 17 (4), 78-83, 2019 | 41 | 2019 |
An automated black box approach for web vulnerability identification and attack scenario generation R Akrout, E Alata, M Kaaniche, V Nicomette Journal of the Brazilian Computer Society 20, 1-16, 2014 | 39 | 2014 |
Bypassing IOMMU protection against I/O attacks B Morgan, E Alata, V Nicomette, M Kaâniche 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), 145-150, 2016 | 36 | 2016 |
Security of embedded automotive networks: state of the art and a research proposal I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi SAFECOMP 2013-workshop CARS (2nd workshop on critical automotive …, 2013 | 34 | 2013 |
Radiot: Radio communications intrusion detection for iot-a protocol independent approach J Roux, E Alata, G Auriol, M Kaâniche, V Nicomette, R Cayre 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 30 | 2018 |
IOMMU protection against I/O attacks: a vulnerability and a proof of concept B Morgan, E Alata, V Nicomette, M Kaâniche Journal of the Brazilian Computer Society 24, 1-11, 2018 | 27 | 2018 |
Mirage: towards a metasploit-like framework for iot R Cayre, V Nicomette, G Auriol, E Alata, M Kaâniche, G Marconato 2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019 | 21 | 2019 |
Potential attacks on onboard aerospace systems A Dessiatnikoff, Y Deswarte, E Alata, V Nicomette IEEE Security & Privacy 10 (4), 71-74, 2012 | 21 | 2012 |
Smart-TV security: risk analysis and experiments on Smart-TV communication channels Y Bachy, V Nicomette, M Kaâniche, E Alata Journal of Computer Virology and Hacking Techniques 15, 61-76, 2019 | 19 | 2019 |