Eric Alata

According to our database1, Eric Alata authored at least 47 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Intrusion Detection System for IoT: Analysis of PSD Robustness.
Sensors, February, 2023

A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings.
Sensors, February, 2023

2022
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol.
J. Comput. Virol. Hacking Tech., 2022

2021
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment.
ACM Trans. Cyber Phys. Syst., 2021

2020
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

2019
Smart-TV security: risk analysis and experiments on Smart-TV communication channels.
J. Comput. Virol. Hacking Tech., 2019

Computer-Security-Oriented Escape Room.
IEEE Secur. Priv., 2019

Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper).
IACR Cryptol. ePrint Arch., 2019

Implementation of a Host-Based Intrusion Detection System for Avionic Applications.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Mirage: Towards a Metasploit-Like Framework for IoT.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

2018
State of the art of network protocol reverse engineering tools.
J. Comput. Virol. Hacking Tech., 2018

IOMMU protection against I/O attacks: a vulnerability and a proof of concept.
J. Braz. Comput. Soc., 2018

Addressing scalable, optimal, and secure communications over LoRa networks: Challenges and research directions.
Internet Technol. Lett., 2018

A language-based intrusion detection approach for automotive embedded networks.
Int. J. Embed. Syst., 2018

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Specification-Based Protocol Obfuscation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017

2016
Outils pour la rétro-conception de protocoles. Analyse et classification.
Tech. Sci. Informatiques, 2016

Bypassing IOMMU Protection against I/O Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Protocol Reverse Engineering: Challenges and Obfuscation.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds.
Proceedings of the 11th European Dependable Computing Conference, 2015

Security of ISP Access Networks: Practical Experiments.
Proceedings of the 11th European Dependable Computing Conference, 2015

Smart-TV Security Analysis: Practical Experiments.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Identification de vulnérabilités web et génération de scénarios d'attaque.
Tech. Sci. Informatiques, 2014

An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comput. Soc., 2014

La sécurité des box ADSL. Analyse de risques et expérimentations.
Ingénierie des Systèmes d Inf., 2014

An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications.
Int. J. Secur. Softw. Eng., 2014

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Security of embedded automotive networks: state of the art and a research proposal.
Proceedings of the SAFECOMP 2013, 2013

Low-Level Attacks on Avionics Embedded Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2013

An Automated Approach to Generate Web Applications Attack Scenarios.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Potential Attacks on Onboard Aerospace Systems.
IEEE Secur. Priv., 2012

A distributed platform of high interaction honeypots and experimental results.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Detecting attacks against data in web applications.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
J. Comput. Virol., 2011

A Clustering Approach for Web Vulnerabilities Detection.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

2010
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats.
Tech. Sci. Informatiques, 2010

2008
Internet attacks monitoring with dynamic connection redirection mechanisms.
J. Comput. Virol., 2008

2007
Observation, caractérisation et modélisation de processus d'attaques sur Internet.
PhD thesis, 2007

Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Lessons learned from the deployment of a high-interaction honeypot.
Proceedings of the Sixth European Dependable Computing Conference, 2006


  Loading...