Lutte Informatique d’Influence (L2I) / Fake News Detection, Generation, Prevention
In an era where information spreads at the speed of light and trust is constantly under siege, the proliferation of fake news poses a profound threat to our society’s fabric.
The societal impact of our research direction on fake news cannot be overstated. By combating the erosion of trust and amplifying the voice of truth in an increasingly volatile digital landscape, we bolster the resilience of our critical networked infrastructures and uphold the fundamental principles of democracy, informed consent, and social cohesion.
Together, let us rise to the challenge of defending truth in the digital age, ensuring that our interconnected world remains a bastion of integrity, reliability, and trustworthiness for generations to come.

Our research direction on fake news encompasses three pivotal pillars: generation, detection, and prevention.
- Firstly, we delve into the intricacies of fake news generation, understanding the underlying mechanisms and technologies that enable its creation. By comprehensively analyzing the tactics employed by malicious actors, we aim to anticipate and counteract their efforts, thwarting the dissemination of misinformation before it takes root.
- Secondly, our focus extends to the development of robust detection methodologies. Leveraging cutting-edge techniques from machine learning, natural language processing, and network analysis, we strive to identify and categorize fake news with unprecedented accuracy and efficiency. By empowering digital platforms and users with the tools to discern truth from falsehood, we fortify our collective defenses against manipulation and deception.
- Lastly, we are dedicated to proactive prevention strategies aimed at inoculating our information ecosystem against the spread of fake news. Through interdisciplinary collaboration and engagement with stakeholders across academia, industry, and government, we seek to implement robust frameworks and protocols that promote transparency, accountability, and authenticity in online discourse.
News
[display-posts category=”L2I Fake News” image_size=”thumbnail” image_size=”medium” wrapper=”div” wrapper_class=”display-posts-listing grid”]
Publications
2021
CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks Workshop
2021.
2020
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article
In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.
Open-Source OPC UA Security and Scalability Journal Article
In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Group Key Management in constrained IoT Settings Proceedings Article
In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.
2019
Giving IoT services an identity and changeable attributes Journal Article
In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019, no. section II, pp. 455–461, 2019, ISBN: 9783903176157.
2018
CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article
In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.
What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11252 LNCS, pp. 219–235, 2018, ISSN: 16113349.
Securing IoT microservices with certificates Journal Article
In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.
Graph-based IoT microservice security Journal Article
In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.
2017
Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.
Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.
DIscovery and registration protocol: For device and person identity management in IoT Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10717 LNCS, pp. 243–262, 2017, ISSN: 16113349.
Tools
People
- Renforcement de la collaboration franco-allemande en cybersécurité : La réunion annuelle du German Chapter of the ACM 2025 - April 2, 2025
- Exciting Workshop Program Announced – Join Us in Hawaii! 🌺 - March 21, 2025
- 12th Heidelberg Laureate Forum 2025 - January 31, 2025