A dynamic reconfiguration service for CORBA C Bidan, V Issarny, T Saridakis, A Zarras Proceedings. Fourth International Conference on Configurable Distributed …, 1998 | 165 | 1998 |
Achieving middleware customization in a configuration-based development environment: experience with the Aster prototype V Issarny, C Bidan, T Saridakis Proceedings. Fourth International Conference on Configurable Distributed …, 1998 | 74 | 1998 |
Trust-based security for the OLSR routing protocol A Adnane, C Bidan, RT de Sousa Júnior Computer Communications 36 (10-11), 1159-1171, 2013 | 73 | 2013 |
Aster: A framework for sound customization of distributed runtime systems V Issarny, C Bidan Proceedings of 16th International Conference on Distributed Computing …, 1996 | 63 | 1996 |
Dealing with multi-policy security in large open distributed systems C Bidan, V Issarny INRIA, 1997 | 59 | 1997 |
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux US Patent 7,676,836, 2010 | 57 | 2010 |
Autonomic trust reasoning enables misbehavior detection in OLSR A Adnane, RT de Sousa Jr, C Bidan, L Mé Proceedings of the 2008 ACM symposium on Applied computing, 2006-2013, 2008 | 53 | 2008 |
An improved reference flow control model for policy-based intrusion detection J Zimmermann, L Mé, C Bidan Lecture notes in computer science 2808, 291-308, 2003 | 49 | 2003 |
Elvis: Extensible log visualization C Humphries, N Prigent, C Bidan, F Majorczyk Proceedings of the Tenth Workshop on Visualization for Cyber Security, 9-16, 2013 | 46 | 2013 |
Security benefits from software architecture C Bidan, V Issarny INRIA, 1997 | 39 | 1997 |
Aster: A corba-based software interconnection system supporting distributed system customization V Issarny, C Bidan Proceedings of International Conference on Configurable Distributed Systems …, 1996 | 37 | 1996 |
Misbehavior detection using implicit trust relations in the AODV routing protocol MA Ayachi, C Bidan, T Abbes, A Bouhoula 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 35 | 2009 |
Secure long term communities in ad hoc networks N Prigent, C Bidan, JP Andreaux, O Heen Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor …, 2003 | 34 | 2003 |
Experimenting a Policy-Based HIDS Based on an Information Flow Control Model L Mé, S Profile, J Zimmermann, L Mé, C Bidan In Proceedings of the Annual Computer Security Applications Conference (ACSAC, 2003 | 33 | 2003 |
Analysis of the implicit trust within the OLSR protocol A Adnane, RT de Sousa, C Bidan, L Mé Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST …, 2007 | 30 | 2007 |
Trust-based countermeasures for securing OLSR protocol A Adnane, C Bidan, RT de Sousa Junior 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 25 | 2009 |
Introducing reference flow control for detecting intrusion symptoms at the os level J Zimmermann, L Mé, C Bidan Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 22 | 2002 |
Characterizing coordination architectures according to their non-functional execution properties V Issarny, C Bidan, T Saridakis Proceedings of the Thirty-First Hawaii International Conference on System …, 1998 | 17 | 1998 |
Amores: an architecture for mobiquitous resilient systems C Artigues, Y Deswarte, J Guiochet, MJ Huguet, MO Killijian, D Powell, ... Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous …, 2012 | 16 | 2012 |
Designing an open-ended distributed file system in Aster V Issarny, C Bidan, T Saridakis Proceedings of the 9th International Conference on Parallel and Distributed …, 1996 | 16 | 1996 |