Mathis DURAND (PhD Student)
Contact
As anyone at the chair, you can reach me at surname@thisdomain.
My research
- Welcome Mathis Durand! - January 31, 2024
My publications
2021
Larsen, Raphaël MJI; Pahl, Marc-Oliver; Coatrieux, Gouenou
Authenticating IDS autoencoders using multipath neural networks Proceedings Article
In: 2021 5th Cyber Security in Networking Conference (CSNet), pp. 1–9, IEEE 2021.
BibTeX | Tags:
@inproceedings{larsen2021authenticating,
title = {Authenticating IDS autoencoders using multipath neural networks},
author = {Rapha\"{e}l MJI Larsen and Marc-Oliver Pahl and Gouenou Coatrieux},
year = {2021},
date = {2021-01-01},
booktitle = {2021 5th Cyber Security in Networking Conference (CSNet)},
pages = {1\textendash9},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lavaur, Léo; Pahl, Marc-Oliver; Busnel, Yann; Autrel, Fabien
Federated security approaches for IT and OT Proceedings Article
In: SSLR 2021-Journée thématique du GT sur la Sécurité des Systèmes, Logiciels et Réseaux, pp. 1–2, 2021.
BibTeX | Tags:
@inproceedings{lavaur2021federated,
title = {Federated security approaches for IT and OT},
author = {L\'{e}o Lavaur and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel},
year = {2021},
date = {2021-01-01},
booktitle = {SSLR 2021-Journ\'{e}e th\'{e}matique du GT sur la S\'{e}curit\'{e} des Syst\`{e}mes, Logiciels et R\'{e}seaux},
pages = {1\textendash2},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lübben, Christian; Pahl, Marc-Oliver
Advances in ml-based anomaly detection for the iot Proceedings Article
In: 2021 5th Cyber Security in Networking Conference (CSNet), pp. 18–22, IEEE 2021.
BibTeX | Tags:
@inproceedings{lubben2021advances,
title = {Advances in ml-based anomaly detection for the iot},
author = {Christian L\"{u}bben and Marc-Oliver Pahl},
year = {2021},
date = {2021-01-01},
booktitle = {2021 5th Cyber Security in Networking Conference (CSNet)},
pages = {18\textendash22},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Barbeau, Michel; Beurier, Erwan; Garcia-alfaro, Joaquin; Kuang, Randy; Pahl, Marc-Oliver; Pastor, Dominique
The quantum what? advantage, utopia or threat? Journal Article
In: Digitale Welt, vol. 5, no. 1, pp. 34–39, 2021.
BibTeX | Tags:
@article{barbeau2021quantum,
title = {The quantum what? advantage, utopia or threat?},
author = {Michel Barbeau and Erwan Beurier and Joaquin Garcia-alfaro and Randy Kuang and Marc-Oliver Pahl and Dominique Pastor},
year = {2021},
date = {2021-01-01},
journal = {Digitale Welt},
volume = {5},
number = {1},
pages = {34\textendash39},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Navas, Renzo E; Cuppens, Frédéric; Cuppens, Nora Boulahia; Toutain, Laurent; Papadopoulos, Georgios Z
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming Journal Article
In: Computer Networks, vol. 187, pp. 107751, 2021.
BibTeX | Tags:
@article{navas2021physical,
title = {Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming},
author = {Renzo E Navas and Fr\'{e}d\'{e}ric Cuppens and Nora Boulahia Cuppens and Laurent Toutain and Georgios Z Papadopoulos},
year = {2021},
date = {2021-01-01},
journal = {Computer Networks},
volume = {187},
pages = {107751},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Pahl, Marc-Oliver; Wüstrich, Lars; Lübben, Christian
Decentralized Cross-commodity Energy Management (DECENT): Abschlussbericht: Förderungszeitraum von/bis: 1.9. 2018-31.03. 2021 Miscellaneous
2021.
BibTeX | Tags:
@misc{pahl2021decentralized,
title = {Decentralized Cross-commodity Energy Management (DECENT): Abschlussbericht: F\"{o}rderungszeitraum von/bis: 1.9. 2018-31.03. 2021},
author = {Marc-Oliver Pahl and Lars W\"{u}strich and Christian L\"{u}bben},
year = {2021},
date = {2021-01-01},
publisher = {Technische Universit\"{a}t M\"{u}nchen},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Paiho, Satu; Kiljander, Jussi; Sarala, Roope; Siikavirta, Hanne; Kilkki, Olli; Bajpai, Arpit; Duchon, Markus; Pahl, Marc-Oliver; Wüstrich, Lars; Lübben, Christian; others,
Towards cross-commodity energy-sharing communities–A review of the market, regulatory, and technical situation Journal Article
In: Renewable and Sustainable Energy Reviews, vol. 151, pp. 111568, 2021.
BibTeX | Tags:
@article{paiho2021towards,
title = {Towards cross-commodity energy-sharing communities\textendashA review of the market, regulatory, and technical situation},
author = {Satu Paiho and Jussi Kiljander and Roope Sarala and Hanne Siikavirta and Olli Kilkki and Arpit Bajpai and Markus Duchon and Marc-Oliver Pahl and Lars W\"{u}strich and Christian L\"{u}bben and others},
year = {2021},
date = {2021-01-01},
journal = {Renewable and Sustainable Energy Reviews},
volume = {151},
pages = {111568},
publisher = {Pergamon},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Pahl, Marc-Oliver; Bauer, Florian; Lüubben, Christian
Pipeline for crowdsourced iot data-modeling with ai-supported convergence Proceedings Article
In: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 702–706, IEEE 2021.
BibTeX | Tags:
@inproceedings{pahl2021pipeline,
title = {Pipeline for crowdsourced iot data-modeling with ai-supported convergence},
author = {Marc-Oliver Pahl and Florian Bauer and Christian L\"{u}ubben},
year = {2021},
date = {2021-01-01},
booktitle = {2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)},
pages = {702\textendash706},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc-Oliver; Waedt, Karl
Feature-based comparison of open source OPC-UA implementations Journal Article
In: 2021.
BibTeX | Tags:
@article{muhlbauer2021feature,
title = {Feature-based comparison of open source OPC-UA implementations},
author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc-Oliver Pahl and Karl Waedt},
year = {2021},
date = {2021-01-01},
publisher = {Gesellschaft f\"{u}r Informatik, Bonn},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Smine, Manel; Espes, David; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Pahl, Marc-Oliver
A Priority-Based Domain Type Enforcement for Exception Management Proceedings Article
In: Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers, pp. 65, Springer Nature 2021.
BibTeX | Tags:
@inproceedings{pahl2021priority,
title = {A Priority-Based Domain Type Enforcement for Exception Management},
author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Marc-Oliver Pahl},
year = {2021},
date = {2021-01-01},
booktitle = {Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers},
volume = {12637},
pages = {65},
organization = {Springer Nature},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Bender, Melvin; Kirdan, Erkin; Pahl, Marc-Oliver; Carle, Georg
Open-source mqtt evaluation Proceedings Article
In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4, IEEE 2021.
BibTeX | Tags:
@inproceedings{bender2021open,
title = {Open-source mqtt evaluation},
author = {Melvin Bender and Erkin Kirdan and Marc-Oliver Pahl and Georg Carle},
year = {2021},
date = {2021-01-01},
booktitle = {2021 IEEE 18th Annual Consumer Communications \& Networking Conference (CCNC)},
pages = {1\textendash4},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Navas, Renzo E; Cuppens, Frederic; Cuppens, Nora Boulahia; Toutain, Laurent; Papadopoulos, Georgios Z
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT Journal Article
In: IEEE Internet of Things Journal, vol. 8, no. 10, pp. 7818–7832, 2021, ISSN: 23274662.
Abstract | Links | BibTeX | Tags: Cyber security, entropy, Internet of Things (IoT), metrics, moving target defense (MTD), Systematic literature review
@article{Navas2021,
title = {MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT},
author = {Renzo E Navas and Frederic Cuppens and Nora Boulahia Cuppens and Laurent Toutain and Georgios Z Papadopoulos},
doi = {10.1109/JIOT.2020.3040358},
issn = {23274662},
year = {2021},
date = {2021-01-01},
journal = {IEEE Internet of Things Journal},
volume = {8},
number = {10},
pages = {7818--7832},
abstract = {Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence.},
keywords = {Cyber security, entropy, Internet of Things (IoT), metrics, moving target defense (MTD), Systematic literature review},
pubstate = {published},
tppubtype = {article}
}
Dernaika, Farah; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Raynaud, Olivier
A Posteriori Analysis of Policy Temporal Compliance Proceedings Article
In: Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers 15, pp. 133–148, Springer International Publishing 2021.
BibTeX | Tags:
@inproceedings{dernaika2021posteriori,
title = {A Posteriori Analysis of Policy Temporal Compliance},
author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud},
year = {2021},
date = {2021-01-01},
booktitle = {Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers 15},
pages = {133--148},
organization = {Springer International Publishing},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2020
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana R; Garcia-Alfaro, Joaquin
Switched-based Resilient Control of Cyber-Physical Systems Journal Article
In: IEEE Access, 2020.
@article{segovia2020switched,
title = {Switched-based Resilient Control of Cyber-Physical Systems},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/ACCESS.2020.3039879},
doi = {10.1109/ACCESS.2020.3039879},
year = {2020},
date = {2020-11-01},
journal = {IEEE Access},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article
In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.
Abstract | Links | BibTeX | Tags: countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security
@inproceedings{Bourget2020b,
title = {PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis},
author = {Edwin Bourget and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens-Boulahia},
url = {https://dl.acm.org/doi/10.1145/3384941.3409590},
doi = {10.1145/3384941.3409590},
isbn = {9781450376082},
year = {2020},
date = {2020-10-01},
booktitle = {Proceedings of the 6th ACM on Cyber-Physical System Security Workshop},
pages = {30--41},
publisher = {ACM},
address = {New York, NY, USA},
abstract = {The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This article presents an event model designed to provide useful and relevant information for diagnosis of safety and security events. We provide a means for system experts to model elementary events that are automatically recombined in complex and complete scenarios. We specifically focus on the ability to represent countermeasures and sequences of events, recurrent problems in the literature. We also introduce a means to precisely measure the wear of components, an important feature for the model to obtain accurate values. We showcase the use of our model for diagnosis purposes on a cyber-physical system testbed.},
keywords = {countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Benzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin
Foundations and Practice of Security Book
Springer, 2020.
@book{lncs12056,
title = {Foundations and Practice of Security},
author = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-45371-8},
doi = {10.1007/978-3-030-45371-8},
year = {2020},
date = {2020-04-01},
publisher = {Springer},
series = {LNCS 12056},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Segovia, Mariana; Cavalli, Ana; Cuppens, Nora; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin
Reflective Attenuation of Cyber-Physical Attacks Proceedings Article
In: 5th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980, pp. 19–34, Springer, 2020.
@inproceedings{segovia2019cybericps,
title = {Reflective Attenuation of Cyber-Physical Attacks},
author = {Mariana Segovia and Ana Cavalli and Nora Cuppens and Jose Rubio-Hernan and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42048-2_2},
doi = {10.1007/978-3-030-42048-2_2},
year = {2020},
date = {2020-02-01},
booktitle = {5th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980},
pages = {19--34},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Katsikas, Sokratis; Cuppens, Frederic; Cuppens, Nora; Lambrinoudakis, Costas; Kalloniatis, Christos; Mylopoulos, John; Anton, Annie; Gritzalis, Stefanos; Pallas, Frank; Pohle, Jorg; Sasse, Angela; Meng, Weizhi; Furnell, Steven; Garcia-Alfaro, Joaquin
Springer, 2020.
@book{lncs11980,
title = {Computer Security, ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26--27, 2019 Revised Selected Papers},
author = {Sokratis Katsikas and Frederic Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie Anton and Stefanos Gritzalis and Frank Pallas and Jorg Pohle and Angela Sasse and Weizhi Meng and Steven Furnell and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42048-2},
doi = {10.1007/978-3-030-42048-2},
year = {2020},
date = {2020-02-01},
publisher = {Springer},
series = {LNCS 11980},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Fournaris, Apostolos; Athanatos, Manos; Lampropoulos, Konstantinos; Ioannidis, Sotiris; Hatzivasilis, George; Damiani, Ernesto; Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Siena, Alberto; Garcia-Alfaro, Joaquin
Springer, 2020.
@book{lncs11981,
title = {Computer Security, ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26--27, 2019, Revised Selected Papers},
author = {Apostolos Fournaris and Manos Athanatos and Konstantinos Lampropoulos and Sotiris Ioannidis and George Hatzivasilis and Ernesto Damiani and Habtamu Abie and Silvio Ranise and Luca Verderame and Alberto Siena and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42051-2},
doi = {10.1007/978-3-030-42051-2},
year = {2020},
date = {2020-02-01},
publisher = {Springer},
series = {LNCS 11981},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Kabil, Alexandre; Duval, Thierry; Cuppens, Nora
Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study Proceedings Article
In: Lecture Notes in Computer Science, pp. 82–101, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Cyber security, Usability study, Virtual reality
@inproceedings{Kabil2020b,
title = {Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study},
author = {Alexandre Kabil and Thierry Duval and Nora Cuppens},
doi = {10.1007/978-3-030-58465-8_6},
issn = {16113349},
year = {2020},
date = {2020-01-01},
booktitle = {Lecture Notes in Computer Science},
volume = {12242 LNCS},
pages = {82--101},
abstract = {Although cybersecurity is a domain where data analysis and training are considered of the highest importance, few virtual environments for cybersecurity are specifically developed, while they are used efficiently in other domains to tackle these issues. By taking into account cyber analysts' practices and tasks, we have proposed the 3D Cyber Common Operational Picture model (3D CyberCOP), that aims at mediating analysts' activities into a Collaborative Virtual Environment (CVE), in which users can perform alert analysis scenarios. In this article, we present a usability study we have performed with non-expert users. We have proposed three virtual environments (a graph-based, an office-based, and the coupling of the two previous ones) in which users should perform a simplified alert analysis scenario based on the WannaCry ransomware. In these environments, users must switch between three views (alert, cyber and physical ones) which all contain different kinds of data sources. These data have to be used to perform the investigations and to determine if alerts are due to malicious activities or if they are caused by false positives. We have had 30 users, with no prior knowledge in cybersecurity. They have performed very well at the cybersecurity task and they have managed to interact and navigate easily. SUS usability scores were above 70 for the three environments and users have shown a preference towards the coupled environment, which was considered more practical and useful.},
keywords = {Cyber security, Usability study, Virtual reality},
pubstate = {published},
tppubtype = {inproceedings}
}
Pahl, Marc-Oliver
iLab@ Home: Hands-On Networking Classes without Lab Access Proceedings Article
In: Sigcomm 2020 Education, 2020.
BibTeX | Tags:
@inproceedings{pahl2020ilab,
title = {iLab@ Home: Hands-On Networking Classes without Lab Access},
author = {Marc-Oliver Pahl},
year = {2020},
date = {2020-01-01},
booktitle = {Sigcomm 2020 Education},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pahl, Marc-Oliver; Kabil, Alexandre; Bourget, Edwin; Gay, Matthieu; Brun, Paul-Emmanuel
A Mixed-Interaction Critical Infrastructure Honeypot Journal Article
In: European Cyber Week CAESAR, 2020, Rennes, France, 2020.
BibTeX | Tags:
@article{Pahl2020,
title = {A Mixed-Interaction Critical Infrastructure Honeypot},
author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun},
year = {2020},
date = {2020-01-01},
journal = {European Cyber Week CAESAR, 2020, Rennes, France},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Piccoli, Alessandro; Pahl, Marc-Oliver; Fries, Steffen; Sel, Tolga
Ensuring consistency for asynchronous Group-Key management in the industrial IoT Proceedings Article
In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–5, IEEE 2020.
BibTeX | Tags:
@inproceedings{piccoli2020ensuring,
title = {Ensuring consistency for asynchronous Group-Key management in the industrial IoT},
author = {Alessandro Piccoli and Marc-Oliver Pahl and Steffen Fries and Tolga Sel},
year = {2020},
date = {2020-01-01},
booktitle = {2020 16th International Conference on Network and Service Management (CNSM)},
pages = {1\textendash5},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pérez-Sol`a, Cristina; Ranchal-Pedrosa, Alejandro; Herrera-Joancomart'i, Jordi; Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin
Lockdown: Balance availability attack against lightning network channels Proceedings Article
In: International Conference on Financial Cryptography and Data Security, pp. 245–263, Springer 2020.
@inproceedings{perez2020lockdown,
title = {Lockdown: Balance availability attack against lightning network channels},
author = {Cristina P\'{e}rez-Sol`a and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomart'i and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-51280-4_14},
doi = {10.1007/978-3-030-51280-4_14},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on Financial Cryptography and Data Security},
pages = {245--263},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
P`amies-Estrems, David; Castell`a-Roca, Jordi; Garcia-Alfaro, Joaquin
A Real-Time Query Log Protection Method for Web Search Engines Journal Article
In: IEEE Access, vol. 8, pp. 87393–87413, 2020.
@article{pamies2020real,
title = {A Real-Time Query Log Protection Method for Web Search Engines},
author = {David P`amies-Estrems and Jordi Castell`a-Roca and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/ACCESS.2020.2992012},
doi = {10.1109/ACCESS.2020.2992012},
year = {2020},
date = {2020-01-01},
journal = {IEEE Access},
volume = {8},
pages = {87393--87413},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Faraj, Omair; Meg'ias, David; Ahmad, Abdel-Mehsen; Garcia-Alfaro, Joaquin
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things Proceedings Article
In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–10, ACM, 2020.
@inproceedings{faraj2020taxonomy,
title = {Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things},
author = {Omair Faraj and David Meg'ias and Abdel-Mehsen Ahmad and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1145/3407023.3407048},
doi = {10.1145/3407023.3407048},
year = {2020},
date = {2020-01-01},
booktitle = {Proceedings of the 15th International Conference on Availability, Reliability and Security},
pages = {1--10},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Gonzalez-Granadillo, Gustavo; Doynikova, Elena; Garcia-Alfaro, Joaquin; Kotenko, Igor; Fedorchenko, Andrey
Stateful RORI-based countermeasure selection using hypergraphs Journal Article
In: Journal of Information Security and Applications, vol. 54, pp. 102562, 2020.
@article{gonzalez2020stateful,
title = {Stateful RORI-based countermeasure selection using hypergraphs},
author = {Gustavo Gonzalez-Granadillo and Elena Doynikova and Joaquin Garcia-Alfaro and Igor Kotenko and Andrey Fedorchenko},
url = {https://doi.org/10.1016/j.jisa.2020.102562},
doi = {10.1016/j.jisa.2020.102562},
year = {2020},
date = {2020-01-01},
journal = {Journal of Information Security and Applications},
volume = {54},
pages = {102562},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Barbeau, Michel; Garcia-Alfaro, Joaquin; Kranakis, Evangelos
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition Proceedings Article
In: International Conference on Ad-Hoc Networks and Wireless, pp. 55–70, Springer 2020.
@inproceedings{barbeau2020geocaching,
title = {Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition},
author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis},
url = {https://doi.org/10.1007/978-3-030-61746-2_5},
doi = {10.1007/978-3-030-61746-2_5},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on Ad-Hoc Networks and Wireless},
pages = {55--70},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Garcia-Alfaro, Joaquin; Navarro-Arribas, Guillermo; Herrera-Joancomarti, Jordi
Data Privacy Management, Cryptocurrencies and Blockchain Technology Book
Springer, 2020.
@book{lncs12484,
title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology},
author = {Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Jordi Herrera-Joancomarti},
url = {https://link.springer.com/book/10.1007/978-3-030-66172-4},
doi = {10.1007/978-3-030-66172-4},
year = {2020},
date = {2020-01-01},
publisher = {Springer},
series = {LNCS 12484},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Laborde, Romain; Aitsaadi, Nadjib; Ghernaouti, Solange; Benzekri, Abdelmalek; Garcia-Alfaro, Joaquin
2020 4th Cyber Security in Networking Conference, CSNet 2020 Book
IEEE, 2020, ISBN: 978-1-6654-0458-7.
@book{CSNet2020,
title = {2020 4th Cyber Security in Networking Conference, CSNet 2020},
author = {Romain Laborde and Nadjib Aitsaadi and Solange Ghernaouti and Abdelmalek Benzekri and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/CSNet50428.2020},
doi = {10.1109/CSNet50428.2020},
isbn = {978-1-6654-0458-7},
year = {2020},
date = {2020-01-01},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana; Garcia-Alfaro, Joaquin
Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report) Technical Report
2020.
@techreport{segovia2020ncaTechRep,
title = {Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report)},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana Cavalli and Joaquin Garcia-Alfaro},
url = {https://arxiv.org/abs/2009.06927},
year = {2020},
date = {2020-01-01},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana R; Garcia-Alfaro, Joaquin
Cyber-Resilience Evaluation of Cyber-Physical Systems Proceedings Article
In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1–8, IEEE 2020.
@inproceedings{segovia2020nca,
title = {Cyber-Resilience Evaluation of Cyber-Physical Systems},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/NCA51143.2020.9306741},
doi = {10.1109/NCA51143.2020.9306741},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)},
pages = {1--8},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sharma, Neetu; Sahu, Rajeev Anand; Saraswat, Vishal; Garcia-Alfaro, Joaquin
Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures Proceedings Article
In: Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers, pp. 137–146, Springer, 2020.
@inproceedings{sharma2020anonymous,
title = {Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures},
author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-70881-8_9},
doi = {10.1007/978-3-030-70881-8_9},
year = {2020},
date = {2020-01-01},
booktitle = {Foundations and Practice of Security - 13th International Symposium,
FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected
Papers},
volume = {12637},
pages = {137--146},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sharma, Neetu; Sahu, Rajeev Anand; Saraswat, Vishal; Garcia-Alfaro, Joaquin
Anonymous proof-of-asset transactions using designated blind signatures Technical Report
2020.
@techreport{sharma2020anonymousTechRep,
title = {Anonymous proof-of-asset transactions using designated blind signatures},
author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro},
url = {https://arxiv.org/pdf/2009.13978},
year = {2020},
date = {2020-01-01},
journal = {arXiv preprint arXiv:2009.13978},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Wüstrich, Lars; Pahl, Marc-Oliver; Liebald, Stefan
An extensible IoT Security Taxonomy Proceedings Article
In: IEEE ISCC 2020, 2020.
Abstract | Links | BibTeX | Tags:
@inproceedings{wustrich2020extensible,
title = {An extensible IoT Security Taxonomy},
author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald},
doi = {10.1109/ISCC50000.2020.9219584},
year = {2020},
date = {2020-01-01},
booktitle = {IEEE ISCC 2020},
abstract = {Security is essential in the Internet of Things (IoT). IoT threat classifications are often non-intuitive to use. Identifying relevant properties of an attack is difficult and requires reading details of the attack. We therefore propose a simple-to-use naming scheme for IoT threat classification. It is based on the affected layers and the affected security goals. We evaluate the usefulness of the chosen approach by applying it to common IoT threats.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc Oliver; Carle, Georg
Open-Source OPC UA Security and Scalability Journal Article
In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.
Abstract | Links | BibTeX | Tags: OPC UA, open-source, scalability, Security
@article{Muhlbauer2020,
title = {Open-Source OPC UA Security and Scalability},
author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc Oliver Pahl and Georg Carle},
doi = {10.1109/ETFA46521.2020.9212091},
issn = {19460759},
year = {2020},
date = {2020-01-01},
journal = {IEEE International Conference on Emerging Technologies and Factory Automation, ETFA},
volume = {2020-Septe},
pages = {262--269},
abstract = {OPC UA is widely adopted for remote-control in industrial environments. It has a central role for industrial control systems as it enables remote management. Compromising OPC UA can lead to compromising entire production facilities. Consequently, OPC UA requires a high level of security. Major commercial OPC UA implementations have compliance certificates ensuring that their security models obey the specification. However, open-source OPC UA implementations that have wide deployment mostly lack these certificates. In this work, we investigate the security models of the four most commonly used open-source implementations: open62541, node-opcua, UA-.NETStandard, and python-opcua. Furthermore, their scalabilities for the number of clients and OPC UA nodes are also analyzed.},
keywords = {OPC UA, open-source, scalability, Security},
pubstate = {published},
tppubtype = {article}
}
Moussaileb, Routa; Cuppens, Nora; Lanet, Jean Louis; Bouder, Hélène Le
Ransomware Network Traffic Analysis for Pre-encryption Alert Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12056 LNCS, pp. 20–38, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Machine learning, Network traffic, Ransomware
@article{Moussaileb2020,
title = {Ransomware Network Traffic Analysis for Pre-encryption Alert},
author = {Routa Moussaileb and Nora Cuppens and Jean Louis Lanet and H\'{e}l\`{e}ne Le Bouder},
doi = {10.1007/978-3-030-45371-8_2},
issn = {16113349},
year = {2020},
date = {2020-01-01},
journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {12056 LNCS},
pages = {20--38},
abstract = {Cyber Security researchers are in an ongoing battle against ransomware attacks. Some exploits begin with social engineering methods to install payloads on victims' computers, followed by a communication with command and control servers for data exchange. To scale down these attacks, scientists should shed light on the danger of those rising intrusions to prevent permanent data loss. To join this arm race against malware, we propose in this paper an analysis of various ransomware families based on the collected system and network logs from a computer. We delve into malicious network traffic generated by these samples to perform a packet level detection. Our goal is to reconstruct ransomware's full activity to check if its network communication is distinguishable from benign traffic. Then, we examine if the first packet sent occurs before data's encryption to alert the administrators or afterwards. We aim to define the first occurrence of the alert raised by malicious network traffic and where it takes place in a ransomware workflow. Logs collected are available at http://serveur2.seres.rennes.telecom-bretagne.eu/data/RansomwareData/.},
keywords = {Machine learning, Network traffic, Ransomware},
pubstate = {published},
tppubtype = {article}
}
Navas, Renzo E; Sandaker, Håkon; Cuppens, Frédéric; Cuppens, Nora; Toutain, Laurent; Papadopoulos, Georgios Z
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher
@article{Navas2020,
title = {IANVS: A Moving Target Defense Framework for a Resilient Internet of Things},
author = {Renzo E Navas and Hr{a}kon Sandaker and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Laurent Toutain and Georgios Z Papadopoulos},
doi = {10.1109/ISCC50000.2020.9219728},
issn = {15301346},
year = {2020},
date = {2020-01-01},
journal = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the Internet. This networking capability allows for new beneficial services and applications. However, it is also the entry-point for a wide variety of cyber-attacks that target these devices. The security measures present in real IoT systems lag behind those of the standard Internet. Security is sometimes completely absent. Moving Target Defense (MTD) is a 10-year-old cyber-defense paradigm. It proposes to randomize components of a system. Reasonably, an attacker will have a higher cost attacking an MTD-version of a system compared with a static-version of it. Even if MTD has been successfully applied to standard systems, its deployment for IoT is still lacking. In this paper, we propose a generic MTD framework suitable for IoT systems: IANVS (pronounced Janus). Our framework has a modular design. Its components can be adapted according to the specific constraints and requirements of a particular IoT system. We use it to instantiate two concrete MTD strategies. One that targets the UDP port numbers (port-hopping), and another a CoAP resource URI. We implement our proposal on real hardware using Pycom LoPy4 nodes. We expose the nodes to a remote Denial-of-Service attack and evaluate the effectiveness of the IANVS-based port-hopping MTD proposal.},
keywords = {attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher},
pubstate = {published},
tppubtype = {article}
}
Bkakria, Anis; Cuppens, Nora; Cuppens, Frdric
Pattern Matching on Encrypted Data Journal Article
In: IACR Cryptol, pp. 1–28, 2020.
BibTeX | Tags: pattern matching, searchable encryption
@article{Bkakria2020,
title = {Pattern Matching on Encrypted Data},
author = {Anis Bkakria and Nora Cuppens and Frdric Cuppens},
year = {2020},
date = {2020-01-01},
journal = {IACR Cryptol},
pages = {1--28},
keywords = {pattern matching, searchable encryption},
pubstate = {published},
tppubtype = {article}
}
Smine, Manel; Espes, David; Cuppens-Boulahia, Nora; Cuppens, Frédéric
Network functions virtualization access control as a service Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12122 LNCS, no. 1, pp. 100–117, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Access control, Domain type enforcement (DTE), Network Functions Virtualization (NFV), Policy enforcement
@article{Smine2020,
title = {Network functions virtualization access control as a service},
author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens},
doi = {10.1007/978-3-030-49669-2_6},
issn = {16113349},
year = {2020},
date = {2020-01-01},
journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {12122 LNCS},
number = {1},
pages = {100--117},
abstract = {NFV is an important innovation in networking. It has many advantages such as saving investment cost, optimizing resource consumption, improving operational efficiency and simplifying network service lifecycle management. NFV environments introduce new security challenges and issues since new types of threats and vulnerabilities are inevitably introduced (e.g. security policy and regular compliance failure, vulnerabilities in VNF softwares, malicious insiders, etc.). The impact of these threats can be mitigated by enforcing security policies over deployed network services. In this paper, we introduce an access control as a service model for NFV services. The proposed approach can deploy several kinds of access control model policies (e.g. RBAC, ORBAC, ABAC, etc.) for NFV services and can be easily scaled.},
keywords = {Access control, Domain type enforcement (DTE), Network Functions Virtualization (NFV), Policy enforcement},
pubstate = {published},
tppubtype = {article}
}
Clédel, Thomas; Cuppens, Nora; Cuppens, Frédéric; Dagnas, Romain
Resilience properties and metrics: how far have we gone? Journal Article
In: Journal of Surveillance, Security and Safety, pp. 119–139, 2020.
Links | BibTeX | Tags: 0, 2020, 4, adaptation, any medium or format, as long as you, by, creative commons attribution 4, creativecommons, distribution and reproduction in, even commercially, for any purpose, https, ing, international license, is licensed under a, licenses, measurement, metrics, open access this article, org, resilience, s, shar, survey, the author, which permits unrestricted use
@article{Cledel2020,
title = {Resilience properties and metrics: how far have we gone?},
author = {Thomas Cl\'{e}del and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens and Romain Dagnas},
doi = {10.20517/jsss.2020.08},
year = {2020},
date = {2020-01-01},
journal = {Journal of Surveillance, Security and Safety},
pages = {119--139},
keywords = {0, 2020, 4, adaptation, any medium or format, as long as you, by, creative commons attribution 4, creativecommons, distribution and reproduction in, even commercially, for any purpose, https, ing, international license, is licensed under a, licenses, measurement, metrics, open access this article, org, resilience, s, shar, survey, the author, which permits unrestricted use},
pubstate = {published},
tppubtype = {article}
}
Piccoli, A; Pahl, M-O; Wüstrich, L
Group Key Management in constrained IoT Settings Proceedings Article
In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: autonomous management, constrained nodes, group key management, IoT, reliability, Security
@inproceedings{Piccoli2020,
title = {Group Key Management in constrained IoT Settings},
author = {A Piccoli and M-O Pahl and L W\"{u}strich},
doi = {10.1109/ISCC50000.2020.9219619},
issn = {15301346},
year = {2020},
date = {2020-01-01},
booktitle = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {textcopyright 2020 IEEE. The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, in their Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead. This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.},
keywords = {autonomous management, constrained nodes, group key management, IoT, reliability, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Lubben, Christian; Pahl, Marc Oliver; Khan, Mohammad Irfan
Using Deep Learning to Replace Domain Knowledge Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: ANN, deep learning, network traffic prediction, V2V, V2X
@article{Lubben2020,
title = {Using Deep Learning to Replace Domain Knowledge},
author = {Christian Lubben and Marc Oliver Pahl and Mohammad Irfan Khan},
doi = {10.1109/ISCC50000.2020.9219567},
issn = {15301346},
year = {2020},
date = {2020-01-01},
journal = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {Complex problems like the prediction of future behavior of a system are usually solved by using domain knowledge. This knowledge comes with a certain expense which can be monetary costs or efforts to generate it. We want to decrease this cost while using state of the art machine learning and prediction methods. Our aim is to replace the domain knowledge and create a black-box solution that offers automatic reasoning and accurate predictions. Our guiding example is packet scheduling optimization in Vehicle to Vehicle (V2V) communication. Within the evaluation, we compare the prediction quality of a labour-intense whitebox approach with the presented fully-automated blackbox approach. To ease the measurement process we propose a framework design which allows easy exchange of predictors. The results show the successful design of our framework as well as superior accuracy of the black box approach.},
keywords = {ANN, deep learning, network traffic prediction, V2V, V2X},
pubstate = {published},
tppubtype = {article}
}
Pahl, Marc-Oliver; Kabil, Alexandre; Bourget, Edwin; Gay, Matthieu; Brun, Paul-Emmanuel
A mixed-interaction critical infrastructure honeypot Journal Article
In: European Cyber Week CAESAR, 2020.
BibTeX | Tags:
@article{pahl2020mixed,
title = {A mixed-interaction critical infrastructure honeypot},
author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun},
year = {2020},
date = {2020-01-01},
journal = {European Cyber Week CAESAR},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Moussaileb, Routa; Navas, Renzo E; Cuppens, Nora
Watch out! Doxware on the way $łdots$ Journal Article
In: Journal of information security and applications, vol. 55, pp. 102668, 2020.
BibTeX | Tags:
@article{moussaileb2020watch,
title = {Watch out! Doxware on the way $\ldots$},
author = {Routa Moussaileb and Renzo E Navas and Nora Cuppens},
year = {2020},
date = {2020-01-01},
journal = {Journal of information security and applications},
volume = {55},
pages = {102668},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Piccoli, Alessandro; Pahl, Marc-Oliver; Wüstrich, Lars
Group key management in constrained IoT settings Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{piccoli2020group,
title = {Group key management in constrained IoT settings},
author = {Alessandro Piccoli and Marc-Oliver Pahl and Lars W\"{u}strich},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Dernaika, Farah; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Raynaud, Olivier
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism Proceedings Article
In: International Conference on the Quality of Information and Communications Technology, pp. 332–342, Springer 2020.
BibTeX | Tags:
@inproceedings{dernaika2020accountability,
title = {Accountability in the A Posteriori Access Control: A Requirement and a Mechanism},
author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on the Quality of Information and Communications Technology},
pages = {332--342},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc-Oliver; Carle, Georg
Open-source OPC UA security and scalability Proceedings Article
In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 262–269, IEEE 2020.
BibTeX | Tags:
@inproceedings{muhlbauer2020open,
title = {Open-source OPC UA security and scalability},
author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc-Oliver Pahl and Georg Carle},
year = {2020},
date = {2020-01-01},
booktitle = {2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)},
volume = {1},
pages = {262\textendash269},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Wüstrich, Lars; Pahl, Marc-Oliver; Liebald, Stefan
Towards an extensible IoT security taxonomy Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{wustrich2020towards,
title = {Towards an extensible IoT security taxonomy},
author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lübben, Christian; Pahl, Marc-Oliver; Khan, Mohammad Irfan
Using deep learning to replace domain knowledge Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{lubben2020using,
title = {Using deep learning to replace domain knowledge},
author = {Christian L\"{u}bben and Marc-Oliver Pahl and Mohammad Irfan Khan},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}