12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

KANOUN Wael, CUPPENS Nora, CUPPENS Frédéric, ARAUJO José, Automated Reaction based on RiskAnalysis and Attackers Skills in Intrusion D<strong>et</strong>ection Systems. CRiSIS <strong>2008</strong> : Third International Conferenceon Risk and Security of Intern<strong>et</strong> and Systems, October 28-30, Tozeur, Tunisia , <strong>2008</strong>KASSAB Mohamed, BONNIN Jean-Marie, BELGHITH Abdelf<strong>et</strong>tah, Fast and secure handover in WLANs :an evaluation of the signaling overhead. CCNC'08 : Fifth IEEE Consumer communications & n<strong>et</strong>workingconference, January 10-12, Las Vegas, Nevada, US, <strong>2008</strong>KASSAB Mohamed, BONNIN Jean-Marie, BELGHITH Abdelf<strong>et</strong>tah, General strategies for context reestablishmentin IEEE 802.11 n<strong>et</strong>works. ITST'08 : 8th international conference on ITS telecommunication, 22-24 october, Phuk<strong>et</strong>, Thailand, <strong>2008</strong>KASSAB Mohamed, HACHANA Safaa, BONNIN Jean-Marie, BELGHITH Abdelf<strong>et</strong>tah, High-mobility effectson WLAN fast re-authentication m<strong>et</strong>hods efficiency. FTDA-DN'08 : First international workshop on futur<strong>et</strong>rends on design and analysis of dynamic n<strong>et</strong>works in conjunction with Qshine'08, 31 july, Hong Kong, China,<strong>2008</strong>LASSOUED Imed, BONNIN Jean-Marie, BELGHITH Abdelfateh, Towards an architecture for mobilitymanagement and resource control. WCNC’08 : IEEE Wireless Communications & N<strong>et</strong>working Conference,March 31 - April 2, Las Vegas, Nevada, USA, <strong>2008</strong>LASSOUED Imed, BONNIN Jean-Marie, BEN HAMOUDA Zied, BELGHITH Abdelf<strong>et</strong>tah, A m<strong>et</strong>hodologyfor evaluating vertical handoff decision mechanisms. ICN <strong>2008</strong> : The Seventh International Conference onN<strong>et</strong>working, April 13-18, Cancun, Mexico, <strong>2008</strong>, pp. 377-384LE NARZUL Jean-Pierre, HURFIN Michel, Design and Performance Evaluation of a Resource AllocationSystem Based on Agreement Services. Workshop on Grid Computing Applications Development, September26-29,Timisoara, Roumanie, <strong>2008</strong>MABROUKI Issam, FROC Gwillerm, LAGRANGE Xavier, On the Data Delivery Delay taken by RandomWalks in Wireless Sensor N<strong>et</strong>works. QEST '08 : 5th International Conference on the Quantitative Evaluationof SysTems, 14-17 September, St Malo, France, <strong>2008</strong>MAILLÉ Patrick, NALDI Maurizio, TUFFIN Bruno, Comp<strong>et</strong>ition for migrating customers: a game-theor<strong>et</strong>icanalysis in a regulated regime. Globecom'08 : IEEE Global Communication Conference, 30 November - 4December, New Orleans, LA, USA, <strong>2008</strong>MAILLÉ Patrick, TUFFIN Bruno, Analysis of Price Comp<strong>et</strong>ition in a Slotted Resource Allocation Game.IEEE INFOCOM'08, April 13-18, Phoenix, AZ, USA, <strong>2008</strong>, pp. 888-896MONTAVONT Nicolas, BOUTET Antoine, ROPITAULT Tanguy, TSUKADA Manabu, ERNST Thierry,Anemone : a ready-to-go testbed for IPv6 compliant intelligent transport systems. ITST <strong>2008</strong> : 8thinternational conference on ITS telecommunications, 22-24 october, Phuk<strong>et</strong>, Thailande, <strong>2008</strong>, pp. 228-233MOUELHI Tejeddine, BAUDRY Benoit, FLEUREY Franck, A Generic M<strong>et</strong>amodel For Security PoliciesMutation. SecTest 08: 1st International ICST workshop on Security Testing, April 9, Lillehammer, Norway,<strong>2008</strong>MOUELHI Tejeddine, FLEUREY Franck, BAUDRY Benoit, LE TRAON Yves, A model-based frameworkfor security policies specification, deployment and testing. MoDELS'08: ACM/IEEE 11th InternationalConference on Model Driven Engineering Languages and Systems, 28 Septembre - 3 Octobre, Toulouse, France,<strong>2008</strong>MOUELHI Tejeddine, FLEUREY Franck, BAUDRY Benoit, LE TRAON Yves, Mutating DAC And MACSecurity Policies: A Generic M<strong>et</strong>amodel Based Approach. Modeling Security Workshop In Association withMODELS '08, 28th September, Toulouse, France , <strong>2008</strong>MOUELHI Tejeddine, LE TRAON Yves, PRETSCHNER Alexander, Model-Based Tests for Access ControlPolicies. ICST <strong>2008</strong> : First IEEE International Conference on Software, Testing, Verification and Validation,April 9-11, Lillehammer, Norway, <strong>2008</strong>MOUELHI Tejeddine, LE TRAON Yves, PRETSCHNER Alexander, BAUDRY Benoit, Test-DrivenAssessment of Access Control in Legacy Applications. ICST <strong>2008</strong> : First IEEE International Conference onSoftware, Testing, Verification and Validation (ICST), April 9-11, Lillehammer, Norway, <strong>2008</strong>OROZCO TORRENTERA Julio Enrique, ROS SANCHEZ David, TCP performance over gigabit-capablepassive optical n<strong>et</strong>works. Accessn<strong>et</strong> <strong>2008</strong> : Third International Conference on Access N<strong>et</strong>works, Otober 15-17,Las Vegas, USA, <strong>2008</strong>- 23 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!