Loïc MILLER (Post Doc)
Contact
As anyone at the chair, you can reach me at surname@thisdomain.
My research
- EUR Cyberschool: Reflecting on the Benefits of Federated Learning for Large-Scale Network Incident Detection - June 8, 2023
- “Blockchain for Collaborative Cybersecurity” – Our PostDoc Loïc Miller talks at the EUR Cyberschool - June 7, 2023
- Salim-Amine BOU ARAM is becoming a reviewer for IETF Interne Area Directorate group - April 10, 2023
My publications
2021
Authenticating IDS autoencoders using multipath neural networks Proceedings Article
In: 2021 5th Cyber Security in Networking Conference (CSNet), pp. 1–9, IEEE 2021.
Federated security approaches for IT and OT Proceedings Article
In: SSLR 2021-Journée thématique du GT sur la Sécurité des Systèmes, Logiciels et Réseaux, pp. 1–2, 2021.
Advances in ml-based anomaly detection for the iot Proceedings Article
In: 2021 5th Cyber Security in Networking Conference (CSNet), pp. 18–22, IEEE 2021.
The quantum what? advantage, utopia or threat? Journal Article
In: Digitale Welt, vol. 5, no. 1, pp. 34–39, 2021.
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming Journal Article
In: Computer Networks, vol. 187, pp. 107751, 2021.
Decentralized Cross-commodity Energy Management (DECENT): Abschlussbericht: Förderungszeitraum von/bis: 1.9. 2018-31.03. 2021 Miscellaneous
2021.
Towards cross-commodity energy-sharing communities–A review of the market, regulatory, and technical situation Journal Article
In: Renewable and Sustainable Energy Reviews, vol. 151, pp. 111568, 2021.
Pipeline for crowdsourced iot data-modeling with ai-supported convergence Proceedings Article
In: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 702–706, IEEE 2021.
Feature-based comparison of open source OPC-UA implementations Journal Article
In: 2021.
A Priority-Based Domain Type Enforcement for Exception Management Proceedings Article
In: Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers, pp. 65, Springer Nature 2021.
Open-source mqtt evaluation Proceedings Article
In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4, IEEE 2021.
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT Journal Article
In: IEEE Internet of Things Journal, vol. 8, no. 10, pp. 7818–7832, 2021, ISSN: 23274662.
A Posteriori Analysis of Policy Temporal Compliance Proceedings Article
In: Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers 15, pp. 133–148, Springer International Publishing 2021.
2020
Switched-based Resilient Control of Cyber-Physical Systems Journal Article
In: IEEE Access, 2020.
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article
In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.
Foundations and Practice of Security Book
Springer, 2020.
Reflective Attenuation of Cyber-Physical Attacks Proceedings Article
In: 5th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980, pp. 19–34, Springer, 2020.
Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study Proceedings Article
In: Lecture Notes in Computer Science, pp. 82–101, 2020, ISSN: 16113349.
iLab@ Home: Hands-On Networking Classes without Lab Access Proceedings Article
In: Sigcomm 2020 Education, 2020.
A Mixed-Interaction Critical Infrastructure Honeypot Journal Article
In: European Cyber Week CAESAR, 2020, Rennes, France, 2020.
Ensuring consistency for asynchronous Group-Key management in the industrial IoT Proceedings Article
In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–5, IEEE 2020.
Lockdown: Balance availability attack against lightning network channels Proceedings Article
In: International Conference on Financial Cryptography and Data Security, pp. 245–263, Springer 2020.
A Real-Time Query Log Protection Method for Web Search Engines Journal Article
In: IEEE Access, vol. 8, pp. 87393–87413, 2020.
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things Proceedings Article
In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–10, ACM, 2020.
Stateful RORI-based countermeasure selection using hypergraphs Journal Article
In: Journal of Information Security and Applications, vol. 54, pp. 102562, 2020.
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition Proceedings Article
In: International Conference on Ad-Hoc Networks and Wireless, pp. 55–70, Springer 2020.
Data Privacy Management, Cryptocurrencies and Blockchain Technology Book
Springer, 2020.
2020 4th Cyber Security in Networking Conference, CSNet 2020 Book
IEEE, 2020, ISBN: 978-1-6654-0458-7.
Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report) Technical Report
2020.
Cyber-Resilience Evaluation of Cyber-Physical Systems Proceedings Article
In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1–8, IEEE 2020.
Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures Proceedings Article
In: Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers, pp. 137–146, Springer, 2020.
Anonymous proof-of-asset transactions using designated blind signatures Technical Report
2020.
An extensible IoT Security Taxonomy Proceedings Article
In: IEEE ISCC 2020, 2020.
Open-Source OPC UA Security and Scalability Journal Article
In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.
Ransomware Network Traffic Analysis for Pre-encryption Alert Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12056 LNCS, pp. 20–38, 2020, ISSN: 16113349.
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Pattern Matching on Encrypted Data Journal Article
In: IACR Cryptol, pp. 1–28, 2020.
Network functions virtualization access control as a service Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12122 LNCS, no. 1, pp. 100–117, 2020, ISSN: 16113349.
Resilience properties and metrics: how far have we gone? Journal Article
In: Journal of Surveillance, Security and Safety, pp. 119–139, 2020.
Group Key Management in constrained IoT Settings Proceedings Article
In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.
Using Deep Learning to Replace Domain Knowledge Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
A mixed-interaction critical infrastructure honeypot Journal Article
In: European Cyber Week CAESAR, 2020.
Watch out! Doxware on the way $łdots$ Journal Article
In: Journal of information security and applications, vol. 55, pp. 102668, 2020.
Group key management in constrained IoT settings Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism Proceedings Article
In: International Conference on the Quality of Information and Communications Technology, pp. 332–342, Springer 2020.
Open-source OPC UA security and scalability Proceedings Article
In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 262–269, IEEE 2020.
Towards an extensible IoT security taxonomy Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
Using deep learning to replace domain knowledge Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.