BibTeX records: Sylvie Laniepce

download as .bib file

@inproceedings{DBLP:conf/sac/BelairLM21,
  author       = {Maxime B{\'{e}}lair and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {{SNAPPY:} programmable kernel-level policies for containers},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1636--1645},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442037},
  doi          = {10.1145/3412841.3442037},
  timestamp    = {Mon, 03 May 2021 14:34:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BelairLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BelairLM19,
  author       = {Maxime B{\'{e}}lair and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {Leveraging Kernel Security Mechanisms to Improve Container Security:
                  a Survey},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {76:1--76:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340502},
  doi          = {10.1145/3339252.3340502},
  timestamp    = {Sun, 11 Aug 2019 18:58:56 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BelairLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/HebbalLM17,
  author       = {Yacine Hebbal and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {K-binID: Kernel binary code identification for Virtual Machine Introspection},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073801},
  doi          = {10.1109/DESEC.2017.8073801},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/HebbalLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/HebbalLM17a,
  author       = {Yacine Hebbal and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {Hidden process detection using kernel functions instrumentation},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {138--145},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073805},
  doi          = {10.1109/DESEC.2017.8073805},
  timestamp    = {Sat, 06 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/HebbalLM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HebbalLM15,
  author       = {Yacine Hebbal and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {Virtual Machine Introspection: Techniques and Applications},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {676--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.43},
  doi          = {10.1109/ARES.2015.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HebbalLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/LazriLZB14,
  author       = {Kahina Lazri and
                  Sylvie Laniepce and
                  Haiming Zheng and
                  Jalel Ben{-}Othman},
  title        = {{AMAD:} Resource Consumption Profile-Aware Attack Detection in IaaS
                  Cloud},
  booktitle    = {Proceedings of the 7th {IEEE/ACM} International Conference on Utility
                  and Cloud Computing, {UCC} 2014, London, United Kingdom, December
                  8-11, 2014},
  pages        = {379--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/UCC.2014.48},
  doi          = {10.1109/UCC.2014.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/LazriLZB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LazriLB13,
  author       = {Kahina Lazri and
                  Sylvie Laniepce and
                  Jalel Ben{-}Othman},
  title        = {Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {630--637},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.83},
  doi          = {10.1109/ARES.2013.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LazriLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LazriLB13,
  author       = {Kahina Lazri and
                  Sylvie Laniepce and
                  Jalel Ben{-}Othman},
  title        = {When Dynamic {VM} Migration Falls under the Control of {VM} Users},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {395--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.58},
  doi          = {10.1109/CLOUDCOM.2013.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LazriLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/LaniepceLKBLW13,
  author       = {Sylvie Laniepce and
                  Marc Lacoste and
                  Mohamed Kassi{-}Lahlou and
                  Fabien Bignon and
                  Kahina Lazri and
                  Aur{\'{e}}lien Wailly},
  title        = {Engineering Intrusion Prevention Services for IaaS Clouds: The Way
                  of the Hypervisor},
  booktitle    = {Seventh {IEEE} International Symposium on Service-Oriented System
                  Engineering, {SOSE} 2013, San Francisco, CA, USA, March 25-28, 2013},
  pages        = {25--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SOSE.2013.27},
  doi          = {10.1109/SOSE.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/LaniepceLKBLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/LaniepceLAB10,
  author       = {Sylvie Laniepce and
                  L. Lancieri and
                  Mohammed Achemlal and
                  Abdelmadjid Bouabdallah},
  editor       = {Ahmed Helmy and
                  Peter Mueller and
                  Yan Zhang},
  title        = {A cross-layer reputation system for routing non-cooperation effects
                  mitigation within hybrid ad-hoc networks},
  booktitle    = {Proceedings of the 6th International Wireless Communications and Mobile
                  Computing Conference, {IWCMC} 2010, Caen, France, June 28 - July 2,
                  2010},
  pages        = {296--300},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1815396.1815465},
  doi          = {10.1145/1815396.1815465},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/LaniepceLAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/AbdelouahabBAL09,
  author       = {Mahdi Amine Abdelouahab and
                  Abdelmadjid Bouabdallah and
                  Mohammed Achemlal and
                  Sylvie Laniepce},
  title        = {The Topology Change Attack: Threat and Impact},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {2},
  pages        = {465--487},
  year         = {2009},
  url          = {https://doi.org/10.3217/jucs-015-02-0465},
  doi          = {10.3217/JUCS-015-02-0465},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/AbdelouahabBAL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/TourolleLA07,
  author       = {Benjamin Tourolle and
                  Sylvie Laniepce and
                  Mohammed Achemlal},
  editor       = {Hongke Zhang and
                  Stephan Olariu and
                  Jiannong Cao and
                  David B. Johnson},
  title        = {Reputation-Based Routing in Hybrid Ad Hoc Networks},
  booktitle    = {Mobile Ad-Hoc and Sensor Networks, Third International Conference,
                  {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4864},
  pages        = {101--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77024-4\_11},
  doi          = {10.1007/978-3-540-77024-4\_11},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/TourolleLA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/LaniepceDM06,
  author       = {Sylvie Laniepce and
                  Jacques Demerjian and
                  Amdjed Mokhtari},
  editor       = {Seizo Onoe and
                  Mohsen Guizani and
                  Hsiao{-}Hwa Chen and
                  Mamoru Sawahashi},
  title        = {Cooperation monitoring issues in ad hoc networks},
  booktitle    = {Proceedings of the International Conference on Wireless Communications
                  and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada,
                  July 3-6, 2006},
  pages        = {695--700},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143549.1143688},
  doi          = {10.1145/1143549.1143688},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/LaniepceDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngc/LaniepceA03,
  author       = {Sylvie Laniepce and
                  Mohammed Achemlal},
  editor       = {Burkhard Stiller and
                  Georg Carle and
                  Martin Karsten and
                  Peter Reichl},
  title        = {An Approach to the Charging of Secure {IP} Multicast Services},
  booktitle    = {Group Communications and Charges; Technology and Business Models,
                  5th {COST264} International Workshop on Networked Group Communications,
                  {NGC} 2003, and 3rd International Workshop on Internet Charging and
                  QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2816},
  pages        = {265--275},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39405-1\_24},
  doi          = {10.1007/978-3-540-39405-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ngc/LaniepceA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics