Gregory Blanc

Orcid: 0000-0001-8150-6617

Affiliations:
  • Télécom SudParis, Université Paris-Saclay, France


According to our database1, Gregory Blanc authored at least 46 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

XAI-driven Adversarial Attacks on Network Intrusion Detectors.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

A Model-based Approach for Assessing the Security of Cyber-Physical Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Explainable artificial intelligence for cybersecurity: a literature survey.
Ann. des Télécommunications, 2022

Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022

A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis.
IEEE Access, 2022

Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
Towards security-Aware 5G slice embedding.
Comput. Secur., 2021

2020
Solving security constraints for 5G slice embedding: A proof-of-concept.
Comput. Secur., 2020

Generative Deep Learning for Internet of Things Network Traffic Generation.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

Automated Saturation Mitigation Controlled by Deep Reinforcement Learning.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

2019
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019

Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Siamese Network Based Feature Learning for Improved Intrusion Detection.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Designing Security-Aware Service Requests for NFV-Enabled Networks.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

2018
Multi-Provider Secure Virtual Network Embedding.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

IoT Devices Recognition Through Network Traffic Analysis.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
ArOMA: An SDN based autonomic DDoS mitigation framework.
Comput. Secur., 2017

Preserving confidentiality during the migration of virtual SDN topologies: A formal approach.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Adaptive Policy-driven Attack Mitigation in SDN.
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017

NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis.
Proceedings of the European Project Space on Networks, 2017

2016
Bayesian Attack Model for Dynamic Risk Assessment.
CoRR, 2016

ML: DDoS Damage Control with MPLS.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Hybrid Risk Assessment Model Based on Bayesian Networks.
Proceedings of the Advances in Information and Computer Security, 2016

Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Automated Classification of C&C Connections Through Malware URL Clustering.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
Combining Technical and Financial Impacts for Countermeasure Selection.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

A Trusted Knowledge Management System for Multi-layer Threat Analysis.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Policy Enforcement Point Model.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Attribute-Based Mining Process for the Organization-Based Access Control Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude.
IEICE Trans. Inf. Syst., 2011

Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Towards revealing JavaScript program intents using abstract interpretation.
Proceedings of the AINTEC '10, 2010


  Loading...