Articles dans des revues avec comité de lecture (35)

  1. 31. Panahandeh, A., Quitin, F., Dricot, J.-M., Horlin, F., Oestges, C., & De Doncker, P. (2010). Multi-polarized channel statistics for outdoorto- indoor and indoor-to-indoor channels. IEEE VTS ... Vehicular Technology Conference. doi:10.1109/VETECS.2010.5494107
  2. 32. Dricot, J.-M., Ferrari, G. L., & De Doncker, P. (2009). Cross-layering between physical layer and routing in wireless ad-hoc networks. Communications in computer and information science, 56, 324-333. doi:10.1007/978-3-642-10844-0_39
  3. 33. De Doncker, P., Dricot, J.-M., Meys, R., & Tabbara, W. (2006). Electromagnetic fields estimation using spatial statistics. Electromagnetics, 26, 111-122. doi:10.1080/02726340500486450
  4. 34. Gutierrez Fernandez, M. A., De Doncker, P., Dricot, J.-M., & Grenez, F. (2005). WLAN deployment strategy for best indoor performance. Revue HF, 1, 81.
  5. 35. Delangre, O., De Doncker, P., Dricot, J.-M., Meys, R., & Grenez, F. (2004). Etude des performances des réseaux WLAN en milieu indoor. Revue HF, 2, 27.
  6.   Communications publiées lors de congrès ou colloques nationaux et internationaux (77)

  7. 1. Daubry, W., Dricot, J.-M., & Henneaux, P. (2023). Decentralized group authentication with membership verification in islanded smart grids. 2023 12th Mediterranean Conference on Embedded Computing (MECO) MecoConference - CPSIoT 2023(06-10 June 2023: Budva, Montenegro) doi:10.1109/MECO58584.2023.10155090
  8. 2. Debicha, I., Debatty, T., Dricot, J.-M., Mees, W., & Kenaza, T. (2022). Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems. In Springer. doi:https://doi.org/10.1007/978-981-16-8059-5_20
  9. 3. Sabot, F., Henneaux, P., Labeau, P.-E., & Dricot, J.-M. (2022). Impact of the reliability of ICT systems on power systems with system integrity protection schemes.
  10. 4. Sharma, G., Verstraeten, D., Saraswat, V., Dricot, J.-M., & Markowitch, O. (2021). Anonymous Fair Auction on Blockchain. 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)(19-21 April 2021: Paris) doi:10.1109/NTMS49979.2021.9432664
  11. 5. Debicha, I., Debatty, T., Dricot, J.-M., & Mees, W. (2021). Adversarial Training for Deep Learning-based Intrusion Detection Systems. (pp. 45-49) The Sixteenth International Conference on Systems (ICONS 2021)(18th-22th April, 2021).
  12. 6. Ellinidou, S., Sharma, G., Markowitch, O., Gogniat, G., & Dricot, J.-M. (2020). A novel Network-on-Chip security algorithm for tolerating Byzantine faults. In 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT): Vol. 1 (pp. 1-6) IEEE.
  13. 7. Debicha, I., Debatty, T., Mees, W., & Dricot, J.-M. (2020). Efficient Intrusion Detection Using Evidence Theory. The Twelfth International Conference on Evolving Internet (INTERNET 2020)(18th-22th October, 2020)

  14. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Suivant >>