Frédéric Raynal

According to our database1, Frédéric Raynal authored at least 14 papers between 1999 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Small treatise about e-manipulation for honest people.
J. Comput. Virol., 2010

Malicious origami in PDF.
J. Comput. Virol., 2010

Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis.
J. Comput. Virol., 2010

2009
Wet-process deposition of TSV liner and metal films.
Proceedings of the IEEE International Conference on 3D System Integration, 2009

2008
Rootkit modeling and experiments under Linux.
J. Comput. Virol., 2008

2006
New Threats and Attacks on the World Wide Web.
IEEE Secur. Priv., 2006

2004
Honeypot Forensics, Part II: Analyzing the Compromised Host.
IEEE Secur. Priv., 2004

Honeypot Forensics Part I: Analyzing the Network.
IEEE Secur. Priv., 2004

2002
Links between cryptography and information hiding.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Polar IFS + Parisian Genetic Programming = Efficient IFS Inverse Problem Solving.
Genet. Program. Evolvable Mach., 2000

1999
Individual GP: an Alternative Viewpoint for the Resolution of Complex Problems.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

Manipulation of non-linear IFS attractors using genetic programming.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999


  Loading...