Olivier Bettan

Orcid: 0000-0003-1562-496X

According to our database1, Olivier Bettan authored at least 12 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection.
Mach. Learn. Knowl. Extr., December, 2023

2021
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

2020
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic.
IEEE Trans. Netw. Serv. Manag., 2019

Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Passive Monitoring of HTTPS Service Use.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2016
Bayesian Attack Model for Dynamic Risk Assessment.
CoRR, 2016

Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Hybrid Risk Assessment Model Based on Bayesian Networks.
Proceedings of the Advances in Information and Computer Security, 2016

2015
Adjustable Fusion to Support Cyber Security Operators.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015


  Loading...