Our Publications

Here you find our publications.

112 entries « 2 of 3 »

2019

Pahl, Marc-Oliver; Liebald, Stefan

Information-Centric IoT Middleware Overlay: VSL Journal Article

In: International Conference on Networked Systems 2019 (NetSys), 2019, ISBN: 9781728105680.

Abstract | Links | BibTeX | Tags:

2018

Foley, Simon N; Grunenwald, Stephane; Autrel, Fabien; Hernan, Jose Rubio; Bourget, Edwin; Kabil, Alexandre; Clédel, Thomas; Larsen, Raphaël; Rooney, Vivien M; Vanhulst, Kristen

Science hackathons for cyberphysical system security research putting CPS testbed platforms to good use Inproceedings

In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 102–107, Association for Computing Machinery, 2018, ISSN: 15437221.

Abstract | Links | BibTeX | Tags:

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

Why should we use 3D Collaborative Virtual Environments for Cyber Security? Inproceedings

In: 2018 IEEE Fourth VR International Workshop on Collaborative Virtual Environments (3DCVE), pp. 1–2, 2018.

Abstract | Links | BibTeX | Tags: 3D collaborative virtual environments, 3DCVE, Collaboration, Collaborative interaction, Computer security, cyber security data analysis, cyber situational awareness, Data analysis, data visualisation, Data visualization, data visualization systems, groupware, Human computer interaction (HCI), Human-centered computing, Interaction paradigms, security of data, threat detection performances, Three-dimensional displays, Virtual environments, Virtual reality, Visual analytics, Visualization, Visualization application domains

Kome, Ivan Marco Lobe; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

A Certificate-Less Key Exchange Protocol for IoT Inproceedings

In: International Conference on Risks and Security of Internet and Systems, pp. 65–79, Springer 2018.

BibTeX | Tags:

Clédel, Thomas; Foley, Simon N; Cuppens, Nora; Cuppens, Frédéric; Kermarrec, Yvon; Dubois, Frédéric; Laarouchi, Youssef; Comte, Gérard Le

Towards the evaluation of end-to-end resilience through external consistency Inproceedings

In: International Symposium on Cyberspace Safety and Security, pp. 99–114, Springer 2018.

BibTeX | Tags:

Smine, Manel; Cuppens, Nora; Cuppens, Frédéric

Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense Inproceedings

In: International Conference on Risks and Security of Internet and Systems, pp. 158–171, Springer 2018.

BibTeX | Tags:

Cuppens, Nora; Cuppens, Frédéric; Lanet, Jean-Louis; Legay, Axel; Garcia-Alfaro, Joaquin

Risks and Security of Internet and Systems Book

Springer, 2018.

BibTeX | Tags:

Clédel, Thomas; Foley, Simon N; Cuppens, Nora; Cuppens, Frédéric; Kermarrec, Yvon; Dubois, Frédéric; Laarouchi, Youssef; Comte, Gérard Le

Towards the evaluation of end-to-end resilience through external consistency Inproceedings

In: International Symposium on Cyberspace Safety and Security, pp. 99–114, Springer 2018.

BibTeX | Tags:

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

3D CyberCOP: A collaborative platform for cybersecurity data analysis and training Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11151 LNCS , pp. 176–183, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Collaborative interaction, Cybersecurity, Virtual reality

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

3D CyberCOP: A collaborative platform for cybersecurity data analysis and training Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11151 LNCS , pp. 176–183, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Collaborative interaction, Cybersecurity, Virtual reality

al, Basinger Et

States Patent [ Â »] Journal Article

In: Search, 2 , pp. 2–5, 2018.

Abstract | BibTeX | Tags:

Foley, Simon N; Grunenwald, Stephane; Autrel, Fabien; Hernan, Jose Rubio; Bourget, Edwin; Kabil, Alexandre; Clédel, Thomas; Larsen, Raphaël; Rooney, Vivien M; Vanhulst, Kristen

Science hackathons for cyberphysical system security research putting CPS testbed platforms to good use Journal Article

In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 102–107, 2018, ISSN: 15437221.

Abstract | Links | BibTeX | Tags:

Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Dubus, Samuel; Foley, Simon; Laarouchi, Youssef

Probabilistic event graph to model safety and security for diagnosis purposes Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10980 LNCS , pp. 38–47, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags:

Bouder, Hélène Le; Thomas, Gaël; Bourget, Edwin; Graa, Mariem; Cuppens, Nora; Lanet, Jean Louis

Theoretical security evaluation of the human semantic authentication protocol Journal Article

In: ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2 , pp. 332–339, 2018, ISBN: 9789897583193.

Abstract | Links | BibTeX | Tags: Authentication, Dynamic Password, Graphical Password, Human Semantic Authentication Protocol, PIN Code, Shoulder Surfing Attack

Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Dubus, Samuel; Foley, Simon; Laarouchi, Youssef

Probabilistic event graph to model safety and security for diagnosis purposes Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10980 LNCS , pp. 38–47, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags:

Navas, Renzo E; Bouder, Hélène Le; Cuppens, Nora; Cuppens, Frédéric; Papadopoulos, Georgios Z

Demo: Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle attack Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11104 LNCS , pp. 120–125, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: CoAP, E2E security, IoT, IPv6, MITM attack, RPL

Rivas, Alberto; Mart, Javier J; Prieto, Javier; Gonz, Alfonso

for Industry 4 . 0 Book

2018, ISBN: 9783319952048.

BibTeX | Tags: case-based reasoning system, semantic analysis

Rubio-Hernan, Jose; De Cicco, Luca; Garcia-Alfaro, Joaquin

Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems Journal Article

In: Transactions on Emerging Telecommunications Technologies, 29 (7), 2018, ISSN: 21613915.

Abstract | Links | BibTeX | Tags:

Bkakria, Anis; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frederic; Lanet, Jean Louis

Real-time detection and reaction to activity hijacking attacks in android smartphones (short paper) Journal Article

In: Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017, pp. 253–258, 2018, ISBN: 9781538624876.

Abstract | Links | BibTeX | Tags:

Rooney, Vivien M; Foley, Simon N

What users want: Adapting qualitative research methods to security policy elicitation Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10683 LNCS , pp. 229–249, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags:

Manuel, Jose; Hernan, Rubio; Manuel, Jose; Hernan, Rubio; Manuel, Jose; Hernan, Rubio

Detection of attacks against cyber-physical industrial systems To cite this version : HAL Id : tel-01688047 Detection of Attacks against Cyber-Physical Industrial Systems Journal Article

In: 2018.

BibTeX | Tags:

B, Anis Bkakria; Cuppens-boulahia, Nora

Linking Differential Identifiability Journal Article

In: pp. 232–247, 2018, ISBN: 9783030019501.

Links | BibTeX | Tags:

Kome, Marco Lobe; Cuppens, Frederic; Cuppens-Boulahia, Nora; Frey, Vincent

CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article

In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.

Abstract | Links | BibTeX | Tags: CoAP, Discovery, IoT, Publish/Subscribe, Security

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

3D CyberCOP: A collaborative platform for cybersecurity data analysis and training Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11151 LNCS , pp. 176–183, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Collaborative interaction, Cybersecurity, Virtual reality

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11281 LNCS , pp. 272–287, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Collaborative interaction, Cybersecurity, Virtual reality

Rooney, Vivien M; Foley, Simon N

What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11252 LNCS , pp. 219–235, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: CSIRT Human experience, psychology, Security, SOC

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training 3D Cy-berCOP: a Collaborative Platform for Cybersecurity 3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training Technical Report

2018.

Abstract | Links | BibTeX | Tags: Collaborative, Cybersecurity {textperiodcentered}, Interaction {textperiodcentered}, Reality, Virtual

Gonzalez-Granadillo, Gustavo; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin

A Pyramidal-Based Model to Compute the Impact of Cyber Security Events Inproceedings

In: Proceedings of the 13th International Conference on Availability, Reliability and Security, Association for Computing Machinery, New York, NY, USA, 2018, ISBN: 9781450364485.

Links | BibTeX | Tags: Countermeasure Selection, Decision Support Tool, Event Impact Representation, Geometrical Model, Pyramidal Model, Visualization

Foley, Simon

A grounded theory approach to security policy elicitation Journal Article

In: 26 (4), pp. 454–471, 2018.

Abstract | Links | BibTeX | Tags:

Clédel, Thomas; Foley, Simon; Cuppens, Nora; Cuppens, Frédéric; Kermarrec, Yvon; Dubois, Frédéric; Laarouchi, Youssef; Comte, Gérard

Towards the Evaluation of End-to-End Resilience Through External Consistency: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings Incollection

In: pp. 99–114, 2018, ISBN: 978-3-030-01688-3.

Links | BibTeX | Tags:

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform Inproceedings

In: Ganapathy, Vinod; Jaeger, Trent; Shyamasundar, R K (Ed.): Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 272–287, Springer, 2018.

Abstract | Links | BibTeX | Tags:

Rubio-Hernan, Jose; Sahay, Rishikesh; Cicco, Luca De; Garcia-Alfaro, Joaquin

Cyber-physical architecture assisted by programmable networking Journal Article

In: Internet Technology Letters, 1 (4), pp. e44, 2018.

Abstract | Links | BibTeX | Tags: Control Theory, Cyber-Physical Systems, programmable networking, software-defined networks, supervisory control and data acquisition

Rooney, Vivien M; Foley, Simon N

An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice Inproceedings

In: Proceedings of the New Security Paradigms Workshop, pp. 64–79, Association for Computing Machinery, New York, NY, USA, 2018, ISBN: 9781450365970.

Links | BibTeX | Tags:

Pahl, Marc Oliver; Donini, Lorenzo

Securing IoT microservices with certificates Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous certificate management, Certificates, IoT, Microservices, Security, Unattended nodes, X.509

Pahl, Marc Oliver; Aubet, François Xavier; Liebald, Stefan

Graph-based IoT microservice security Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous service management, firewall, IoT, Mi-croservices, Passive monitoring, Security, Unattended nodes

2017

Foley, Simon N; Gollmann, Dieter; Snekkenes, Einar

Computer Security--ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Book

Springer, 2017.

BibTeX | Tags:

Ismail, Ziad; Kiennert, Christophe; Leneutre, Jean; Chen, Lin

A game theoretical model for optimal distribution of network security resources Inproceedings

In: International Conference on Decision and Game Theory for Security, pp. 234–255, Springer 2017.

BibTeX | Tags:

Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

Discovery and registration protocol Inproceedings

In: International Conference on Information Systems Security, pp. 243–262, Springer 2017.

BibTeX | Tags:

Duffany, Jeffrey L

Computer security Book

2017, ISBN: 9783319584249.

Links | BibTeX | Tags:

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10476 LNCS , pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10476 LNCS , pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Rubio-Hernan, Jose; Cicco, Luca De; Garcia-Alfaro, Joaquin

On the use of watermark-based schemes to detect cyber-physical attacks Journal Article

In: Eurasip Journal on Information Security, 2017 (1), 2017, ISSN: 2510523X.

Abstract | Links | BibTeX | Tags: Adversary model, Attack detection, Attack mitigation, Control Theory, Critical infrastructures, Cyber-physical adversary, Cyber-physical security, Network security, Networked-control system

Pieczul, Olgierd; Foley, Simon; Zurko, Mary Ellen

Developer-centered security and the symmetry of ignorance Journal Article

In: ACM International Conference Proceeding Series, pp. 46–56, 2017, ISBN: 9781450363846.

Abstract | Links | BibTeX | Tags: •Security and privacy Usability in security and p, Software security engineering

Kabil, Alexandre; Kabil, Alexandre; Collaborative, Cybercopd Visualisation; Atlantique, I M T; Kabil, Alexandre

CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité To cite this version : HAL Id : hal-01577868 CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité Immersive Collaborative Visualization for Cyber Sécurity Journal Article

In: 2017.

BibTeX | Tags: a, collaborative visualization, common operational, Cyber security, des pratiques, ectuer, fonction des donn{é}es et, human, n de disposer d, nous allons e, un cas d, utilisation r{é}el

Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

DIscovery and registration protocol: For device and person identity management in IoT Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10717 LNCS , pp. 243–262, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Identity management, IoT, MQTT, OAuth, Security

Rubio-Hernan, Jose; Rodolfo-Mejias, Juan; Garcia-Alfaro, Joaquin

Security of cyber-physical systems from theory to testbeds and validation Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10166 LNCS , pp. 3–18, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags:

Pahl, Marc Oliver

The iLab Concept: Making Teaching Better, at Scale Journal Article

In: IEEE Communications Magazine, 55 (11), pp. 178–185, 2017, ISSN: 01636804.

Links | BibTeX | Tags:

2016

Ismail, Ziad; Leneutre, Jean; Bateman, David; Chen, Lin

A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures Inproceedings

In: pp. 159–171, 2016.

Links | BibTeX | Tags:

Bergström, Erik; Åhlfeldt, Rose Mharie

Foundations and Practice of Security Book

2016, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Information classification, ISMS, Systematic literature review

Monrose, Fabian; Eds, Joaquin Garcia-alfaro; Hutchison, David

Intrusions , and Defenses Book

2016, ISBN: 9783319457185.

BibTeX | Tags:

112 entries « 2 of 3 »