Jean-Francois Lalande
Jean-Francois Lalande
Verified email at centralesupelec.fr - Homepage
Title
Cited by
Cited by
Year
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
WW Smari, P Clemente, JF Lalande
Future Generation Computer Systems 31, 147-168, 2014
842014
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
552015
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 International Conference on Availability, Reliability and Security, 701-710, 2013
512013
Repackaging android applications for auditing access to private data
P Berthome, T Fecherolle, N Guilloteau, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
422012
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
332015
Security and Results of a Large-Scale High-Interaction Honeypot.
J Briffaut, JF Lalande, C Toinard
JCP 4 (5), 395-404, 2009
282009
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
282005
Software countermeasures for control flow integrity of smart card C codes
JF Lalande, K Heydemann, P Berthomé
European Symposium on Research in Computer Security, 200-218, 2014
262014
A practical set-membership proof for privacy-preserving NFC mobile ticketing
G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout
Proceedings on Privacy Enhancing Technologies 2015 (2), 25-45, 2015
242015
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The {LASER} Workshop: Learning from Authoritative Security Experiment …, 2016
212016
High level model of control flow attacks for smart card functional security
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
202012
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies
J Briffaut, JF Lalande, C Toinard
International journal on advances in security 2 (4), 325-343, 2009
172009
Mascopt-a network optimization library: Graph manipulation
JF Lalande, M Syska, Y Verhoeven
172004
Approximate multicommodity flow for WDM networks design
M Bouklit, D Coudert, JF Lalande, C Paul, H Rivano
SIROCCO: Structural Information and Communication Complexity 10 (17), 43-56, 2003
172003
Quasi-optimal resource allocation in multispot MFTDMA satellite networks
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Combinatorial optimization in communication networks, 325-365, 2006
162006
Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach
M Blanc, J Briffaur, JJ Lalande, C Toinard
Seventh IEEE International Workshop on Policies for Distributed Systems and …, 2006
152006
Analysis of human awareness of security and privacy threats in smart environments
L Caviglione, JF Lalande, W Mazurczyk, S Wendzel
International Conference on Human Aspects of Information Security, Privacy …, 2015
142015
Attack model for verification of interval security properties for smart card C codes
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
142010
Improving mandatory access control for HPC clusters
M Blanc, JF Lalande
Future Generation Computer Systems 29 (3), 876-885, 2013
122013
Gpfinder: tracking the invisible in android malware
M Leslous, VVT Tong, JF Lalande, T Genet
2017 12th International Conference on Malicious and Unwanted Software …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20