A dynamic reconfiguration service for CORBA C Bidan, V Issarny, T Saridakis, A Zarras Proceedings. Fourth International Conference on Configurable Distributed …, 1998 | 166 | 1998 |
Trust-based security for the OLSR routing protocol A Adnane, C Bidan, RT de Sousa Júnior Computer Communications 36 (10-11), 1159-1171, 2013 | 79 | 2013 |
Achieving middleware customization in a configuration-based development environment: experience with the Aster prototype V Issarny, C Bidan, T Saridakis Proceedings. Fourth International Conference on Configurable Distributed …, 1998 | 78 | 1998 |
Aster: A framework for sound customization of distributed runtime systems V Issarny, C Bidan Proceedings of 16th International Conference on Distributed Computing …, 1996 | 65 | 1996 |
Dealing with multi-policy security in large open distributed systems C Bidan, V Issarny Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998 | 61 | 1998 |
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux US Patent 7,676,836, 2010 | 58 | 2010 |
Autonomic trust reasoning enables misbehavior detection in OLSR A Adnane, RT de Sousa Jr, C Bidan, L Mé Proceedings of the 2008 ACM symposium on Applied computing, 2006-2013, 2008 | 54 | 2008 |
An improved reference flow control model for policy-based intrusion detection J Zimmermann, L Mé, C Bidan Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003 | 49 | 2003 |
Elvis: Extensible log visualization C Humphries, N Prigent, C Bidan, F Majorczyk Proceedings of the Tenth Workshop on Visualization for Cyber Security, 9-16, 2013 | 48 | 2013 |
Security benefits from software architecture C Bidan, V Issarny International Conference on Coordination Languages and Models, 64-80, 1997 | 44 | 1997 |
Aster: A corba-based software interconnection system supporting distributed system customization V Issarny, C Bidan Proceedings of International Conference on Configurable Distributed Systems …, 1996 | 40 | 1996 |
Misbehavior detection using implicit trust relations in the AODV routing protocol MA Ayachi, C Bidan, T Abbes, A Bouhoula 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 36 | 2009 |
Secure long term communities in ad hoc networks N Prigent, C Bidan, JP Andreaux, O Heen Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor …, 2003 | 34 | 2003 |
Experimenting a Policy-Based HIDS Based on an Information Flow Control Model L Mé, S Profile, J Zimmermann, L Mé, C Bidan In Proceedings of the Annual Computer Security Applications Conference (ACSAC, 2003 | 32 | 2003 |
Analysis of the implicit trust within the OLSR protocol A Adnane, RT de Sousa Jr, C Bidan, L Mé IFIP International Conference on Trust Management, 75-90, 2007 | 31 | 2007 |
Trust-based countermeasures for securing OLSR protocol A Adnane, C Bidan, RT de Sousa Junior 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 25 | 2009 |
Introducing reference flow control for detecting intrusion symptoms at the os level J Zimmermann, L Mé, C Bidan Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 22 | 2002 |
Designing an open-ended distributed file system in Aster V Issarny, C Bidan, T Saridakis Proceedings of the 9th International Conference on Parallel and Distributed …, 1996 | 19 | 1996 |
Characterizing coordination architectures according to their non-functional execution properties V Issarny, C Bidan, T Saridakis Proceedings of the Thirty-First Hawaii International Conference on System …, 1998 | 18 | 1998 |
A programming system for the development of TINA services T Saridakis, C Bidan, V Issarny Open Distributed Processing and Distributed Platforms: Proceedings of the …, 1997 | 18 | 1997 |