Skip to Main content Skip to Navigation


...
hal-00546934v1  Conference papers
Thomas RobertMatthieu RoyJean-Charles Fabre. Early Error Detection for Fault Tolerance Strategies
18th International Conference on Real-Time and Network Systems, Nov 2010, Toulouse, France. pp.159-168
...
hal-02147191v1  Conference papers
Maryline LaurentJean LeneutreSophie ChabridonImane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things
ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩
hal-02287108v1  Conference papers
Mounira MsahliAhmed SerhrouchniXiuzhen Chen. Towards a Fine-Grained Access Control for Cloud
2014 IEEE 11th International Conference on e-Business Engineering, Oct 2013, Guangzhou, China
hal-02288388v1  Conference papers
Sylvain FreyAda DiaconescuMenga DavidIsabelle Demeure. A Holonic Control Architecture for a Heterogeneous Multi-Objective Smart Micro-Grid
Seventh IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Sep 2013, Philladelphia, United States
hal-02288439v1  Conference papers
Robin DespouysRémi SharrockIsabelle Demeure. Sensemaking in the autonomic smart-home
UBICOMP Ubiquitous computing, Sep 2014, Seattle, United States
...
hal-01850383v1  Conference papers
Aida DiopSaid GharoutMaryline LaurentJean LeneutreJacques Traoré. Questioning the security and efficiency of the ESIoT approach
WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩
...
hal-02454258v1  Conference papers
Paolo CrisafulliDominique BlouinFrançoise CaronCristian Maxim. Engineering Railway Systems with an Architecture-Centric Process Supported by AADL and ALISA: an Experience Report
10th European Congress on Embedded Real Time Software and Systems (ERTS 2020), Jan 2020, Toulouse, France
hal-03023230v1  Book sections
Susan StepneyAda DiaconescuRené DoursatJean-Louis GiavittoJulian Miller et al.  Evolving, Growing, and Gardening Cyber-physical Systems
Experimental Architecture - Designing the Unknown, 2019
hal-02343634v1  Conference papers
Mounira MsahliXiuzhen ChenAhmed Serhrouchni. Towards a Fine-Grained Access Control for Cloud
2014 IEEE 11th International Conference on e-Business Engineering (ICEBE), Nov 2014, Guangzhou, France. pp.286-291, ⟨10.1109/ICEBE.2014.56⟩
hal-02009646v1  Journal articles
Christophe KiennertIsmail ZiadHervé DebarJean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.article 90 -. ⟨10.1145/3232848⟩
hal-01213330v1  Conference papers
Swan DuboisRachid GuerraouiPetr KuznetsovFranck PetitPierre Sens. The Weakest Failure Detector for Eventual Consistency
34th Annual ACM Symposium on Principles of Distributed Computing (PODC-2015), Donostia-San Sebastián, Spain, Jul 2015, Donostia-San Sebastián, Spain. pp.375-384, ⟨10.1145/2767386.2767404⟩
hal-02287105v1  Journal articles
Mounira MsahliAhmed Serhrouchni. Profile Centric Model.
International Journal of Internet Technology and Secured Transactions, 2014, 5 (ISSN online: 1748-5703)
...
hal-01166136v1  Conference papers
Frank SinghoffAlain PlantecStéphane RubiniHai-Nam TranVincent Gaudel et al.  Teaching Real-Time Scheduling Analysis with Cheddar
9ème édition de l’Ecole d’Eté « Temps Réel », Aug 2015, Rennes, France
hal-01873945v1  Conference papers
Dominique BlouinMatthias BarkowskiMelanie SchneiderHolger GieseJohannes Dyck et al.  A Semi-Automated Approach for the Co-Refinement of Requirements and Architecture Models
2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), Sep 2017, Lisbon, France. ⟨10.1109/REW.2017.52⟩
hal-01113214v1  Journal articles
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI
IEEE Journal on Selected Areas in Communications, Institute of Electrical and Electronics Engineers, 2014, 32 (7), pp.12. ⟨10.1109/JSAC.2014.2332095⟩
...
hal-02075926v1  Journal articles
Régis BlacheAlain CouvreurEmmanuel HallouinDavid MadoreJade Nardi et al.  Anticanonical codes from del Pezzo surfaces with Picard rank one
Transactions of the American Mathematical Society, American Mathematical Society, 2020, ⟨10.1090/tran/8119⟩
hal-01246343v1  Conference papers
Amine NajiFlorian Brandner. A Comparative Study of the Precision of Stack Cache Occupancy Analyses
9th Junior Researcher Workshop on Real-Time Computing, Julien Forget, Nov 2015, Lille, France. pp.4
hal-03629047v1  Conference papers
Romain GratiaThomas RobertLaurent Pautet. Generalized mixed-criticality scheduling based on RUN
23rd International Conference on Real-Time Networks and Systems (RTNS '15), Nov 2015, Lille France, France. pp.267-276, ⟨10.1145/2834848.2834873⟩
hal-01121244v1  Conference papers
Fabien CadoretRobert ThomasEtienne BordeLaurent PautetFrank Singhoff. Deterministic Implementation of Periodic-Delayed Communications and Experimentation in AADL
17th IEEE Symposium on Object/Component/Service-oriented Real-time Distributed Computing (ISORC 2013), Jun 2013, Paderborn, Germany
hal-01212158v1  Conference papers
Gerard MemmiKatarzyna KapustaHan Qiu. Data Protection: combining fragmentation, encryption, and dispersion
2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, Aug 2015, Shanghai, China
hal-01995010v1  Conference papers
Roberto MedinaEtienne BordeLaurent Pautet. Directed Acyclic Graph Scheduling for Mixed-Criticality Systems
Reliable Software Technologies, Jun 2017, Vienne, Austria. pp.217-232