Olivereau, Alexis
35  results:
Search for persons X
?
1

Multi-stage Attack Detection and Prediction Using Graph Neu..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
2

Efficient Network Representation for GNN-Based Intrusion De..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

On the Management of TSN Networks in 6G: A Network Digital ..:

, In: 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA),
 
?
4

Unsupervised Protocol-based Intrusion Detection for Real-wo..:

, In: 2020 International Conference on Computing, Networking and Communications (ICNC),
 
?
5

Configuration of the Detection Function in a Distributed ID..:

, In: 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN),
 
?
6

Predicting Bandwidth Utilization on Network Links Using Mac..:

, In: 2020 European Conference on Networks and Communications (EuCNC),
 
?
7

Time Synchronization Attack Scenarios and Analysis of Effec..:

, In: 2019 17th International Conference on Privacy, Security and Trust (PST),
 
?
8

Autonomous Detection of Synchronization Attacks in the Indu..:

, In: 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC),
 
?
9

End-Node Security:

, In: Internet of Things Security and Data Protection; Internet of Things,
 
?
11

A survey of collaborative services and security-related iss..:

Ben Saied, Yosra ; Olivereau, Alexis ; Zeghlache, Djamal.
Journal of Network and Computer Applications.  45 (2014)  - p. 215-227 , 2014
 
?
14

(k, n) threshold distributed key exchange for HIP based int..:

, In: Proceedings of the 10th ACM international symposium on Mobility management and wireless access,
Ben Saied, Yosra ; Olivereau, Alexis - p. 79-86 , 2012
 
1-15