NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures M Pattaranantakul, R He, Q Song, Z Zhang, A Meddahi IEEE Communications Surveys & Tutorials 20 (4), 3330-3368, 2018 | 137 | 2018 |
System for supervising the security of an architecture R He, M Lacoste, A Wailly US Patent 9,380,075, 2016 | 84 | 2016 |
Secmano: Towards network functions virtualization (nfv) based security management and orchestration M Pattaranantakul, R He, A Meddahi, Z Zhang 2016 IEEE Trustcom/BigDataSE/ISPA, 598-605, 2016 | 75 | 2016 |
Controller DAC: Securing SDN controller with dynamic access control Y Tseng, M Pattaranantakul, R He, Z Zhang, F Naït-Abdesselam 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 53 | 2017 |
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models M Compastié, R Badonnel, O Festor, R He Computers & Security 97, 101905, 2020 | 52 | 2020 |
Think: View-based support of non-functional properties in embedded systems M Anne, R He, T Jarboui, M Lacoste, O Lobry, G Lorant, M Louvel, ... 2009 International Conference on Embedded Software and Systems, 147-156, 2009 | 43 | 2009 |
A first step towards security extension for NFV orchestrator M Pattaranantakul, Y Tseng, R He, Z Zhang, A Meddahi Proceedings of the ACM International Workshop on Security in Software …, 2017 | 32 | 2017 |
A policy management framework for self-protection of pervasive systems R He, M Lacoste, J Leneutre 2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010 | 28 | 2010 |
Applying component-based design to self-protection of ubiquitous systems R He, M Lacoste Proceedings of the 3rd ACM workshop on Software engineering for pervasive …, 2008 | 28 | 2008 |
Putting together QoS and security in autonomic pervasive systems M Alia, M Lacoste, R He, F Eliassen Proceedings of the 6th ACM workshop on QoS and security for wireless and …, 2010 | 25 | 2010 |
Leveraging network functions virtualization orchestrators to achieve software-defined access control in the clouds M Pattaranantakul, R He, Z Zhang, A Meddahi, P Wang IEEE Transactions on Dependable and Secure Computing 18 (1), 372-383, 2018 | 24 | 2018 |
Method and a server for processing a request from a terminal to access a computer resource R He, X Qian US Patent App. 14/313,993, 2014 | 20 | 2014 |
Method for processing access requests and web browser R He, J Chawki US Patent 10,999,405, 2021 | 19 | 2021 |
A component-based policy-neutral architecture for kernel-level access control M Lacoste, T Jarboui, R He annals of telecommunications-annales des télécommunications 64, 121-146, 2009 | 19 | 2009 |
Unikernel-based approach for software-defined security in cloud infrastructures M Compastié, R Badonnel, O Festor, R He, M Kassi-Lahlou NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2018 | 18 | 2018 |
Method of authenticating a terminal by a gateway of an internal network protected by an access security entity providing secure access R He, J Chawki US Patent 10,356,612, 2019 | 16 | 2019 |
A tosca-oriented software-defined security approach for unikernel-based protected clouds M Compastié, R Badonnel, O Festor, R He 2019 IEEE Conference on Network Softwarization (NetSoft), 151-159, 2019 | 16 | 2019 |
Model uncertainty based annotation error fixing for web attack detection X Gong, J Lu, Y Zhou, H Qiu, R He Journal of Signal Processing Systems 93, 187-199, 2021 | 15 | 2021 |
An effective feature representation of web log data by leveraging byte pair encoding and TF-IDF J Zhan, X Liao, Y Bao, L Gan, Z Tan, M Zhang, R He, J Lu Proceedings of the ACM Turing Celebration Conference-China, 1-6, 2019 | 15 | 2019 |
CECoR-Net: A character-level neural network model for web attack detection X Gong, J Lu, Y Wang, H Qiu, R He, M Qiu 2019 IEEE International Conference on Smart Cloud (SmartCloud), 98-103, 2019 | 14 | 2019 |