Sylvie Laniepce

According to our database1, Sylvie Laniepce authored at least 14 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
SNAPPY: programmable kernel-level policies for containers.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2019
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Hidden process detection using kernel functions instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

K-binID: Kernel binary code identification for Virtual Machine Introspection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
Virtual Machine Introspection: Techniques and Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

2013
Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

When Dynamic VM Migration Falls under the Control of VM Users.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2010
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
The Topology Change Attack: Threat and Impact.
J. Univers. Comput. Sci., 2009

2007
Reputation-Based Routing in Hybrid Ad Hoc Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

2006
Cooperation monitoring issues in ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2003
An Approach to the Charging of Secure IP Multicast Services.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...