default search action
Vincent Nicomette
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. AsiaCCS 2024 - [c42]Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche:
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. DIMVA 2024: 525-544 - 2023
- [c41]Vincent Nicomette, Romain Cayre:
Ten years of studies on the security of connected objects: a wrap-up (keynote abstract). C&ESAR 2023: 13-14 - 2022
- [j23]Remi Adelin, Cyrius Nugier, Eric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche:
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol. J. Comput. Virol. Hacking Tech. 18(4): 425-452 (2022) - 2021
- [j22]Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. ACM Trans. Cyber Phys. Syst. 5(3): 24:1 (2021) - [c40]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. DSN 2021: 376-387 - [c39]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. DSN 2021: 388-399 - [c38]Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, Guillaume Auriol:
A defensive man-in-middle approach to filter BLE packets. WISEC 2021: 365-367 - [c37]Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. WISEC 2021: 386-388 - 2020
- [c36]Yuxiao Mao, Vincent Migliore, Vincent Nicomette:
REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection. EuroS&P Workshops 2020: 704-709 - [c35]Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. ISSRE 2020: 358-368 - [c34]Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. NCA 2020: 1-8 - [c33]Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
A PSD-based fingerprinting approach to detect IoT device spoofing. PRDC 2020: 40-49
2010 – 2019
- 2019
- [j21]Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, Alexa Noel, Nicolas Roels, Faical Taleb, Jean Thongphan, Eric Alata, Vincent Nicomette:
Computer-Security-Oriented Escape Room. IEEE Secur. Priv. 17(4): 78-83 (2019) - [j20]Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. J. Comput. Virol. Hacking Tech. 15(1): 61-76 (2019) - [c32]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato:
Mirage: Towards a Metasploit-Like Framework for IoT. ISSRE 2019: 261-270 - [c31]Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:
Implementation of a Host-Based Intrusion Detection System for Avionic Applications. PRDC 2019: 178-187 - 2018
- [j19]Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:
A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1): 1-12 (2018) - [j18]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
IOMMU protection against I/O attacks: a vulnerability and a proof of concept. J. Braz. Comput. Soc. 24(1): 2:1-2:11 (2018) - [j17]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. J. Comput. Virol. Hacking Tech. 14(1): 53-68 (2018) - [c30]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. DSN 2018: 478-489 - [c29]Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. NCA 2018: 1-5 - [c28]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. NCA 2018: 1-8 - [i4]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. CoRR abs/1807.09464 (2018) - [i3]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. CoRR abs/1811.03934 (2018) - 2017
- [c27]Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - [c26]Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. PRDC 2017: 245-254 - 2016
- [j16]Eric Alata, Vincent Nicomette, Julien Duchêne, Colas Le Guernic, Mohamed Kaâniche:
Outils pour la rétro-conception de protocoles. Analyse et classification. Tech. Sci. Informatiques 35(6): 609-640 (2016) - [c25]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Protocol Reverse Engineering: Challenges and Obfuscation. CRiSIS 2016: 139-144 - [c24]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Bypassing IOMMU Protection against I/O Attacks. LADC 2016: 145-150 - 2015
- [c23]Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:
Smart-TV Security Analysis: Practical Experiments. DSN 2015: 497-504 - [c22]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. EDCC 2015: 49-60 - [c21]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. EDCC 2015: 205-212 - [c20]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant:
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. PRDC 2015: 189-198 - 2014
- [j15]Fernand Lone Sang, Vincent Nicomette, Yves Deswarte:
A Tool to Analyze Potential I/O Attacks against PCs. IEEE Secur. Priv. 12(2): 60-66 (2014) - [j14]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [j13]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
La sécurité des box ADSL. Analyse de risques et expérimentations. Ingénierie des Systèmes d Inf. 19(6): 63-88 (2014) - [j12]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 20(1): 4:1-4:16 (2014) - [j11]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Identification de vulnérabilités web et génération de scénarios d'attaque. Tech. Sci. Informatiques 33(9-10): 809-840 (2014) - [c19]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. NSS 2014: 1-14 - 2013
- [j10]Géraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette:
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach. Comput. J. 56(4): 422-439 (2013) - [j9]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités. Tech. Sci. Informatiques 32(1): 41-75 (2013) - [c18]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Survey on security threats and protection mechanisms in embedded automotive networks. DSN Workshops 2013: 1-12 - [c17]Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout:
An Automated Approach to Generate Web Applications Attack Scenarios. LADC 2013: 78-85 - [c16]Anthony Dessiatnikoff, Eric Alata, Yves Deswarte, Vincent Nicomette:
Low-Level Attacks on Avionics Embedded Systems. SAFECOMP 2013: 146-153 - [c15]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Security of embedded automotive networks: state of the art and a research proposal. CARS@SAFECOMP 2013 - 2012
- [j8]Anthony Dessiatnikoff, Yves Deswarte, Eric Alata, Vincent Nicomette:
Potential Attacks on Onboard Aerospace Systems. IEEE Secur. Priv. 10(4): 71-74 (2012) - [c14]Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - [c13]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Security-related vulnerability life cycle analysis. CRiSIS 2012: 1-8 - [c12]Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
A distributed platform of high interaction honeypots and experimental results. PST 2012: 229-230 - 2011
- [j7]Vincent Nicomette, David Powell, Yves Deswarte, Noreddine Abghour, Christophe Zanon:
Intrusion-tolerant fine-grained authorization for Internet applications. J. Syst. Archit. 57(4): 441-451 (2011) - [j6]Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Enforcing kernel constraints by hardware-assisted virtualization. J. Comput. Virol. 7(1): 1-21 (2011) - [j5]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J. Comput. Virol. 7(2): 143-157 (2011) - [c11]Fernand Lone Sang, Vincent Nicomette, Yves Deswarte:
I/O Attacks in Intel PC-based Architectures and Countermeasures. SysSec@DIMVA 2011: 19-26 - [c10]Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
A Clustering Approach for Web Vulnerabilities Detection. PRDC 2011: 194-203 - 2010
- [j4]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats. Tech. Sci. Informatiques 29(6): 691-720 (2010) - [c9]Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Exploiting an I/OMMU vulnerability. MALWARE 2010: 7-14 - [c8]Ion Alberdi, Vincent Nicomette, Philippe Owezarski:
Luth: Composing and Parallelizing Midpoint Inspection Devices. NSS 2010: 9-16
2000 – 2009
- 2009
- [b2]Vincent Nicomette:
La protection des systèmes informatiques vis à vis des malveillances. National Polytechnic Institute of Toulouse, France, 2009 - [j3]Ayda Saïdane, Vincent Nicomette, Yves Deswarte:
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans. Dependable Secur. Comput. 6(1): 45-58 (2009) - 2008
- [j2]Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2): 127-136 (2008) - [j1]Éric Lacombe, Frédéric Raynal, Vincent Nicomette:
Rootkit modeling and experiments under Linux. J. Comput. Virol. 4(2): 137-157 (2008) - 2007
- [i2]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot. CoRR abs/0704.0858 (2007) - [i1]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - 2006
- [c7]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46 - [p1]Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget:
Collection and analysis of attack data based on honeypots deployed on the Internet. Quality of Protection 2006: 79-91 - 2003
- [c6]Ayda Saïdane, Yves Deswarte, Vincent Nicomette:
An intrusion tolerant architecture for dynamic content internet servers. SSRS@CCS 2003: 110-114 - 2001
- [c5]Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell:
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. E-smart 2001: 71-82
1990 – 1999
- 1997
- [c4]Vincent Nicomette, Yves Deswarte:
An Authorization Scheme For Distributed Object Systems. S&P 1997: 21-30 - 1996
- [b1]Vincent Nicomette:
La protection dans les systèmes à objets répartis. National Polytechnic Institute of Toulouse, France, 1996 - [c3]Vincent Nicomette, Yves Deswarte:
Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. ASIAN 1996: 192-203 - [c2]Vincent Nicomette, Yves Deswarte:
A Multilevel Security Model for Distributed Object Systems. ESORICS 1996: 80-98 - 1995
- [c1]Jean-Charles Fabre, Vincent Nicomette, Tanguy Pérennou, Robert J. Stroud, Zhixue Wu:
Implementing Fault Tolerant Applications using Reflective Object-Oriented Programming. FTCS 1995: 489-498
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-21 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint