Pierre-Antoine Vervier

According to our database1, Pierre-Antoine Vervier authored at least 17 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Proceedings of the 31st USENIX Security Symposium, 2022

Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Understanding Worldwide Private Information Collection on Android.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
The Tangled Genealogy of IoT Malware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

IoT Security and Privacy Labels.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Tiresias: Predicting Security Events Through Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Spammers operations: a multifaceted strategic analysis.
Secur. Commun. Networks, 2016

2015
Demystifying the IP Blackspace.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

2013
SpamTracer: How stealthy are spammers?
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

2012
Visual analytics for BGP monitoring and prefix hijacking identification.
IEEE Netw., 2012

VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012


  Loading...