Valerie Viet Triem Tong
Valerie Viet Triem Tong
Verified email at
Cited by
Cited by
Reachability analysis over term rewriting systems
G Feuillade, T Genet, V Viet Triem Tong
Journal of Automated Reasoning 33 (3), 341-383, 2004
Reachability analysis of term rewriting systems with timbuk
T Genet, VVT Tong
International Conference on Logic for Programming Artificial Intelligence …, 2001
Biometric fuzzy extractors made practical: a proposal based on fingercodes
VVT Tong, H Sibert, J Lecoeur, M Girault
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems
T Genet
Proc. of Workshop on Issues in the Theory of Security (WITS'03), 2003
An efficient distributed PKI for structured P2P networks
F Lesueur, L Mé, VVT Tong
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
From TTP to IoC: Advanced persistent graphs for threat hunting
A Berady, M Jaume, VVT Tong, G Guette
IEEE Transactions on Network and Service Management 18 (2), 1321-1333, 2021
Capturing android malware behaviour using system flow graph
R Andriatsimandefitra, VVT Tong
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
Detection and identification of android malware based on information flow monitoring
R Andriatsimandefitra, VVT Tong
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
Liability in software engineering: overview of the LISE approach and illustration on a case study
D Le Métayer, M Maarek, VVT Tong, E Mazza, ML Potet, N Craipeau, ...
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
Specifying and enforcing a fine-grained information flow policy: Model and experiments
V Tong, A Clark, L Mé
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
Verifying the reliability of operating system-level information flow control systems in linux
L Georget, M Jaume, F Tronel, G Piolle, VVT Tong
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
Blare tools: A policy-based intrusion detection system automatically set by the security policy
L George, V Viet Triem Tong, L Mé
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
A distributed certification system for structured P2P networks
F Lesueur, L Mé, V Viet Triem Tong
Resilient Networks and Services: Second International Conference on …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20