RST – Publications

Retrouvez ici l’ensemble des publications du département RST, ainsi que les futures contributions scientifiques à venir. Cette page sera régulièrement enrichie pour refléter la diversité et la richesse de nos travaux de recherche.



1384 documents

  • Herbert Bos, Fabian Monrose, Gregory Blanc (Dir.). Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings. Springer, 9404, pp.638, 2015, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-26361-8. ⟨hal-01453167⟩
  • Eric Sibony, Stéphan Clémençon, Jérémie Jakubowicz. MRA-based Statistical Learning from Incomplete Rankings Stéphan Clémençon. MRA-based Statistical Learning from Incomplete Rankings Stéphan Clémençon, 2015. ⟨hal-02107459⟩
  • Frédéric Cuppens, Joaquin Garcia Alfaro, A. Nur Zincir Heywood, Philip W. L. Fong (Dir.). FPS 2014 : 7th International Symposium on Foundations and Practice of Security : revised selected papers. 8930, pp.375, 2015, LNCS (Lecture Notes in Computer Science), 978-3-319-17039-8. ⟨hal-01162133⟩
  • Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, et al. (Dir.). Data privacy management, autonomous spontaneous security, and security assurance : 9th international workshop, DPM 2014, 7th international workshop, SETOP 2014, and 3rd international workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014 : revised selected papers. Springer international publishing, 8872, pp.343, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-17015-2. ⟨hal-01263419⟩
  • Özgür Can Turna, Muhammed Ali Aydin, Abdul Halim Zaim, Tülin Atmaca. A new dynamic bandwidth allocation algorithm based on online-offline mode for EPON. Optical Switching and Networking, 2015, 15, pp.29 - 43. ⟨10.1016/j.osn.2014.04.003⟩. ⟨hal-01279516⟩
  • Dingqi Yang, Daqing Zhang, Vincent W. Zheng, Zhiyong Yu. Modeling user activity preference by leveraging user spatial temporal characteristics in LBSNs. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2015, 45 (1), pp.129 - 142. ⟨10.1109/TSMC.2014.2327053⟩. ⟨hal-01262392⟩
  • Nesrine Kaaniche. Cloud data storage security based on cryptographic mechanisms. Cryptography and Security [cs.CR]. Institut National des Télécommunications, 2014. English. ⟨NNT : 2014TELE0033⟩. ⟨tel-01146029⟩
  • Julio Cesar Louzada Pinto, Tijani Chahed. Modeling user and topic interactions in social networks using Hawkes processes. VALUETOOLS 2014 : 8th International Conference on Performance Evaluation Methodologies and Tools, Dec 2014, Bratislava, Slovakia. pp.58 - 65 ⟨10.4108/icst.Valuetools.2014.258186⟩. ⟨hal-01262345⟩
  • Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan, Daqing Zhang. Towards intelligent caring agents for Aging-In-Place : issues and challenges. CIHLI 2014 : IEEE Symposium on Computational Intelligence for Human-like Intelligence, Dec 2014, Orlando, United States. pp.1 - 8, ⟨10.1109/CIHLI.2014.7013393⟩. ⟨hal-01286102⟩
  • Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. Digital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France. ⟨hal-01281994⟩

© Télécom SudParis – Siret : 180 092 025 00055 – APE : 8542Z