Valerie Viet Triem Tong
Valerie Viet Triem Tong
Verified email at centralesupelec.fr
Title
Cited by
Cited by
Year
Reachability analysis over term rewriting systems
G Feuillade, T Genet, VVT Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1252004
Reachability analysis over term rewriting systems
G Feuillade, T Genet, VVT Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
1252004
Reachability analysis of term rewriting systems with timbuk
T Genet, VVT Tong
International Conference on Logic for Programming Artificial Intelligence …, 2001
782001
Biometric fuzzy extractors made practical: a proposal based on fingercodes
VVT Tong, H Sibert, J Lecoeur, M Girault
International conference on Biometrics, 604-613, 2007
662007
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
412016
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems
T Genet, YM Tang-Talpin, VVT Tong
412003
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
352015
An efficient distributed PKI for structured P2P networks
F Lesueur, L Mé, VVT Tong
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009
332009
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
322008
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The {LASER} Workshop: Learning from Authoritative Security Experiment …, 2016
292016
Liability in software engineering: overview of the LISE approach and illustration on a case study
D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ...
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
212010
Detection and identification of Android malware based on information flow monitoring
R Andriatsimandefitra, VVT Tong
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
202015
Capturing android malware behaviour using system flow graph
R Andriatsimandefitra, VVT Tong
International Conference on Network and System Security, 534-541, 2015
202015
Specifying and enforcing a fine-grained information flow policy: Model and experiments
V Viet Triem Tong, AJ Clark, L Mé
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
192010
A distributed certification system for structured P2P networks
F Lesueur, L Mé, VVT Tong
IFIP International Conference on Autonomous Infrastructure, Management and …, 2008
192008
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
172013
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
172011
Specification of electronic voting protocol properties using adm logic: Foo case study
M Talbi, B Morin, VVT Tong, A Bouhoula, M Mejri
International Conference on Information and Communications Security, 403-418, 2008
172008
Designing information flow policies for Android's operating system
R Andriatsimandefitra, S Geller, VVT Tong
2012 IEEE International conference on communications (ICC), 976-981, 2012
162012
Blare tools: A policy-based intrusion detection system automatically set by the security policy
L George, VVT Tong, L Mé
International Workshop on Recent Advances in Intrusion Detection, 355-356, 2009
162009
The system can't perform the operation now. Try again later.
Articles 1–20