default search action
Guillaume Auriol
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. AsiaCCS 2024 - [c18]Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche:
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. DIMVA 2024: 525-544 - 2021
- [j6]Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. ACM Trans. Cyber Phys. Syst. 5(3): 24:1 (2021) - [c17]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. DSN 2021: 376-387 - [c16]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. DSN 2021: 388-399 - [c15]Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, Guillaume Auriol:
A defensive man-in-middle approach to filter BLE packets. WISEC 2021: 365-367 - [c14]Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. WISEC 2021: 386-388 - 2020
- [c13]Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
A PSD-based fingerprinting approach to detect IoT device spoofing. PRDC 2020: 40-49
2010 – 2019
- 2019
- [c12]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato:
Mirage: Towards a Metasploit-Like Framework for IoT. ISSRE 2019: 261-270 - 2018
- [c11]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. NCA 2018: 1-8 - [i1]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. CoRR abs/1811.03934 (2018) - 2017
- [c10]Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - 2016
- [j5]Vikas Shukla, Guillaume Auriol, Keith W. Hipel:
Multicriteria Decision-Making Methodology for Systems Engineering. IEEE Syst. J. 10(1): 4-14 (2016) - 2013
- [j4]Xinwei Zhang, Guillaume Auriol, Hakki Eres, Claude Baron:
A prescriptive approach to qualify and quantify customer value for value-based requirements engineering. Int. J. Comput. Integr. Manuf. 26(4): 327-345 (2013) - [c9]Vikas Shukla, Guillaume Auriol:
Methodology for Determining Stakeholders' Criteria Weights in Systems Engineering. CSDM (Posters) 2013: 1-12 - [c8]Vikas Shukla, Guillaume Auriol:
Reinventing Goal-Based Requirements Modeling. CSDM (Posters) 2013: 13-24 - 2011
- [c7]Xinwei Zhang, Guillaume Auriol, Claude Baron:
A prescriptive approach to understand customer needs using value-focused thinking. IEEM 2011: 1314-1319 - 2010
- [j3]Guillaume Auriol, Claude Baron:
Ingénierie système. Exemple d'application d'une norme à la conception d'un modèle réduit de voilier. J. Decis. Syst. 19(1): 33-56 (2010) - [c6]Xinwei Zhang, Guillaume Auriol, Claude Baron:
Understanding Customer Expectations for System Development. ICSEA 2010: 44-49
2000 – 2009
- 2008
- [c5]Stéphanie Gaudan, Gilles Motet, Guillaume Auriol:
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager. EDCC 2008: 13-24 - [c4]Guillaume Auriol, Claude Baron, Jean-Yves Fourniols:
Teaching requirements skills within the context of a physical engineering project. REET 2008: 6-11 - 2006
- [c3]Christophe Chassot, André Lozes, Florin Racaru, Guillaume Auriol:
A user-based approach for the choice of the IP services in the multi domains DiffServ Internet. AINA (2) 2006: 565-572 - 2004
- [b1]Guillaume Auriol:
Specification et implementation d'une architecture de signalisation a gestion automatique de la QdS dans un environnement IP multi domaines. INSA Toulouse, France, 2004 - [j2]Emmanuel Lochin, Pascal Anelli, Serge Fdida, Fabien Garcia, Guillaume Auriol, Christophe Chassot, André Lozes:
Évaluation de la différenciation de services dans l'internet. Tech. Sci. Informatiques 23(5-6): 675-699 (2004) - [j1]Guillaume Auriol, Christophe Chassot, Michel Diaz:
Architecture de communication à gestion automatique de la QdS en environnement IP à services différenciés. Tech. Sci. Informatiques 23(9): 1137-1159 (2004) - 2003
- [c2]Christophe Chassot, Guillaume Auriol, Michel Diaz:
Automatic Management of the QoS within an Architecture Integrating New Transport and IP Services in a DiffServ Internet. MMNS 2003: 286-299 - 2002
- [c1]Christophe Chassot, Francisco J. García, Guillaume Auriol, André Lozes, Emmanuel Lochin, Pascal Anelli:
Performance analysis for an IP Differentiated Services network. ICC 2002: 976-980
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint