Gregory Blanc
Gregory Blanc
Télécom SudParis, Institut Mines-Télécom, Institut Polytechnique de Paris
Verified email at - Homepage
Cited by
Cited by
IoT devices recognition through network traffic analysis
MR Shahid, G Blanc, Z Zhang, H Debar
2018 IEEE international conference on big data (big data), 5187-5192, 2018
Towards autonomic DDoS mitigation using software defined networking
R Sahay, G Blanc, Z Zhang, H Debar
SENT 2015: NDSS workshop on security of emerging networking technologies, ., 2015
ArOMA: An SDN based autonomic DDoS mitigation framework
R Sahay, G Blanc, Z Zhang, H Debar
computers & security 70, 482-499, 2017
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
Generative deep learning for Internet of Things network traffic generation
MR Shahid, G Blanc, H Jmila, Z Zhang, H Debar
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing …, 2020
Trust-based voip spam detection based on call duration and human relationships
N Chaisamran, T Okuda, G Blanc, S Yamaguchi
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 451-456, 2011
EyeBit: eye-tracking approach for enforcing phishing prevention habits
D Miyamoto, T Iimura, G Blanc, H Tazaki, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
Explainable artificial intelligence for cybersecurity: a literature survey
F Charmet, HC Tanuwidjaja, S Ayoubi, PF Gimenez, Y Han, H Jmila, ...
Annals of Telecommunications 77 (11), 789-812, 2022
Anomalous communications detection in IoT networks using sparse autoencoders
MR Shahid, G Blanc, Z Zhang, H Debar
2019 IEEE 18th international symposium on network computing and applications …, 2019
Adaptive policy-driven attack mitigation in SDN
R Sahay, G Blanc, Z Zhang, K Toumi, H Debar
Proceedings of the 1st International Workshop on Security and Dependability …, 2017
Towards a 5G security architecture: Articulating software-defined security and security as a service
G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson
Proceedings of the 13th International Conference on Availability …, 2018
An Empirical Approach to Phishing Countermeasures through Smart Glasses and Validation Agents
JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi
IEEE Access, 2019
Toward quantified risk-adaptive access control for multi-tenant cloud computing
D Fall, G Blanc, T Okuda, Y Kadobayashi, S Yamaguchi
The 6th Joint Workshop on Information Security, 1-14, 2011
Eye can tell: On the correlation between eye movement and phishing identification
D Miyamoto, G Blanc, Y Kadobayashi
Neural Information Processing: 22nd International Conference, ICONIP 2015 …, 2015
Automated classification of C&C connections through malware URL clustering
N Kheir, G Blanc, H Debar, J Garcia-Alfaro, D Yang
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
A survey of smart home iot device classification using machine learning-based network traffic analysis
H Jmila, G Blanc, MR Shahid, M Lazrag
IEEE Access 10, 97117-97141, 2022
Siamese network based feature learning for improved intrusion detection
H Jmila, M Ibn Khedher, G Blanc, MA El Yacoubi
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts
G Blanc, D Miyamoto, M Akiyama, Y Kadobayashi
2012 26th International Conference on Advanced Information Networking and …, 2012
Term-rewriting deobfuscation for static client-side scripting malware detection
G Blanc, R Ando, Y Kadobayashi
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Classification of SSL servers based on their SSL handshake for automated security assessment
S Pukkawanna, G Blanc, J Garcia-Alfaro, Y Kadobayashi, H Debar
2014 Third international workshop on building analysis datasets and …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20