{"id":22,"date":"2015-06-15T11:01:33","date_gmt":"2015-06-15T09:01:33","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=22"},"modified":"2015-10-22T14:44:38","modified_gmt":"2015-10-22T12:44:38","slug":"projets","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/beckf\/projets\/","title":{"rendered":"Projets"},"content":{"rendered":"<p class=\"p1\"><strong><span style=\"line-height: 1.5\">High Security Laboratory (HSL, LHS = Laboratoire de Haute s\u00e9curit\u00e9 in french)<\/span><\/strong><\/p>\n<p class=\"p1\"><span style=\"line-height: 1.5\">Placed in an enclosed environment with an insulated Internet network and with access protected by biometric recognition, the <a href=\"http:\/\/www.lhs.loria.fr\" target=\"_blank\">HSL<\/a>\u00a0offers a reliable technological and regulatory framework for conducting sensitive tests and operations. It has been designed for guaranteeing the security of the data, phenomena and equipment being analysed.<\/span><\/p>\n<p class=\"p1\">Our scientific and technical domains of investigation are :<\/p>\n<ul>\n<li>Virology and malware analysis.\n<ul>\n<li>Malware database (more than 6M malwares)<\/li>\n<\/ul>\n<\/li>\n<li>Network attacks and malware capture.\n<ul>\n<li>Attack database (more than 5 years of network attacks).<\/li>\n<\/ul>\n<\/li>\n<li>Cryptographic systems\n<ul>\n<li>electronic voting<\/li>\n<li>Key escrow,<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<\/li>\n<li>Secure hosting\n<ul>\n<li>Safes and cryptographic vaults,<\/li>\n<\/ul>\n<\/li>\n<li>SCADA security\n<ul>\n<li>Machine learning of topology, Scada IPS&#8230;<\/li>\n<\/ul>\n<\/li>\n<li>\u00a0Mobile security\n<ul>\n<li>Android security monitoring (OVAL)<\/li>\n<li>Application and user behavior<\/li>\n<\/ul>\n<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<p>Please <a title=\"Contact Us\" href=\"http:\/\/www.lhs.loria.fr\/wp\/?page_id=2\">contact us<\/a> for more informations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>High Security Laboratory (HSL, LHS = Laboratoire de Haute s\u00e9curit\u00e9 in french) Placed in an enclosed environment with an insulated Internet network and with access protected by biometric recognition, the HSL\u00a0offers a reliable technological and regulatory framework for conducting sensitive tests and operations. It has been designed for guaranteeing the security of the data, phenomena [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-22","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":3,"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":189,"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/pages\/22\/revisions\/189"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/beckf\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}