Hugo BOURREAU (PhD Student)

Contact

You can reach me at hugo.bourreau@imt-atlantique.fr.

My research

Hugo Bourreau
Latest posts by Hugo Bourreau (see all)

    My publications

    Show all

    2021

    Delcombel, Nicolas; Kabil, Alexandre; Duval, Thierry; Pahl, Marc-Oliver

    CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks Workshop

    2021.

    Abstract | BibTeX | Tags: Cybersecurity, Security, Virtual reality, Visual analytics, Visualization, Visualization application domains

    2020

    Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora

    PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article

    In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.

    Abstract | Links | BibTeX | Tags: countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security

    Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc Oliver; Carle, Georg

    Open-Source OPC UA Security and Scalability Journal Article

    In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.

    Abstract | Links | BibTeX | Tags: OPC UA, open-source, scalability, Security

    Navas, Renzo E; Sandaker, Håkon; Cuppens, Frédéric; Cuppens, Nora; Toutain, Laurent; Papadopoulos, Georgios Z

    IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article

    In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.

    Abstract | Links | BibTeX | Tags: attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher

    Piccoli, A; Pahl, M-O; Wüstrich, L

    Group Key Management in constrained IoT Settings Proceedings Article

    In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.

    Abstract | Links | BibTeX | Tags: autonomous management, constrained nodes, group key management, IoT, reliability, Security

    2019

    Pahl, Marc Oliver; Donini, Lorenzo

    Giving IoT services an identity and changeable attributes Journal Article

    In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019, no. section II, pp. 455–461, 2019, ISBN: 9783903176157.

    Abstract | BibTeX | Tags: Autonomous service management, Certificates, IoT, Metadata, Microservices, Security, Unattended nodes, X.509

    2018

    Kome, Marco Lobe; Cuppens, Frederic; Cuppens-Boulahia, Nora; Frey, Vincent

    CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article

    In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.

    Abstract | Links | BibTeX | Tags: CoAP, Discovery, IoT, Publish/Subscribe, Security

    Rooney, Vivien M; Foley, Simon N

    What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article

    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11252 LNCS, pp. 219–235, 2018, ISSN: 16113349.

    Abstract | Links | BibTeX | Tags: CSIRT Human experience, psychology, Security, SOC

    Pahl, Marc Oliver; Donini, Lorenzo

    Securing IoT microservices with certificates Journal Article

    In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.

    Abstract | Links | BibTeX | Tags: Autonomous certificate management, Certificates, IoT, Microservices, Security, Unattended nodes, X.509

    Pahl, Marc Oliver; Aubet, François Xavier; Liebald, Stefan

    Graph-based IoT microservice security Journal Article

    In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.

    Abstract | Links | BibTeX | Tags: Autonomous service management, firewall, IoT, Mi-croservices, Passive monitoring, Security, Unattended nodes

    2017

    Foley, Simon N

    Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

    Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

    Foley, Simon N

    Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

    Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

    Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

    DIscovery and registration protocol: For device and person identity management in IoT Journal Article

    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10717 LNCS, pp. 243–262, 2017, ISSN: 16113349.

    Abstract | Links | BibTeX | Tags: Identity management, IoT, MQTT, OAuth, Security