<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Toutain, Laurent"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : F | N | P
Nombre de documents: 9

F

Fourcot, F., Toutain, L., Köpsell, S., Cuppens, F., & Boulahia Cuppens, N. (août 2013). IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices [Communication écrite]. 19th EUNICE/IFIP WG 6.6 International Workshop on Advances in Communication Networking, Chemnitz, Germany. Lien externe

N

Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet of Things Journal, 8(10), 7818-7832. Lien externe

Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Computer Networks, 187, 14 pages. Lien externe

P

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., & Toutain, L. (février 2010). Architecture-Aware Adaptive Deployment of Contextual Security Policies [Communication écrite]. International Conference on Availability, Reliability and Security, Krakow, Poland. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (février 2010). Model-Driven Security Policy Deployment: Property Oriented Approach [Communication écrite]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (juillet 2009). Reliable Process for Security Policy Deployment [Communication écrite]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). Lien externe

Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2009). A secured delegation of remote services on IPv6 home networks [Communication écrite]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. Lien externe

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (mars 2009). Semantic context aware security policy deployment [Communication écrite]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. Lien externe

Liste produite: Tue Apr 23 04:40:06 2024 EDT.