PHAN LE Cam Tu, CUPPENS Frédéric, CUPPENS Nora, MAILLÉ Patrick, Evaluating the trustworthinessof contributors in a collaborative environment. TrustCol-<strong>2008</strong> : Third International Workshop on TrustedCollaboration, November 13-16, Orlando, FL, USA, <strong>2008</strong>PIAMRAT Kandaraj, KSENTINI Adlen, VIHO César, BONNIN Jean-Marie, QoE-aware admission controlfor multimedia applications in IEEE 802.11 wireless n<strong>et</strong>works. VTC'08 : IEEE 68th Vehicular TechnologyConference, September, Calgari, Canada, <strong>2008</strong>PIAMRAT Kandaraj, KSENTINI Adlen, VIHO César, BONNIN Jean-Marie, QoE-based n<strong>et</strong>work selection formultimedia users in IEEE 802.11 wireless n<strong>et</strong>works. LCN'08 : 33rd annual IEEE conference on localcomputer n<strong>et</strong>works, october 14-17, Montreal, Quebec, <strong>2008</strong>PICHON Dominique, GUILLOUARD Karine, BONNIN Jean-Marie, Adaptation of multimedia flows in aseamless mobility context using overlay n<strong>et</strong>works. HET-NETs'08 : 5th International Working Conference onPerformance Modelling and Evaluation of H<strong>et</strong>erogeneous N<strong>et</strong>works, February 18-20, Karlskrona, Sweden, <strong>2008</strong>RAWAT Priyanka, BONNIN Jean-Marie, Design and implementation of TuCP : a novel (IP) tunnelingheader compression protocol for mobile n<strong>et</strong>works. ISWCS'08 : IEEE International Symposium on WirelessCommunication Systems, 21-24 October, Reykjavik, Iceland , <strong>2008</strong>RAWAT Priyanka, BONNIN Jean-Marie, MINABURO TOUTAIN Ana, Optimising the use of robust headercompression profiles in NEMO n<strong>et</strong>works. ICN <strong>2008</strong> : 7th international conference on n<strong>et</strong>working, April 13-18, Cancun, Mexico, <strong>2008</strong>, pp. 150-155RAWAT Priyanka, BONNIN Jean-Marie, TOUTAIN Laurent, CHOI Yanghee, Robust header compressionover long delay links. IEEE VTC <strong>2008</strong> : Vehicular technology conference, May 11-14, Marina Bay, Singapore,<strong>2008</strong>, pp. 2136-2141RAYENE Ben Rayana, BONNIN Jean-Marie, Mobility aware application manager for mobile n<strong>et</strong>work.ITST'08 : 8th international conference on ITS telecommunication, 22-24 october, Phuk<strong>et</strong>, Thailand, <strong>2008</strong>ROPITAULT Tanguy, MONTAVONT Nicolas, Implementation of a Flow Binding Mechanism. 4th IEEEPercomWorkshop on Pervasive Wireless N<strong>et</strong>working, March 17-21, Hong-Kong, <strong>2008</strong>, pp. 342-347ROUIL Richard, MONTAVONT Nicolas, IEEE 802.21 transport solution using cross-layer optimizedStream Control transmission Protocol. PIMRC <strong>2008</strong> : 19th IEEE international conference on Personal, Indoorand Mobile Radio Communications, 15-18 September, Cannes, France, <strong>2008</strong>, pp. 1-5SINGH Kamal Deep, OROZCO TORRENTERA Julio Enrique, ROS SANCHEZ David, RUBINO Gerardo,Improving perceived streaming-video quality in High Speed Downlink Pack<strong>et</strong> Access. IEEE GLOBECOM<strong>2008</strong> : IEEE Global Communications Conference, November 30 - December 4, New Orleans, USA, <strong>2008</strong>, pp. 1-6THOMAS Julien, CUPPENS Frédéric, CUPPENS Nora, Environmental Constraints Management in DigitalRight Licences. SARSSI <strong>2008</strong> : 3ème Conférence sur la Sécurité des Architectures Réseaux <strong>et</strong> des Systèmesd'Information, 13-17 octobre, Loctudy, France, 75015 Paris : Publibook, <strong>2008</strong>, pp. 85-99, ISBNEAN:9782748343892TOUTAIN Laurent, PERROS Kévin, LEE Joongsoo, Supprimer le protocole Neighbor Discovery dans lesréseaux de capteurs. CFIP <strong>2008</strong> : Colloque francophone sur l'ingénierie des protocoles, 25-28 mars, Les Arcs,France, <strong>2008</strong>WANG Wei, GOMBAULT Sylvain, Efficient D<strong>et</strong>ection of DDoS Attacks with Important Attributes .CRISIS <strong>2008</strong>, Third International Conference on Risks and Security on Intern<strong>et</strong> and Systems, October 28-30,Tozeur, Tunisia, <strong>2008</strong>WANG Wei, GOMBAULT Sylvain, GUYET Thomas, Towards fast d<strong>et</strong>ecting intrusions: using keyattributes . ICIMP <strong>2008</strong> : Third International Conference on Intern<strong>et</strong> Monitoring and Protection, June 29 - July5, Bucharest, Romania, <strong>2008</strong>ZAGROUBA Rachid, BONNIN Jean-Marie, GUILLOUARD Karine, A centralized resource reservation forcellular IP access n<strong>et</strong>works. FTDA-DN'08 : First international workshop on future trends on design andanalysis of dynamic n<strong>et</strong>works in conjunction with Qshine'08, 31 july, Hong Kong, China, <strong>2008</strong>ZOUARI Anis, SUCIU Lucian, BONNIN Jean-Marie, GUILLOUARD Karine, A novel procedure forcoupling QoS control and handover decision for mobility management. ICWMC'08 : fourth internationalconference on wireless and mobile communications, july 21-august 1, Athens, Greece, <strong>2008</strong>- 24 -
ZOUARI Anis, SUCIU Lucian, BONNIN Jean-Marie, GUILLOUARD Karine, A proactive and distributednegociation approach for h<strong>et</strong>erogeneous environments : an evaluation of QoS signalling overhead.NGMast'08 : second international conference and exhibition on next generation mobile applications, services andtechnologies, 16-19 september, Cardiff, Wales, UK, <strong>2008</strong>LivreDEBAR Hervé, THOMAS Yohann, CUPPENS Frédéric, CUPPENS Nora, Response: bridging the linkb<strong>et</strong>ween intrusion d<strong>et</strong>ection alerts and security policies. Intrusion D<strong>et</strong>ection Systems, Springer US, <strong>2008</strong>,(Advances in Information Security, 38), pp. 129-170Chapitres dans un livreCUPPENS Frédéric, CAVALLI Ana Rosa, CUPPENS Nora, LENEUTRE Jean, ROUDIER Yves, SETOP <strong>2008</strong>: First Workshop on Security of Spontaneous N<strong>et</strong>works, First Workshop on Security of SpontaneousN<strong>et</strong>works, Loctudy, France, 13-14 October <strong>2008</strong>. Edition Publibook, <strong>2008</strong>, 108 p. (Information <strong>et</strong>communication), ISBN 2748343905CUPPENS Nora, OWEZARSKI Philippe, SARSSI <strong>2008</strong> : 3rd Conference on Security in N<strong>et</strong>workArchitectures and Information Systems, Loctudy, France, 13-14 October <strong>2008</strong>. Edition Publibook, <strong>2008</strong>,318 p. ISBN 2748343891HDR soutenues en <strong>2008</strong>CUPPENS-BOULAHIA Nora, Expression, déploiement, analyse <strong>et</strong> administration de politiques de sécurité,jeudi 14 février <strong>2008</strong>.BONNIN Jean-Marie, La diversité d'accès au service de terminaux <strong>et</strong> de routeurs multi-connectés, vendredi20 juin <strong>2008</strong>.Thèses soutenues en <strong>2008</strong>ABI HAIDAR DiallaKASSAB MohamedMABROUKI IssamALLARD FabienZOUARI AnisSIMONIN JacquesEtude détaillée de la sécurité des web services dans le cadre d'unepolitique de sécurité unifiant les mécanismes de protection contre lesattaques <strong>et</strong> de détection des actions malveillantes27/11/08Optimisation des handovers de niveau 2 pour une mobilité intra <strong>et</strong> intertechnologies 15/12/08Marches aléatoires dans les réseaux de capteurs sans fils16/12/08Le transfert de contexte : atout pour la mobilité <strong>et</strong> outil de réduction decoûts pour la sécurité 15/01/09Contrôle de la mobilité <strong>et</strong> de la qualité de service entre les réseauxd'accès hétérogènes dans un réseau de cœur tout IP 14/01/09"Conception de l'architecture d'un système dirigé par un modèled'urbanisme fonctionnel" 29/01/09- 25 -