default search action
Gilles Guette
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi:
SCWAD: Automated Pentesting of Web Applications. SECRYPT 2024: 424-433 - 2023
- [c18]Manuel Poisson, Valérie Viet Triem Tong, Gilles Guette, Frédéric Guihéry, Damien Crémilleux:
CVE representation to build attack positions graphs. IEEE Big Data 2023: 3063-3067 - [c17]Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall:
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures. FPS (1) 2023: 123-138 - [i2]Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall:
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment. CoRR abs/2303.17373 (2023) - [i1]Manuel Poisson, Valérie Viet Triem Tong, Gilles Guette, Frédéric Guihéry, Damien Crémilleux:
CVE representation to build attack positions graphs. CoRR abs/2312.02585 (2023) - 2022
- [j6]Aimad Berady, Mathieu Jaume, Valérie Viet Triem Tong, Gilles Guette:
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns. IEEE Trans. Netw. Serv. Manag. 19(4): 5252-5264 (2022) - [d1]Aimad Berady, Mathieu Jaume, Valérie Viet Triem Tong, Gilles Guette:
PWNJUTSU dataset. IEEE DataPort, 2022 - 2021
- [j5]Aimad Berady, Mathieu Jaume, Valérie Viet Triem Tong, Gilles Guette:
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting. IEEE Trans. Netw. Serv. Manag. 18(2): 1321-1333 (2021) - [c16]Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette:
Accurate Measurement of the Energy Consumption of Security Functions. SECRYPT 2021: 487-494
2010 – 2019
- 2019
- [c15]Benoît Fournier, Gilles Guette, Valérie Viet Triem Tong, Jean-Louis Lanet:
SEER4US, Secured Energy Efficient Routing for UAV Swarms. WiMob 2019: 1-6 - 2018
- [c14]Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse:
Alternatives to Binary Routing Policies Applied to a Military MANET Coalition. IWCMC 2018: 956-961 - 2016
- [c13]Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse:
Comparing inter-domain routing protocol assessment tools for MANET. ICC 2016: 1-6 - [c12]Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse:
ITMAN: An inter tactical mobile ad hoc network routing protocol. MILCOM 2016: 823-828 - [c11]Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse:
Comparison of Inter-MANET routing protocol evaluation tools. NOTERE 2016: 1-6 - 2015
- [c10]Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong:
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings. IFIPTM 2015: 92-108 - 2013
- [c9]Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Nicolas Prigent, Valérie Viet Triem Tong:
A privacy preserving distributed reputation mechanism. ICC 2013: 1951-1956 - [c8]Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong:
Extending Signatures of Reputation. Privacy and Identity Management 2013: 165-176 - 2012
- [c7]Christian Artigues, Yves Deswarte, Jérémie Guiochet, Marie-José Huguet, Marc-Olivier Killijian, David Powell, Matthieu Roy, Christophe Bidan, Nicolas Prigent, Emmanuelle Anceaume, Sébastien Gambs, Gilles Guette, Michel Hurfin, Frédéric Schettini:
AMORES: an architecture for mobiquitous resilient systems. ARMOR 2012: 7:1-7:6 - 2010
- [j4]Benoit Radier, Mikaël Salaün, Gilles Guette, Farid Naït-Abdesselam:
A vehicle gateway to manage IP multimedia subsystem autonomous mobility. Int. J. Auton. Adapt. Commun. Syst. 3(2): 159-177 (2010)
2000 – 2009
- 2009
- [j3]Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, Bertrand Ducourthial:
Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. Int. J. Netw. Secur. 9(1): 22-33 (2009) - [j2]Gilles Guette:
Automating trusted key rollover in DNSSEC. J. Comput. Secur. 17(6): 839-854 (2009) - [c6]Gilles Guette, Olivier Heen:
A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. VNC 2009: 1-7 - [c5]Olivier Heen, Gilles Guette, Thomas Genet:
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. WISTP 2009: 1-11 - 2008
- [j1]Gilles Guette:
Key Revocation System for DNSSEC. J. Networks 3(6): 54-61 (2008) - [c4]Gilles Guette, Ciarán Bryce:
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). WISTP 2008: 106-116 - 2007
- [c3]Gilles Guette, Bertrand Ducourthial:
On the Sybil attack detection in VANET. MASS 2007: 1-6 - 2005
- [c2]Gilles Guette, Bernard Cousin, David Fort:
GDS Resource Record: Generalization ofthe Delegation Signer Model. ICN (2) 2005: 844-851 - [c1]Gilles Guette, Bernard Cousin, David Fort:
Algorithm for DNSSEC Trusted Key Rollover. ICOIN 2005: 679-688
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint