RST – Publications

Retrouvez ici l’ensemble des publications du département RST, ainsi que les futures contributions scientifiques à venir. Cette page sera régulièrement enrichie pour refléter la diversité et la richesse de nos travaux de recherche.



1384 documents

  • Michel Marot, Adel Mounir Said, Hossam Afifi. On the maximal shortest path in a connected component in V2V. Performance Evaluation, 2015, 94, pp.25 - 42. ⟨10.1016/j.peva.2015.09.003⟩. ⟨hal-01262406⟩
  • Ehsan Ahvar, Shohreh Ahvar, Noel Crespi, Joaquin Garcia-Alfaro, Zoltan Adam-Mann. NACER : a network-aware cost-efficient resource allocation method for processing-intensive tasks in distributed clouds. NCA 2015 : 14th International Symposium on Network Computing and Applications, Nov 2015, Cambridge, Ma, United States. pp.90 - 97, ⟨10.1109/NCA.2015.37⟩. ⟨hal-01263401⟩
  • Sina Fazel, Mounia Lourdiane, Catherine Lepers. Off-line contention management in colorless directionless reconfigurable optical Add/Drop multiplexer node. ACPC 2015 : Asia Communications and Photonics Conference, Nov 2015, Hong-Kong, Hong Kong SAR China. paper AM3G.5 - ⟨10.1364/ACPC.2015.AM3G.5⟩. ⟨hal-01272254⟩
  • Farah Ait Salaht, Hind Castel-Taleb. Bounding aggregations on bulk arrivals for performance analysis of clouds. AICCSA 2015 : 12th International Conference on Computer Systems and Applications , Nov 2015, Marrakech, Morocco. pp.1 - 8, ⟨10.1109/AICCSA.2015.7507120⟩. ⟨hal-01348014⟩
  • Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi. Eye can tell : on the correlation between eye movement and phishing identification. ICONIP 2015 : 22nd International Conference on Neural Information Processing, Nov 2015, Istanbul, Turkey. pp.223 - 232, ⟨10.1007/978-3-319-26555-1_26⟩. ⟨hal-01263381⟩
  • Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi. AJNA : anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLS. BADGERS 2015 : 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Nov 2015, Kyoto, Japan. pp.74 - 84, ⟨10.1109/BADGERS.2015.019⟩. ⟨hal-01453228⟩
  • Daniel Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline Laurent, et al.. Recommendations for IPsec configuration on homenet and M2M devices. Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Nov 2015, Cancun, Mexico. pp.9 - 17, ⟨10.1145/2815317.2815323⟩. ⟨hal-01263312⟩
  • Abbas Bradai, Abderrahim Benslimane, Kamal Singh. Dynamic anchor points selection for mobility management in Software Defined Networks. Journal of Network and Computer Applications (JNCA), 2015, 57, pp.1-11. ⟨10.1016/j.jnca.2015.06.018⟩. ⟨hal-01223783⟩
  • Farah Ait Salaht, Hind Castel-Taleb. Stochastic bounding models for performance analysis of clouds. CIT 2015 : 15th IEEE International Conference on Computer and Information Technology, Oct 2015, Liverpool, United Kingdom. pp.603 - 610, ⟨10.1109/CIT/IUCC/DASC/PICOM.2015.86⟩. ⟨hal-01263305⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩

© Télécom SudParis – Siret : 180 092 025 00055 – APE : 8542Z