Follow
Ruan HE
Ruan HE
Tencent
Verified email at tencent.com - Homepage
Title
Cited by
Cited by
Year
NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures
M Pattaranantakul, R He, Q Song, Z Zhang, A Meddahi
IEEE Communications Surveys & Tutorials 20 (4), 3330-3368, 2018
1192018
System for supervising the security of an architecture
R He, M Lacoste, A Wailly
US Patent 9,380,075, 2016
812016
Secmano: Towards network functions virtualization (nfv) based security management and orchestration
M Pattaranantakul, R He, A Meddahi, Z Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 598-605, 2016
712016
Secmano: Towards network functions virtualization (nfv) based security management and orchestration
M Pattaranantakul, R He, A Meddahi, Z Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 598-605, 2016
712016
Controller DAC: Securing SDN controller with dynamic access control
Y Tseng, M Pattaranantakul, R He, Z Zhang, F Naït-Abdesselam
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
442017
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models
M Compastié, R Badonnel, O Festor, R He
Computers & Security 97, 101905, 2020
432020
Think: View-based support of non-functional properties in embedded systems
M Anne, R He, T Jarboui, M Lacoste, O Lobry, G Lorant, M Louvel, ...
2009 International Conference on Embedded Software and Systems, 147-156, 2009
432009
A first step towards security extension for NFV orchestrator
M Pattaranantakul, Y Tseng, R He, Z Zhang, A Meddahi
Proceedings of the ACM International Workshop on Security in Software …, 2017
302017
Applying component-based design to self-protection of ubiquitous systems
R He, M Lacoste
Proceedings of the 3rd ACM workshop on Software engineering for pervasive …, 2008
282008
A policy management framework for self-protection of pervasive systems
R He, M Lacoste, J Leneutre
2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010
272010
Putting together QoS and security in autonomic pervasive systems
M Alia, M Lacoste, R He, F Eliassen
Proceedings of the 6th ACM workshop on QoS and security for wireless and …, 2010
242010
Leveraging network functions virtualization orchestrators to achieve software-defined access control in the clouds
M Pattaranantakul, R He, Z Zhang, A Meddahi, P Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 372-383, 2018
212018
Method and a server for processing a request from a terminal to access a computer resource
R He, X Qian
US Patent App. 14/313,993, 2014
202014
A component-based policy-neutral architecture for kernel-level access control
M Lacoste, T Jarboui, R He
annals of telecommunications-annales des télécommunications 64, 121-146, 2009
182009
Method for processing access requests and web browser
R He, J Chawki
US Patent 10,999,405, 2021
172021
Unikernel-based approach for software-defined security in cloud infrastructures
M Compastié, R Badonnel, O Festor, R He, M Kassi-Lahlou
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2018
172018
Method of authenticating a terminal by a gateway of an internal network protected by an access security entity providing secure access
R He, J Chawki
US Patent 10,356,612, 2019
162019
A tosca-oriented software-defined security approach for unikernel-based protected clouds
M Compastié, R Badonnel, O Festor, R He
2019 IEEE Conference on Network Softwarization (NetSoft), 151-159, 2019
142019
Estimating web attack detection via model uncertainty from inaccurate annotation
X Gong, Y Zhou, Y Bi, M He, S Sheng, H Qiu, R He, J Lu
2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019
142019
Device and a method for managing access to a pool of computer and network resources made available to an entity by a cloud computing system
R He, J Lebourgeois, J Terrier
US Patent 9,736,029, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20