关注
Jean-Francois Lalande
Jean-Francois Lalande
Professor at CentraleSupélec
在 centralesupelec.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
1552015
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
WW Smari, P Clemente, JF Lalande
Future Generation Computer Systems 31, 147-168, 2014
1132014
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 international conference on availability, reliability and security, 701-710, 2013
682013
Software countermeasures for control flow integrity of smart card C codes
JF Lalande, K Heydemann, P Berthomé
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
612014
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
562016
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
552015
Repackaging android applications for auditing access to private data
P Berthome, T Fecherolle, N Guilloteau, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
552012
A practical set-membership proof for privacy-preserving NFC mobile ticketing
G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout
arXiv preprint arXiv:1505.03048, 2015
412015
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
352005
Security and Results of a Large-Scale High-Interaction Honeypot.
J Briffaut, JF Lalande, C Toinard
J. Comput. 4 (5), 395-404, 2009
342009
High level model of control flow attacks for smart card functional security
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
292012
Detecting local covert channels using process activity correlation on android smartphones
M Urbanski, W Mazurczyk, JF Lalande, L Caviglione
International Journal of Computer Systems Science and Engineering 32 (2), 71-80, 2017
222017
Analysis of human awareness of security and privacy threats in smart environments
L Caviglione, JF Lalande, W Mazurczyk, S Wendzel
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
222015
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies
J Briffaut, JF Lalande, C Toinard
International journal on advances in security 2 (4), 325-343, 2009
212009
Formally verified software countermeasures for control-flow integrity of smart card C code
K Heydemann, JF Lalande, P Berthomé
Computers & Security 85, 202-224, 2019
202019
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
192019
Quasi-optimal resource allocation in multispot MFTDMA satellite networks
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Combinatorial optimization in communication networks, 325-365, 2006
192006
Mascopt-a network optimization library: Graph manipulation
JF Lalande, M Syska, Y Verhoeven
INRIA, 2004
172004
Approximate Multicommodity Flow for WDM Networks Design.
M Bouklit, D Coudert, JF Lalande, C Paul, H Rivano
Sirocco 10, 43-56, 2003
172003
Attack model for verification of interval security properties for smart card C codes
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
162010
系统目前无法执行此操作,请稍后再试。
文章 1–20