publication 17/10/2025 Policy-based intrusion detection in web applications by monitoring Java information flows
publication 17/10/2025 Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications : mise en œuvre sous Linux pour les programmes Java
publication 17/10/2025 Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)
publication 17/10/2025 Sécurité de la plate-forme d'exécution Java : limites et propositions d'améliorations
publication 17/10/2025 Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems
publication 17/10/2025 Intrusion Survivability for Commodity Operating Systems and Services: A Work in Progress
publication 27/06/2011 Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems
publication 17/10/2025 Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode
publication 17/10/2025 A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components
publication 17/10/2025 Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
publication 13/09/2015 HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors
publication 17/10/2025 A portable approach for SoC-based Dynamic Information Flow Tracking implementations
publication 29/08/2016 Towards a hardware-assisted information flow tracking ecosystem for ARM processors
publication 20/01/2016 HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors
publication 17/10/2025 Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
publication 17/10/2025 Proposing new ways of resolving online conflicts: an intelligent facilitation of forgiveness in {CMC}
publication 17/10/2025 Analyse de logs guidée par des vérifications de formules de responsabilité exprimées en CTL