Jean-François Lalande
Orcid: 0000-0003-4984-2199
According to our database1,
Jean-François Lalande
authored at least 53 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Modeling Analyst Intentions Using a Markov Chain for Investigative Action Recommendations.
Proceedings of the Advances in Digital Forensics XX, 2024
Proceedings of the Reuse and Software Quality, 2024
2023
<i>OATs'inside</i>: Retrieving Object Behaviors From Native-based Obfuscated Android Applications.
DTRAP, 2023
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
IEEE Trans. Inf. Forensics Secur., 2022
it Inf. Technol., 2022
2021
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Formally verified software countermeasures for control-flow integrity of smart card C code.
Comput. Secur., 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 27th IEEE International Symposium on Modeling, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
2017
Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016
Vers la sécurité mobile : caractérisation des attaques et contremesures. (Towards mobile security: characterizing attacks and countermeasures).
, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
EAI Endorsed Trans. Mob. Commun. Appl., 2014
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system.
Future Gener. Comput. Syst., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Future Gener. Comput. Syst., 2013
Proceedings of the Mobile Computing, Applications, and Services, 2013
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
CoRR, 2012
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
SYNEMA: Visual Monitoring of Network and System Security Sensors.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2010
Attack model for verification of interval security properties for smart card C codes.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Generation of Role Based Access Control Security Policies for Java Collaborative Applications.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
2006
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006
2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
Conception de réseaux de télécommunications : optimisation et expérimentations. (Telecommunication network design: optimization and experiments).
PhD thesis, 2004
2003
Approximate Multicommodity Flow for WDM Networks Design.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003