Pierre BERNAS, Guillaume NEE et Philippe DRABCZUK
Peaceful Monitoring of Crowds : article, presentation
Christian HORN, Matthias BLANKENBURG and Jorg KRUGER
Automated Detection of Counterfeit Consumer Goods using Product Inherent Features : article
Patrick LALLEMENT
The cybercrime process: an overview of scientific challenges and methods : article
Vincent LEMOINE, Charles PEREZ, Marc LEMERCIER, Pierre VITARD, Virginie BENSOUSSAN-BRULE, Alain CORPEL, Rida KHATOUN et Babiga BIRREGAH
Protection des infrastructures informatiques des entreprises face à la cybercriminalité : article, presentation
Radoniaina ANDRIATSIMANDEFITRA, Valérie VIÊT TRIÊM TONG and Ludovic MÉ
Diagnosing intrusions in Android operating system using system flow graph : article, presentation
Emmanuel MICONNET, Olivier BETTAN, Daniel GIDOIN et Eric JOUENNE
Un exemple d'usage des graphes d'attaques pour l'évaluation dynamique des risques en cyber-sécurité : article, presentation
Jens POTTEBAUM, Robin MARTERER and Rainer KOCH
An event driven approach to bridge emergency management, reflective debriefing and experience based learning : article
Muriel RAMBOUR
La sécurité des citoyens par la protection des victimes de la criminalité dans l'Union européenne : article, presentation
Paul-Henri RICHARD et Patrick LACLEMENCE
Ville intelligente et sécurité globale. Convergences, avantages et limites pour de nouveaux paradigmes. Focus sur la gestion des crises de sécurité civile. Article, presentation
Sylvie SAUVAIGO, Violaine CHAPUIS, Sylvain CAILLAT, Fanny SARRAZY and Jean BRETON
Biodosimetry for radiation-exposed individuals : article, presentation
Ngoc-Son VU, Siméon SCHWAB, Pierre BOUGES, Xavier NATUREL, Christophe BLANC, Thierry CHATEAU and Laurent TRASSOUDAINE
Face Recognition for Video Security Applications : article
Sébastien LARINIER et Solal JACOB
L'investigation numérique "libre" : article, presentation
Jan-Peter NICKLAS, Nadine SCHLÜTER and Petra WINZER
Safety and Security in Public Mass Transportation – the ESY - Guide as a permanent measurement concept
Samir HACHOUR, François DELMOTTE, Eric LEFEVRE and David MERCIER
Tracking and Identification of Multiple targets
Mohamed SEDIRI, Nada MATTA, Sophie LORIETTE and Alain HUGEROT
Handling experience feedback on crisis management for decision support
José SANCHEZ, Raphaël CAIRE and Nouredine HADJSAID
Towards a Complex Networks Modeling of Interdependent Critical Infrastructures
Emeric UMBDENSTOCK, Frank SCHÄFER, Martin KLEINSTEUBER and Hagen MEYER
Wake-Up-Receiver in energy efficient Wireless Sensor Networks for security applications
Christophe DUHAMEL, Eric CHATELET, Andréa Cynthia SANTOS and Babiga BIRREGAH
An optimization model for the post-disaster response in terms of system resilience
C. LE VOT, H. MESTDAGH, M. HENINGER, P. BOISSEL, G. MAUCLAIRE and J. LEMAIRE
Mass spectrometry for the identification of toxic compounds in air
Eric RIGAUD and Thomas COTE
Toward a framework dedicated to the anticipation of consequences of a new technological system on safety performance
Guy PANAGET, DESCARTES
a new concept for Crisis Management