NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures M Pattaranantakul, R He, Q Song, Z Zhang, A Meddahi IEEE Communications Surveys & Tutorials 20 (4), 3330-3368, 2018 | 123 | 2018 |
System for supervising the security of an architecture R He, M Lacoste, A Wailly US Patent 9,380,075, 2016 | 82 | 2016 |
Secmano: Towards network functions virtualization (nfv) based security management and orchestration M Pattaranantakul, R He, A Meddahi, Z Zhang 2016 IEEE Trustcom/BigDataSE/ISPA, 598-605, 2016 | 72 | 2016 |
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models M Compastié, R Badonnel, O Festor, R He Computers & Security 97, 101905, 2020 | 46 | 2020 |
Controller DAC: Securing SDN controller with dynamic access control Y Tseng, M Pattaranantakul, R He, Z Zhang, F Naït-Abdesselam 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 45 | 2017 |
Think: View-based support of non-functional properties in embedded systems M Anne, R He, T Jarboui, M Lacoste, O Lobry, G Lorant, M Louvel, ... 2009 International Conference on Embedded Software and Systems, 147-156, 2009 | 43 | 2009 |
A first step towards security extension for NFV orchestrator M Pattaranantakul, Y Tseng, R He, Z Zhang, A Meddahi Proceedings of the ACM International Workshop on Security in Software …, 2017 | 30 | 2017 |
Applying component-based design to self-protection of ubiquitous systems R He, M Lacoste Proceedings of the 3rd ACM workshop on Software engineering for pervasive …, 2008 | 28 | 2008 |
A policy management framework for self-protection of pervasive systems R He, M Lacoste, J Leneutre 2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010 | 27 | 2010 |
Putting together QoS and security in autonomic pervasive systems M Alia, M Lacoste, R He, F Eliassen Proceedings of the 6th ACM workshop on QoS and security for wireless and …, 2010 | 24 | 2010 |
Leveraging network functions virtualization orchestrators to achieve software-defined access control in the clouds M Pattaranantakul, R He, Z Zhang, A Meddahi, P Wang IEEE Transactions on Dependable and Secure Computing 18 (1), 372-383, 2018 | 21 | 2018 |
Method and a server for processing a request from a terminal to access a computer resource R He, X Qian US Patent App. 14/313,993, 2014 | 20 | 2014 |
Unikernel-based approach for software-defined security in cloud infrastructures M Compastié, R Badonnel, O Festor, R He, M Kassi-Lahlou NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2018 | 18 | 2018 |
A component-based policy-neutral architecture for kernel-level access control M Lacoste, T Jarboui, R He annals of telecommunications-annales des télécommunications 64, 121-146, 2009 | 18 | 2009 |
Method for processing access requests and web browser R He, J Chawki US Patent 10,999,405, 2021 | 17 | 2021 |
Method of authenticating a terminal by a gateway of an internal network protected by an access security entity providing secure access R He, J Chawki US Patent 10,356,612, 2019 | 16 | 2019 |
A tosca-oriented software-defined security approach for unikernel-based protected clouds M Compastié, R Badonnel, O Festor, R He 2019 IEEE Conference on Network Softwarization (NetSoft), 151-159, 2019 | 16 | 2019 |
Estimating web attack detection via model uncertainty from inaccurate annotation X Gong, Y Zhou, Y Bi, M He, S Sheng, H Qiu, R He, J Lu 2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019 | 14 | 2019 |
Device and a method for managing access to a pool of computer and network resources made available to an entity by a cloud computing system R He, J Lebourgeois, J Terrier US Patent 9,736,029, 2017 | 13 | 2017 |
Model uncertainty based annotation error fixing for web attack detection X Gong, J Lu, Y Zhou, H Qiu, R He Journal of Signal Processing Systems 93, 187-199, 2021 | 12 | 2021 |