Marc Lemercier

According to our database1, Marc Lemercier authored at least 24 papers between 1995 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Decentralized prediction and reputation approach in vehicular networks.
Trans. Emerg. Telecommun. Technol., 2022

Data leakage prevention model for vehicular networks.
Proceedings of the 18th International Conference on Wireless and Mobile Computing, 2022

2021
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Decentralized Reputation Model based on Bayes' Theorem in Vehicular Networks.
Proceedings of the ICC 2021, 2021

2020
An Efficient Reputation Management Model based on Game Theory for Vehicular Networks.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2017
Android application classification and anomaly detection with graph-based permission patterns.
Decis. Support Syst., 2017

2016
REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery.
AI Commun., 2016

2014
Robust clustering methods for detecting smartphone's abnormal behavior.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Clustering-based anomaly detection for smartphone applications.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

2013
A smartphone-based online social network trust evaluation system.
Soc. Netw. Anal. Min., 2013

Indirect Information Linkage for OSINT through Authorship Analysis of Aliases.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2013

A dynamic approach to detecting suspicious profiles on social platforms.
Proceedings of the IEEE International Conference on Communications, 2013

Diagnosing smartphone's abnormal behavior through robust outlier detection methods.
Proceedings of the Global Information Infrastructure Symposium, 2013

REPLOT: REtrieving profile links on Twitter for suspicious networks detection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Familiar strangers detection in online social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Multi-layer Crisis Mapping: A Social Media-Based Approach.
Proceedings of the 21st IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2012

The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
SPOT 1.0: Scoring Suspicious Profiles on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2004
Toward an Intelligent Bandwidth Broker Model for Resources Management in DiffServ Networks.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

2002
I3 - A New Organisational Framework for Network Modelling Using a Multi-Agent System.
Proceedings of the Smart Networks, 2002

2001
Construction d''une mémoire de projet en ingénierie mécanique utilisant les technologies web.
Document Numérique, 2001

1995
Design and architecture of a new space priority mechanism for ATM network nodes.
Telecommun. Syst., 1995


  Loading...