Valerie Viet Triem Tong
Valerie Viet Triem Tong
Verified email at
Cited by
Cited by
Reachability analysis over term rewriting systems
G Feuillade, T Genet, V Viet Triem Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
Reachability analysis over term rewriting systems
G Feuillade, T Genet, V Viet Triem Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
Reachability analysis of term rewriting systems with timbuk
T Genet, VVT Tong
International Conference on Logic for Programming Artificial Intelligence …, 2001
Biometric fuzzy extractors made practical: a proposal based on fingercodes
VVT Tong, H Sibert, J Lecoeur, M Girault
International conference on Biometrics, 604-613, 2007
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems
T Genet, YM Tang-Talpin, VVT Tong
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
An efficient distributed PKI for structured P2P networks
F Lesueur, L Mé, VVT Tong
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
Capturing android malware behaviour using system flow graph
R Andriatsimandefitra, VVT Tong
International Conference on Network and System Security, 534-541, 2015
Detection and identification of Android malware based on information flow monitoring
R Andriatsimandefitra, VVT Tong
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
Liability in software engineering: overview of the LISE approach and illustration on a case study
D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ...
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
Specifying and enforcing a fine-grained information flow policy: Model and experiments
V Tong, A Clark, L Mé
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
Verifying the reliability of operating system-level information flow control systems in linux
L Georget, M Jaume, F Tronel, G Piolle, VVT Tong
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
A distributed certification system for structured P2P networks
F Lesueur, L Mé, V Viet Triem Tong
IFIP International Conference on Autonomous Infrastructure, Management and …, 2008
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
Blare tools: A policy-based intrusion detection system automatically set by the security policy
L George, V Viet Triem Tong, L Mé
International Workshop on Recent Advances in Intrusion Detection, 355-356, 2009
Designing information flow policies for Android's operating system
R Andriatsimandefitra, S Geller, VVT Tong
2012 IEEE International conference on communications (ICC), 976-981, 2012
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
The system can't perform the operation now. Try again later.
Articles 1–20