Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sylvie Laniepce
@inproceedings{DBLP:conf/sac/BelairLM21, author = {Maxime B{\'{e}}lair and Sylvie Laniepce and Jean{-}Marc Menaud}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {{SNAPPY:} programmable kernel-level policies for containers}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1636--1645}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442037}, doi = {10.1145/3412841.3442037}, timestamp = {Mon, 03 May 2021 14:34:56 +0200}, biburl = {https://dblp.org/rec/conf/sac/BelairLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BelairLM19, author = {Maxime B{\'{e}}lair and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {76:1--76:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340502}, doi = {10.1145/3339252.3340502}, timestamp = {Sun, 11 Aug 2019 18:58:56 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BelairLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HebbalLM17, author = {Yacine Hebbal and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {K-binID: Kernel binary code identification for Virtual Machine Introspection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {107--114}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073801}, doi = {10.1109/DESEC.2017.8073801}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/HebbalLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HebbalLM17a, author = {Yacine Hebbal and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {Hidden process detection using kernel functions instrumentation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {138--145}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073805}, doi = {10.1109/DESEC.2017.8073805}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HebbalLM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HebbalLM15, author = {Yacine Hebbal and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {Virtual Machine Introspection: Techniques and Applications}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {676--685}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.43}, doi = {10.1109/ARES.2015.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HebbalLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/LazriLZB14, author = {Kahina Lazri and Sylvie Laniepce and Haiming Zheng and Jalel Ben{-}Othman}, title = {{AMAD:} Resource Consumption Profile-Aware Attack Detection in IaaS Cloud}, booktitle = {Proceedings of the 7th {IEEE/ACM} International Conference on Utility and Cloud Computing, {UCC} 2014, London, United Kingdom, December 8-11, 2014}, pages = {379--386}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/UCC.2014.48}, doi = {10.1109/UCC.2014.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/LazriLZB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LazriLB13, author = {Kahina Lazri and Sylvie Laniepce and Jalel Ben{-}Othman}, title = {Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {630--637}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.83}, doi = {10.1109/ARES.2013.83}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LazriLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LazriLB13, author = {Kahina Lazri and Sylvie Laniepce and Jalel Ben{-}Othman}, title = {When Dynamic {VM} Migration Falls under the Control of {VM} Users}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {395--402}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.58}, doi = {10.1109/CLOUDCOM.2013.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/LazriLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/LaniepceLKBLW13, author = {Sylvie Laniepce and Marc Lacoste and Mohamed Kassi{-}Lahlou and Fabien Bignon and Kahina Lazri and Aur{\'{e}}lien Wailly}, title = {Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor}, booktitle = {Seventh {IEEE} International Symposium on Service-Oriented System Engineering, {SOSE} 2013, San Francisco, CA, USA, March 25-28, 2013}, pages = {25--36}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SOSE.2013.27}, doi = {10.1109/SOSE.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/LaniepceLKBLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/LaniepceLAB10, author = {Sylvie Laniepce and L. Lancieri and Mohammed Achemlal and Abdelmadjid Bouabdallah}, editor = {Ahmed Helmy and Peter Mueller and Yan Zhang}, title = {A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks}, booktitle = {Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2010, Caen, France, June 28 - July 2, 2010}, pages = {296--300}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1815396.1815465}, doi = {10.1145/1815396.1815465}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/LaniepceLAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/AbdelouahabBAL09, author = {Mahdi Amine Abdelouahab and Abdelmadjid Bouabdallah and Mohammed Achemlal and Sylvie Laniepce}, title = {The Topology Change Attack: Threat and Impact}, journal = {J. Univers. Comput. Sci.}, volume = {15}, number = {2}, pages = {465--487}, year = {2009}, url = {https://doi.org/10.3217/jucs-015-02-0465}, doi = {10.3217/JUCS-015-02-0465}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/AbdelouahabBAL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/TourolleLA07, author = {Benjamin Tourolle and Sylvie Laniepce and Mohammed Achemlal}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {Reputation-Based Routing in Hybrid Ad Hoc Networks}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {101--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_11}, doi = {10.1007/978-3-540-77024-4\_11}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/TourolleLA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/LaniepceDM06, author = {Sylvie Laniepce and Jacques Demerjian and Amdjed Mokhtari}, editor = {Seizo Onoe and Mohsen Guizani and Hsiao{-}Hwa Chen and Mamoru Sawahashi}, title = {Cooperation monitoring issues in ad hoc networks}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada, July 3-6, 2006}, pages = {695--700}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143549.1143688}, doi = {10.1145/1143549.1143688}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/LaniepceDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngc/LaniepceA03, author = {Sylvie Laniepce and Mohammed Achemlal}, editor = {Burkhard Stiller and Georg Carle and Martin Karsten and Peter Reichl}, title = {An Approach to the Charging of Secure {IP} Multicast Services}, booktitle = {Group Communications and Charges; Technology and Business Models, 5th {COST264} International Workshop on Networked Group Communications, {NGC} 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2816}, pages = {265--275}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39405-1\_24}, doi = {10.1007/978-3-540-39405-1\_24}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/ngc/LaniepceA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.