Marc Lemercier

Learn More
Everyday more than fifty million messages are generated by about two hundred million profiles on Twitter. Some users attempt to exploit the success of this micro logging platform and its relative freedom to perform malicious actions that can lead to identity or data theft. This work aims to propose a framework to assess suspicious behavior on Twitter. We(More)
Nowadays smartphones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. This paper focus on the aggregation of a popular probabilistic model: the Gaussian mixture(More)
During the sudden catastrophic events that have occurred in this last decade, social media have proven their importance in the creation and management of ad-hoc crisis communities. These platforms are increasingly used as complementary support tools for conventional crisis management teams. Recent disasters (e.g. Haiti, Australia, Japan, Mexico, etc.) have(More)
1Tech-CICO, Université de Technologie de Troyes 12 rue Marie Curie, BP. 2060, 10010 Troyes Cedex, France e-mail: 2 LASMIS, Université de Technologie de Troyes 12 rue Marie Curie, BP. 2060, 10010 Troyes Cedex, France e-mail: {benoit.eynard, lionel.roucoules} 3 LM2S, Université de Technologie de Troyes 12 rue Marie Curie, BP. 2060,(More)
The number of smartphone users has increased significantly over the last decade. The number of people using social networking sites is also increasing, and these platforms offer many features through which individuals can communicate with their contacts. The digital sphere is an opportunity for communication, but it is also an unprecedented arena for(More)
Social networking services (SNS) have increased in popularity over the last decade. They have become major platforms for e-commerce, personal branding, socialization and information. The success of social networking services like Facebook and Twitter as well as LinkedIn, LiveJournal andFoursquare and the variety of their usages leads their users to create a(More)
Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to(More)
The convergence of mobile and online social network technologies has led to the emergence of mobile social applications available through stores for mobile devices. Nowadays, one can observe the proliferation of mobile social networks and the diversity of digital profiles for a unique person. In this work, we propose to model the multiple facets of one(More)