Vincent Nicomette
Orcid: 0000-0001-9482-004X
According to our database1,
Vincent Nicomette
authored at least 70 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Ten years of studies on the security of connected objects: a wrap-up (keynote abstract).
Proceedings of the 30th Computer & Electronics Security Application Rendezvous Conference (C&ESAR 2023) co-located with the 8th European Cyber Week (ECW 2023), 2023
2022
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol.
J. Comput. Virol. Hacking Tech., 2022
2021
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment.
ACM Trans. Cyber Phys. Syst., 2021
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
J. Comput. Virol. Hacking Tech., 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
J. Braz. Comput. Soc., 2018
Int. J. Embed. Syst., 2018
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017
2016
Tech. Sci. Informatiques, 2016
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Tech. Sci. Informatiques, 2014
An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comput. Soc., 2014
Ingénierie des Systèmes d Inf., 2014
Int. J. Secur. Softw. Eng., 2014
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Tech. Sci. Informatiques, 2013
Comput. J., 2013
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013
Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
J. Comput. Virol., 2011
J. Comput. Virol., 2011
J. Syst. Archit., 2011
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Tech. Sci. Informatiques, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
2008
J. Comput. Virol., 2008
2007
CoRR, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the Sixth European Dependable Computing Conference, 2006
2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
2001
Proceedings of the Smart Card Programming and Security, 2001
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
1996
Proceedings of the Computer Security, 1996
Proceedings of the Concurrency and Parallelism, 1996
1995
Implementing Fault Tolerant Applications using Reflective Object-Oriented Programming.
Proceedings of the Digest of Papers: FTCS-25, 1995