Loïc MILLER (Post Doc)
Contact
As anyone at the chair, you can reach me at surname@thisdomain.
My research
- EUR Cyberschool: Reflecting on the Benefits of Federated Learning for Large-Scale Network Incident Detection - June 8, 2023
- “Blockchain for Collaborative Cybersecurity” – Our PostDoc Loïc Miller talks at the EUR Cyberschool - June 7, 2023
- Salim-Amine BOU ARAM is becoming a reviewer for IETF Interne Area Directorate group - April 10, 2023
My publications
2021
CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks Proceedings Article
In: VR4Sec 2021 (Security for XR and XR for Security), 2021.
Detecting and Preventing Faked Mixed Reality Proceedings Article
In: 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 399–405, IEEE 2021.
Cyber-physical anomaly detection for ICS Proceedings Article
In: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 950–955, IEEE 2021.
A priority-based domain type enforcement for exception management Proceedings Article
In: Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers 13, pp. 65–81, Springer International Publishing 2021.
Detecting and Preventing Faked Mixed Reality Proceedings Article
In: 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 399-405, 2021.
Metrics to enhance the resilience of cyber-physical systems Proceedings Article
In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1167–1172, IEEE 2021.
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics Journal Article
In: IEEE Access, vol. 9, pp. 46462–46475, 2021.
2020
Switched-based Resilient Control of Cyber-Physical Systems Journal Article
In: IEEE Access, 2020.
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article
In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.
Foundations and Practice of Security Book
Springer, 2020.
Reflective Attenuation of Cyber-Physical Attacks Proceedings Article
In: 5th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980, pp. 19–34, Springer, 2020.
Network functions virtualization access control as a service Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12122 LNCS, no. 1, pp. 100–117, 2020, ISSN: 16113349.
Resilience properties and metrics: how far have we gone? Journal Article
In: Journal of Surveillance, Security and Safety, pp. 119–139, 2020.
Group Key Management in constrained IoT Settings Proceedings Article
In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.
Ensuring consistency for asynchronous Group-Key management in the industrial IoT Proceedings Article
In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–5, IEEE 2020.
Lockdown: Balance availability attack against lightning network channels Proceedings Article
In: International Conference on Financial Cryptography and Data Security, pp. 245–263, Springer 2020.
A Real-Time Query Log Protection Method for Web Search Engines Journal Article
In: IEEE Access, vol. 8, pp. 87393–87413, 2020.
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things Proceedings Article
In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–10, ACM, 2020.
Stateful RORI-based countermeasure selection using hypergraphs Journal Article
In: Journal of Information Security and Applications, vol. 54, pp. 102562, 2020.
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition Proceedings Article
In: International Conference on Ad-Hoc Networks and Wireless, pp. 55–70, Springer 2020.
Data Privacy Management, Cryptocurrencies and Blockchain Technology Book
Springer, 2020.
2020 4th Cyber Security in Networking Conference, CSNet 2020 Book
IEEE, 2020, ISBN: 978-1-6654-0458-7.
Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report) Technical Report
2020.
Cyber-Resilience Evaluation of Cyber-Physical Systems Proceedings Article
In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1–8, IEEE 2020.
Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures Proceedings Article
In: Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers, pp. 137–146, Springer, 2020.
Anonymous proof-of-asset transactions using designated blind signatures Technical Report
2020.
A Mixed-Interaction Critical Infrastructure Honeypot Journal Article
In: European Cyber Week CAESAR, 2020, Rennes, France, 2020.
Watch out! Doxware on the way $łdots$ Journal Article
In: Journal of information security and applications, vol. 55, pp. 102668, 2020.
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism Proceedings Article
In: International Conference on the Quality of Information and Communications Technology, pp. 332–342, Springer 2020.
Using Deep Learning to Replace Domain Knowledge Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Pattern Matching on Encrypted Data Journal Article
In: IACR Cryptol, pp. 1–28, 2020.
Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study Proceedings Article
In: Lecture Notes in Computer Science, pp. 82–101, 2020, ISSN: 16113349.
Ransomware Network Traffic Analysis for Pre-encryption Alert Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12056 LNCS, pp. 20–38, 2020, ISSN: 16113349.
Open-Source OPC UA Security and Scalability Journal Article
In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.
An extensible IoT Security Taxonomy Proceedings Article
In: IEEE ISCC 2020, 2020.
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
A mixed-interaction critical infrastructure honeypot Journal Article
In: European Cyber Week CAESAR, 2020.
Open-source OPC UA security and scalability Proceedings Article
In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 262–269, IEEE 2020.
Towards an extensible IoT security taxonomy Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
Group key management in constrained IoT settings Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
Using deep learning to replace domain knowledge Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
iLab@ Home: Hands-On Networking Classes without Lab Access Proceedings Article
In: Sigcomm 2020 Education, 2020.
2019
Multi-Tenant IoT Service Management towards an IoT App Economy Proceedings Article
In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1–4, IFIP/IEEE IFIP/IEEE, 2019.
A Study on Mitigation Techniques for SCADA-driven Cyber-Physical Systems Proceedings Article
In: Foundations and Practice of Security (FPS 2018), pp. 257–264, Springer, 2019.
Geocaching-inspired Resilient Path Planning for Drone Swarms Proceedings Article
In: IEEE Conference on Computer Communications (IEEE INFOCOM 2019) Workshops, pp. 620-625, 2019, ISSN: null.