Eric Filiol
Orcid: 0000-0001-5101-8073Affiliations:
- INRIA, France
According to our database1,
Eric Filiol
authored at least 71 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2021
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes.
J. Comput. Virol. Hacking Tech., 2021
Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network.
J. Comput. Virol. Hacking Tech., 2021
A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network.
J. Comput. Virol. Hacking Tech., 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
Int. J. Cyber Warf. Terror., 2017
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 2nd International Conference on Computer and Communication Systems, 2017
2016
J. Comput. Virol. Hacking Tech., 2016
Proactive defense against malicious documents: formalization, implementation and case studies.
J. Comput. Virol. Hacking Tech., 2016
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network.
IACR Cryptol. ePrint Arch., 2016
2015
J. Comput. Virol. Hacking Tech., 2015
2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
New Trends in Security Evaluation of Bayesian Network-Based Malware Detection Models.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
J. Comput. Virol., 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.
J. Comput. Virol., 2010
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis.
J. Comput. Virol., 2010
CoRR, 2010
Proceedings of the ARES 2010, 2010
2009
J. Comput. Virol., 2009
CoRR, 2009
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
2008
J. Comput. Virol., 2008
J. Comput. Virol., 2008
2007
Evaluation methodology and theoretical model for antiviral behavioural detection strategies.
J. Comput. Virol., 2007
J. Comput. Virol., 2007
On the possibility of practically obfuscating programs towards a unified perspective of code protection.
J. Comput. Virol., 2007
2006
J. Comput. Virol., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
2005
2003
IACR Cryptol. ePrint Arch., 2003
2002
IACR Cryptol. ePrint Arch., 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Cryptography and Coding, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
Proceedings of the Cryptography and Coding, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of the Cryptography and Coding, 1997