Cayré, Florent
44  results:
Search for persons X
?
1

A finite volume method to solve the Navier–Stokes equations..:

Boivin, Sylvain ; Cayré, Florent ; Hérard, Jean-Marc
International Journal of Thermal Sciences.  39 (2000)  8 - p. 806-825 , 2000
 
?
4

Wireless Modulation Identification: Filling the Gap in IoT ..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
6

A defensive man-in-middle approach to filter BLE packets:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
7

Cross-protocol attacks : weaponizing a smartphone by div..:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
8

A PSD-based fingerprinting approach to detect IoT device sp..:

, In: 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC),
 
?
 
?
10

Cross-protocol attacks: weaponizing a smartphone by diverti..:

Cayre, Romain ; Marconato, Géraldine ; Galtier, Florent...
info:eu-repo/semantics/altIdentifier/doi/10.1145/3448300.3468258.  , 2021
 
?
11

Cross-protocol attacks: weaponizing a smartphone by diverti..:

Cayre, Romain ; Marconato, Géraldine ; Galtier, Florent...
info:eu-repo/semantics/altIdentifier/doi/10.1145/3448300.3468258.  , 2021
 
?
14

A defensive man-in-middle approach to filter BLE packets:

Aboukora, Ahmed ; Bonnet, Guillaume ; Galtier, Florent...
info:eu-repo/semantics/altIdentifier/doi/10.1145/3448300.3468259.  , 2021
 
?
15

InjectaBLE: Injecting malicious traffic into established Bl..:

Cayre, Romain ; Galtier, Florent ; Auriol, Guillaume...
info:eu-repo/semantics/altIdentifier/doi/10.1109/DSN48987.2021.00050.  , 2021
 
1-15