The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christophe Bidan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:364-373 [Conf]
  2. Christophe Bidan, Valérie Issarny
    Security Benefits from Software Architecture. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 1997, pp:64-80 [Conf]
  3. Christophe Bidan, Valérie Issarny
    Dealing with Multi-policy Security in Large Open Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:51-66 [Conf]
  4. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:291-308 [Conf]
  5. Valérie Issarny, Christophe Bidan
    Aster: A Framework for Sound Customization of Distributed Runtime Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:586-593 [Conf]
  6. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:292-306 [Conf]
  7. Nicolas Prigent, Christophe Bidan, Jean-Pierre Andreaux, Olivier Heen
    Secure long term communities in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:115-124 [Conf]

  8. Model for Trust within Information Technology Management. [Citation Graph (, )][DBLP]


  9. Security of predefined groups in manets. [Citation Graph (, )][DBLP]


  10. Integrating trust reasonings into node behavior in olsr. [Citation Graph (, )][DBLP]


  11. Autonomic trust reasoning enables misbehavior detection in OLSR. [Citation Graph (, )][DBLP]


  12. Effectiveness of Trust Reasoning for Attack Detection in OLSR. [Citation Graph (, )][DBLP]


  13. Trust-Based Countermeasures for Securing OLSR Protocol. [Citation Graph (, )][DBLP]


  14. Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002