Suivre
Vincent Nicomette
Vincent Nicomette
INSA Toulouse / LAAS - CNRS
Aucune adresse e-mail validée
Titre
Citée par
Citée par
Année
Survey on security threats and protection mechanisms in embedded automotive networks
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
2612013
Lessons learned from the deployment of a high-interaction honeypot
E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb
2006 Sixth European Dependable Computing Conference, 39-46, 2006
1792006
Implementing fault-tolerant applications using reflective object-oriented programming
JC Fabre, V Nicomette, T Pérennou, R Stroud, Z Wu
Predictably Dependable Computing Systems, 189-208, 1995
1331995
A language-based intrusion detection approach for automotive embedded networks
I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi
International Journal of Embedded Systems 10 (1), 1-12, 2018
1122018
The design of a generic intrusion-tolerant architecture for web servers
A Saidane, V Nicomette, Y Deswarte
IEEE Transactions on dependable and secure computing 6 (1), 45-58, 2008
932008
State of the art of network protocol reverse engineering tools
J Duchene, C Le Guernic, E Alata, V Nicomette, M Kaâniche
Journal of Computer Virology and Hacking Techniques 14 (1), 53-68, 2018
792018
Exploiting an I/OMMU vulnerability
FL Sang, E Lacombe, V Nicomette, Y Deswarte
2010 5th International Conference on Malicious and Unwanted Software, 7-14, 2010
732010
Empirical analysis and statistical modeling of attack processes based on honeypots
M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette
arXiv preprint arXiv:0704.0861, 2007
732007
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
V Nicomette, M Kaâniche, E Alata, M Herrb
Journal in computer virology 7 (2), 143-157, 2011
722011
I/O attacks in Intel PC-based architectures and countermeasures
FL Sang, V Nicomette, Y Deswarte
2011 First SysSec Workshop, 19-26, 2011
482011
Toward an intrusion detection approach for IoT based on radio communications profiling
J Roux, E Alata, G Auriol, V Nicomette, M Kaâniche
2017 13th European dependable computing conference (EDCC), 147-150, 2017
462017
Smart-TV security analysis: practical experiments
Y Bachy, F Basse, V Nicomette, E Alata, M Kaâniche, JC Courrege, ...
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
452015
A clustering approach for web vulnerabilities detection
A Dessiatnikoff, R Akrout, E Alata, M Kaâniche, V Nicomette
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
452011
Survey of security problems in cloud computing virtual machines
I Studnia, E Alata, Y Deswarte, M Kaâniche, V Nicomette
Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012 …, 2012
432012
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
432006
An authorization scheme for distributed object systems
V Nicomette, Y Deswarte
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
411997
An automated black box approach for web vulnerability identification and attack scenario generation
R Akrout, E Alata, M Kaaniche, V Nicomette
Journal of the Brazilian Computer Society 20 (1), 1-16, 2014
362014
Computer-security-oriented escape room
E Beguin, S Besnard, A Cros, B Joannes, O Leclerc-Istria, A Noel, ...
IEEE Security & Privacy 17 (4), 78-83, 2019
322019
Security of embedded automotive networks: state of the art and a research proposal
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
SAFECOMP 2013-workshop CARS (2nd workshop on critical automotive …, 2013
322013
Bypassing IOMMU protection against I/O attacks
B Morgan, E Alata, V Nicomette, M Kaâniche
2016 Seventh Latin-American Symposium on Dependable Computing (LADC), 145-150, 2016
302016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20