Follow
Nicolas Prigent
Nicolas Prigent
Chief Scientist - LSTI
Verified email at lsti.fr
Title
Cited by
Cited by
Year
Method for the discovery of devices connected to an IP network and device to carry out said method
N Prigent, O Heen, Y Maetz, C Salmon-Legagneur, YM Tang-Talpin
US Patent App. 11/082,562, 2005
1002005
Percival: proactive and reactive attack and response assessment for cyber incidents using visual analytics
M Angelini, N Prigent, G Santucci
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2015
732015
Challenges in peer-to-peer gaming
C Neumann, N Prigent, M Varvello, K Suh
ACM SIGCOMM Computer Communication Review 37 (1), 79-82, 2007
692007
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system
N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux
US Patent 7,676,836, 2010
592010
Elvis: Extensible log visualization
C Humphries, N Prigent, C Bidan, F Majorczyk
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 9-16, 2013
502013
Sec2graph: Network attack detection based on novelty detection on graph structured data
L Leichtnam, E Totel, N Prigent, L Mé
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
422020
Secure long term communities in ad hoc networks
N Prigent, C Bidan, JP Andreaux, O Heen
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor …, 2003
342003
Starlord: Linked security data exploration in a 3d graph
L Leichtnam, E Totel, N Prigent, L Mé
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2017
232017
A privacy preserving distributed reputation mechanism
E Anceaume, G Guette, P Lajoie-Mazenc, N Prigent, VVT Tong
2013 IEEE International Conference on Communications (ICC), 1951-1956, 2013
222013
Corgi: Combination, organization and reconstruction through graphical interactions
C Humphries, N Prigent, C Bidan, F Majorczyk
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 57-64, 2014
162014
Amores: an architecture for mobiquitous resilient systems
C Artigues, Y Deswarte, J Guiochet, MJ Huguet, MO Killijian, D Powell, ...
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous …, 2012
152012
Compressed video stream watermarking for peer-to-peer based content distribution network
D Zou, N Prigent, J Bloom
2009 IEEE International Conference on Multimedia and Expo, 1390-1393, 2009
142009
Homomorphic cryptography-based privacy-preserving network communications
A Guellier, C Bidan, N Prigent
Applications and Techniques in Information Security: 5th International …, 2014
132014
Method for secure transfer of multiple small messages
A Kashyap, J Schmid, NFE Prigent, D Li, S Mathur
US Patent App. 13/138,758, 2012
132012
An industrial and academic joint experiment on automated verification of a security protocol
O Heen, T Genet, S Geller, N Prigent
Mobile and Wireless Networks Security, 39-53, 2008
132008
Secure public cloud platform for medical images sharing.
W Pan, G Coatrieux, D Bouslimi, N Prigent
Studies in health technology and informatics 210, 251-255, 2015
112015
Forensic analysis of network attacks: Restructuring security events as graphs and identifying strongly connected sub-graphs
L Leichtnam, E Totel, N Prigent, L Mé
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
92020
Enhancing collaboration between security analysts in security operations centers
D Crémilleux, C Bidan, F Majorczyk, N Prigent
Risks and Security of Internet and Systems: 13th International Conference …, 2019
72019
VEGAS: Visualizing, exploring and grouping alerts
D Crémilleux, C Bidan, F Majorczyk, N Prigent
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1097-1100, 2016
62016
Device and method using non-cycle accurate measurements for discovering emulated clients
O Heen, E Diehl, A Durand, M Karroumi, N Prigent
US Patent 9,137,248, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20