Eric Alata
According to our database1,
Eric Alata
authored at least 48 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Hardware Add-On for IoT Secure Communications: Polarization Shift Keying Smart Antenna System.
Proceedings of the 10th IEEE World Forum on Internet of Things, 2024
2023
Sensors, February, 2023
A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings.
Sensors, February, 2023
2022
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol.
J. Comput. Virol. Hacking Tech., 2022
2021
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment.
ACM Trans. Cyber Phys. Syst., 2021
2020
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
2019
J. Comput. Virol. Hacking Tech., 2019
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper).
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
J. Braz. Comput. Soc., 2018
Addressing scalable, optimal, and secure communications over LoRa networks: Challenges and research directions.
Internet Technol. Lett., 2018
Int. J. Embed. Syst., 2018
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017
2016
Tech. Sci. Informatiques, 2016
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Tech. Sci. Informatiques, 2014
An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comput. Soc., 2014
Ingénierie des Systèmes d Inf., 2014
Int. J. Secur. Softw. Eng., 2014
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013
Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
J. Comput. Virol., 2011
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011
2010
Tech. Sci. Informatiques, 2010
2008
J. Comput. Virol., 2008
2007
PhD thesis, 2007
CoRR, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the Sixth European Dependable Computing Conference, 2006