Gilles Guette

According to our database1, Gilles Guette authored at least 27 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SCWAD: Automated Pentesting of Web Applications.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment.
CoRR, 2023

URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

CVE representation to build attack positions graphs.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns.
IEEE Trans. Netw. Serv. Manag., December, 2022


2021
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting.
IEEE Trans. Netw. Serv. Manag., 2021

Accurate Measurement of the Energy Consumption of Security Functions.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2019
SEER4US, Secured Energy Efficient Routing for UAV Swarms.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

2018
Alternatives to Binary Routing Policies Applied to a Military MANET Coalition.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2016
Comparison of Inter-MANET routing protocol evaluation tools.
Proceedings of the 13th International Conference on New Technologies for Distributed Systems, 2016

ITMAN: An inter tactical mobile ad hoc network routing protocol.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Comparing inter-domain routing protocol assessment tools for MANET.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

2013
Extending Signatures of Reputation.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

A privacy preserving distributed reputation mechanism.
Proceedings of IEEE International Conference on Communications, 2013

2012
AMORES: an architecture for mobiquitous resilient systems.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

2010
A vehicle gateway to manage IP multimedia subsystem autonomous mobility.
Int. J. Auton. Adapt. Commun. Syst., 2010

2009
Automating trusted key rollover in DNSSEC.
J. Comput. Secur., 2009

Sybil Nodes Detection Based on Received Signal Strength Variations within VANET.
Int. J. Netw. Secur., 2009

On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks.
Proceedings of the IEEE Vehicular Networking Conference, 2009

2008
Key Revocation System for DNSSEC.
J. Networks, 2008

Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs).
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

2007
On the Sybil attack detection in VANET.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2005
Algorithm for DNSSEC Trusted Key Rollover.
Proceedings of the Information Networking, 2005

GDS Resource Record: Generalization ofthe Delegation Signer Model.
Proceedings of the Networking, 2005


  Loading...