default search action
Gregory Blanc
Person information
- affiliation: Télécom SudParis, Université Paris-Saclay, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert:
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges. ARES 2024: 42:1-42:13 - [c37]Hugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos:
A Model-based Approach for Assessing the Security of Cyber-Physical Systems. ARES 2024: 121:1-121:10 - [c36]Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila:
Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches. CCS 2024: 5081-5083 - [c35]Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura:
XAI-driven Adversarial Attacks on Network Intrusion Detectors. EICC 2024: 65-73 - [c34]Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé:
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation. EuroS&P Workshops 2024: 273-286 - [c33]Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel:
DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach. NetSoft 2024: 369-374 - [c32]Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. SECRYPT 2024: 674-679 - 2023
- [c31]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. CCS 2023: 3662-3663 - [e5]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, ARTMAN 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - 2022
- [j8]Houda Jmila, Gregory Blanc, Mustafizur R. Shahid, Marwan Lazrag:
A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis. IEEE Access 10: 97117-97141 (2022) - [j7]Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang:
Interactions between artificial intelligence and cybersecurity to protect future networks. Ann. des Télécommunications 77(11-12): 727-729 (2022) - [j6]Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. Ann. des Télécommunications 77(11-12): 789-812 (2022) - [c30]Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil:
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework. FPS 2022: 142-157 - 2021
- [j5]Houda Jmila, Gregory Blanc:
Towards security-Aware 5G slice embedding. Comput. Secur. 100: 102075 (2021) - 2020
- [j4]François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, Houda Jmila:
Solving security constraints for 5G slice embedding: A proof-of-concept. Comput. Secur. 89 (2020) - [c29]Elkin Aguas, Anthony Lambert, Grégory Blanc, Hervé Debar:
Automated Saturation Mitigation Controlled by Deep Reinforcement Learning. ICNP 2020: 1-6 - [c28]Mustafizur R. Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar:
Generative Deep Learning for Internet of Things Network Traffic Generation. PRDC 2020: 70-79
2010 – 2019
- 2019
- [j3]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access 7: 130758-130771 (2019) - [c27]Houda Jmila, Gregory Blanc:
Designing Security-Aware Service Requests for NFV-Enabled Networks. ICCCN 2019: 1-9 - [c26]Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim A. El-Yacoubi:
Siamese Network Based Feature Learning for Improved Intrusion Detection. ICONIP (1) 2019: 377-389 - [c25]Fabien Charmet, Gregory Blanc, Christophe Kiennert:
Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration. NCA 2019: 1-10 - [c24]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. NCA 2019: 1-5 - [i2]Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. CoRR abs/1912.11831 (2019) - 2018
- [c23]Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson:
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. ARES 2018: 47:1-47:8 - [c22]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
IoT Devices Recognition Through Network Traffic Analysis. IEEE BigData 2018: 5187-5192 - [c21]François Boutigny, Stéphane Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu:
Multi-Provider Secure Virtual Network Embedding. NTMS 2018: 1-5 - [e4]Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc:
Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings. Lecture Notes in Computer Science 10885, Springer 2018, ISBN 978-3-319-93410-5 [contents] - [e3]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - 2017
- [j2]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar:
ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 70: 482-499 (2017) - [c20]Gregory Blanc, Dawid Machnicki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, Rishikesh Sahay, Pawel Pawlinski:
NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis. EPS 2017 - [c19]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar:
Adaptive Policy-driven Attack Mitigation in SDN. XDOMO@EuroSys 2017: 4:1-4:6 - [c18]Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi:
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. NCA 2017: 453-457 - 2016
- [c17]Khalifa Toumi, Muhammad Sabir Idrees, Fabien Charmet, Reda Yaich, Gregory Blanc:
Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case. HPCC/SmartCity/DSS 2016: 578-585 - [c16]François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar:
Hybrid Risk Assessment Model Based on Bayesian Networks. IWSEC 2016: 21-40 - [c15]Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Grégory Blanc:
ML: DDoS Damage Control with MPLS. NordSec 2016: 101-116 - [e2]Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro:
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings. Lecture Notes in Computer Science 9854, Springer 2016, ISBN 978-3-319-45718-5 [contents] - [i1]François-Xavier Aguessy, Olivier Bettan, Grégory Blanc, Vania Conan, Hervé Debar:
Bayesian Attack Model for Dynamic Risk Assessment. CoRR abs/1606.09042 (2016) - 2015
- [c14]Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi:
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. BADGERS@RAID 2015: 74-84 - [c13]Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification. ICONIP (3) 2015: 223-232 - [c12]Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. SEC 2015: 252-266 - [e1]Herbert Bos, Fabian Monrose, Gregory Blanc:
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9404, Springer 2015, ISBN 978-3-319-26361-8 [contents] - 2014
- [c11]Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar:
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. BADGERS@ESORICS 2014: 30-39 - [c10]Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi:
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. BADGERS@ESORICS 2014: 56-65 - [c9]Yosra Ben Mustapha, Hervé Debar, Gregory Blanc:
Policy Enforcement Point Model. SecureComm (1) 2014: 278-286 - [c8]Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, Pawel Pawlinski:
A Trusted Knowledge Management System for Multi-layer Threat Analysis. TRUST 2014: 214-215 - [c7]Gustavo Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar:
Combining Technical and Financial Impacts for Countermeasure Selection. AIDP 2014: 1-14 - 2013
- [c6]Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro:
Attribute-Based Mining Process for the Organization-Based Access Control Model. TrustCom/ISPA/IUCC 2013: 421-430 - 2012
- [c5]Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. AINA Workshops 2012: 344-351 - [c4]Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. BCFIC 2012: 72-79 - 2011
- [j1]Gregory Blanc, Youki Kadobayashi:
A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude. IEICE Trans. Inf. Syst. 94-D(11): 2159-2166 (2011) - [c3]Gregory Blanc, Ruo Ando, Youki Kadobayashi:
Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection. NTMS 2011: 1-6 - [c2]Noppawat Chaisamran, Takeshi Okuda, Gregory Blanc, Suguru Yamaguchi:
Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships. SAINT 2011: 451-456 - 2010
- [c1]Gregory Blanc, Youki Kadobayashi:
Towards revealing JavaScript program intents using abstract interpretation. AINTEC 2010: 87-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint