Valérie Viet Triem Tong
Orcid: 0000-0003-4838-2952
According to our database1,
Valérie Viet Triem Tong
authored at least 57 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
<i>OATs'inside</i>: Retrieving Object Behaviors From Native-based Obfuscated Android Applications.
DTRAP, 2023
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment.
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
IEEE Trans. Inf. Forensics Secur., 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
2018
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
2017
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
2016
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
2015
Kayrebt: An activity diagram extraction and visualization toolset designed for the Linux codebase.
Proceedings of the 3rd IEEE Working Conference on Software Visualization, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Detection and Identification of Android Malware Based on Information Flow Monitoring.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
Tech. Sci. Informatiques, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties.
Commun. ACM, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Liability in software engineering: overview of the LISE approach and illustration on a case study.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
2009
Stud. Inform. Univ., 2009
Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Proceedings P2P 2009, 2009
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
Proceedings of the The Forth International Conference on Availability, 2009
2008
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Resilient Networks and Services, 2008
2007
Proceedings of the Advances in Biometrics, International Conference, 2007
2004
2001
Proceedings of the Logic for Programming, 2001