Parties d'ouvrages collectifs (6)

  1. 1. Busanelli, S., Ferrari, G. L., Colazzo, A., & Dricot, J.-M. (2014). Time-domain cognitive sensor networking. In Cognitive Networks: Applications and Deployments (pp. 147-169). CRC Press. doi:10.1201/b17877
  2. 2. Dricot, J.-M., Rinaudo, R., Ferrari, G. G. F., Van Roy, S., De Doncker, P., & Nonclercq, A. (2013). QoS and routing performance evaluation for IEEE 802.15.6 body sensor networks using accurate physical layer. In I. M. M. El Emary & S. Ramakrishnan (Eds.), Wireless sensor networks: theory and application.
  3. 3. Dricot, J.-M., Bontempi, G., & De Doncker, P. (2009). Static and dynamic localization techniques for wireless sensor networks. In Static and dynamic localization techniques for wireless sensor networks: where theory meets practice (pp. 249-281). Springer.(Sensor Networks).
  4. 4. Dricot, J.-M., Bontempi, G., & De Doncker, P. (2009). Static and dynamic localization techniques. In G. G. F. Ferrari (Ed.), Sensor networks: where theory meets practice.
  5. 5. Dricot, J.-M., Ferrari, G. G. F., & De Doncker, P. (2009). Cross-layering between physical layer and routing in wireless ad-hoc networks. In Communications in computer and information science (pp. 324-333).
  6. 6. Le Borgne, Y.-A., Dricot, J.-M., & Bontempi, G. (2008). Principal component aggregation for energy efficient information extraction in wireless sensor networks. In Knowledge Discovery from Sensor Data (pp. 55-80). Boca Raton: Taylor and Francis/CRC Press.
  7.   Articles dans des revues avec comité de lecture (39)

  8. 1. Debicha, I., Kenaza, T., & Dricot, J.-M. (2026). Targeted adversarial traffic generation: black-box approach to evade intrusion detection systems in IoT networks. International Journal of Machine Learning and Cybernetics, 17(58).
  9. 2. Austa, C., Mühlberg, J. T., & Dricot, J.-M. (2026). Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. Lecture notes in computer science, 16055 LNCS, 23-42. doi:10.1007/978-3-032-07894-0_2
  10. 3. Markowitch, O., & Dricot, J.-M. (2025). IoT Security: Threat Detection, Analysis, and Defense. Future Internet, 17(9), 399. doi:10.3390/fi17090399
  11. 4. Debicha, I., Cochez, B., Kenaza, T., Debatty, T., Dricot, J.-M., & Mees, W. (2023). Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems. Computers & security. doi:10.1016/j.cose.2023.103176
  12. 5. Debicha, I., Bauwens, R., Debatty, T., Dricot, J.-M., Kenaza, T., & Mees, W. (2022). TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future generations computer systems. doi:10.1016/j.future.2022.08.011
  13. 6. Hue, A., Sharma, G., & Dricot, J.-M. (2022). Privacy-Enhanced MQTT Protocol for Massive IoT. Electronics (Switzerland), 11(1), 70. doi:10.3390/electronics11010070

  14. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Suivant >>