default search action
Eric Alata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Gaël Loubet, Eric Alata, Alexandru Takacs, Daniela Dragomirescu:
A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings. Sensors 23(4): 1849 (2023) - [j18]Lamoussa Sanogo, Eric Alata, Alexandru Takacs, Daniela Dragomirescu:
Intrusion Detection System for IoT: Analysis of PSD Robustness. Sensors 23(4): 2353 (2023) - 2022
- [j17]Remi Adelin, Cyrius Nugier, Eric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche:
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol. J. Comput. Virol. Hacking Tech. 18(4): 425-452 (2022) - 2021
- [j16]Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. ACM Trans. Cyber Phys. Syst. 5(3): 24:1 (2021) - 2020
- [c24]Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. ISSRE 2020: 358-368 - [c23]Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. NCA 2020: 1-8
2010 – 2019
- 2019
- [j15]Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, Alexa Noel, Nicolas Roels, Faical Taleb, Jean Thongphan, Eric Alata, Vincent Nicomette:
Computer-Security-Oriented Escape Room. IEEE Secur. Priv. 17(4): 78-83 (2019) - [j14]Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. J. Comput. Virol. Hacking Tech. 15(1): 61-76 (2019) - [c22]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato:
Mirage: Towards a Metasploit-Like Framework for IoT. ISSRE 2019: 261-270 - [c21]Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:
Implementation of a Host-Based Intrusion Detection System for Avionic Applications. PRDC 2019: 178-187 - [i5]Cyrius Nugier, Remi Adelin, Vincent Migliore, Eric Alata:
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper). IACR Cryptol. ePrint Arch. 2019: 1219 (2019) - 2018
- [j13]Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:
A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1): 1-12 (2018) - [j12]Nicola Accettura, Eric Alata, Pascal Berthou, Daniela Dragomirescu, Thierry Monteil:
Addressing scalable, optimal, and secure communications over LoRa networks: Challenges and research directions. Internet Technol. Lett. 1(4) (2018) - [j11]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
IOMMU protection against I/O attacks: a vulnerability and a proof of concept. J. Braz. Comput. Soc. 24(1): 2:1-2:11 (2018) - [j10]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. J. Comput. Virol. Hacking Tech. 14(1): 53-68 (2018) - [c20]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. DSN 2018: 478-489 - [c19]Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. NCA 2018: 1-5 - [c18]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. NCA 2018: 1-8 - [i4]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. CoRR abs/1807.09464 (2018) - [i3]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. CoRR abs/1811.03934 (2018) - 2017
- [c17]Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - [c16]Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. PRDC 2017: 245-254 - 2016
- [j9]Eric Alata, Vincent Nicomette, Julien Duchêne, Colas Le Guernic, Mohamed Kaâniche:
Outils pour la rétro-conception de protocoles. Analyse et classification. Tech. Sci. Informatiques 35(6): 609-640 (2016) - [c15]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Protocol Reverse Engineering: Challenges and Obfuscation. CRiSIS 2016: 139-144 - [c14]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Bypassing IOMMU Protection against I/O Attacks. LADC 2016: 145-150 - 2015
- [c13]Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:
Smart-TV Security Analysis: Practical Experiments. DSN 2015: 497-504 - [c12]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. EDCC 2015: 49-60 - [c11]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. EDCC 2015: 205-212 - [c10]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant:
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. PRDC 2015: 189-198 - 2014
- [j8]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [j7]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
La sécurité des box ADSL. Analyse de risques et expérimentations. Ingénierie des Systèmes d Inf. 19(6): 63-88 (2014) - [j6]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 20(1): 4:1-4:16 (2014) - [j5]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Identification de vulnérabilités web et génération de scénarios d'attaque. Tech. Sci. Informatiques 33(9-10): 809-840 (2014) - [c9]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. NSS 2014: 1-14 - 2013
- [c8]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Survey on security threats and protection mechanisms in embedded automotive networks. DSN Workshops 2013: 1-12 - [c7]Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout:
An Automated Approach to Generate Web Applications Attack Scenarios. LADC 2013: 78-85 - [c6]Anthony Dessiatnikoff, Eric Alata, Yves Deswarte, Vincent Nicomette:
Low-Level Attacks on Avionics Embedded Systems. SAFECOMP 2013: 146-153 - [c5]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Security of embedded automotive networks: state of the art and a research proposal. CARS@SAFECOMP 2013 - 2012
- [j4]Anthony Dessiatnikoff, Yves Deswarte, Eric Alata, Vincent Nicomette:
Potential Attacks on Onboard Aerospace Systems. IEEE Secur. Priv. 10(4): 71-74 (2012) - [c4]Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - [c3]Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
A distributed platform of high interaction honeypots and experimental results. PST 2012: 229-230 - 2011
- [j3]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J. Comput. Virol. 7(2): 143-157 (2011) - [c2]Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
A Clustering Approach for Web Vulnerabilities Detection. PRDC 2011: 194-203 - 2010
- [j2]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats. Tech. Sci. Informatiques 29(6): 691-720 (2010)
2000 – 2009
- 2008
- [j1]Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2): 127-136 (2008) - 2007
- [b1]Eric Alata:
Observation, caractérisation et modélisation de processus d'attaques sur Internet. INSA Toulouse, France, 2007 - [i2]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot. CoRR abs/0704.0858 (2007) - [i1]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - 2006
- [c1]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46 - [p1]Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget:
Collection and analysis of attack data based on honeypots deployed on the Internet. Quality of Protection 2006: 79-91
Coauthor Index
aka: Mohamad Kaâniche
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint