Our Publications
Here you find our publications.
2018
Real-time detection and reaction to activity hijacking attacks in android smartphones (short paper) Journal Article
In: Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017, pp. 253–258, 2018, ISBN: 9781538624876.
What users want: Adapting qualitative research methods to security policy elicitation Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10683 LNCS, pp. 229–249, 2018, ISSN: 16113349.
Linking differential identifiability with differential privacy Proceedings Article
In: International Conference on Information and Communications Security, pp. 232–247, Springer 2018.
CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article
In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform Proceedings Article
In: Ganapathy, Vinod; Jaeger, Trent; Shyamasundar, R K (Ed.): Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 272–287, Springer, 2018.
What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11252 LNCS, pp. 219–235, 2018, ISSN: 16113349.
A grounded theory approach to security policy elicitation Journal Article
In: vol. 26, no. 4, pp. 454–471, 2018.
An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice Proceedings Article
In: Proceedings of the New Security Paradigms Workshop, pp. 64–79, Association for Computing Machinery, New York, NY, USA, 2018, ISBN: 9781450365970.
Securing IoT microservices with certificates Journal Article
In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.
Graph-based IoT microservice security Journal Article
In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.
Computer Security Book Section
In: Computer and Network Security Essentials, pp. 3–20, Springer, 2018, ISBN: 9783319584249.
A pyramidal-based model to compute the impact of cyber security events Proceedings Article
In: ACM, (Ed.): 13th International Conference on Availability, Reliability and Security (ARES 2018), pp. 1–10, New York, 2018.
Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems Journal Article
In: Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, pp. 1–17, 2018.
Graph-based IoT microservice security Proceedings Article
In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–3, IEEE 2018.
Graph-based anomaly detection for iot microservices Journal Article
In: Measurements, vol. 120, no. 140, pp. 160, 2018.
Securing IoT microservices with certificates Proceedings Article
In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–5, IEEE 2018.
Machine learning as a reusable microservice Proceedings Article
In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–7, IEEE 2018.
All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection Proceedings Article
In: 2018 14th International Conference on Network and Service Management (CNSM), pp. 72–80, IEEE 2018.
DS2OS traffic traces, 2018 Miscellaneous
2018.
DS2OS traffic traces Journal Article
In: Retrieved April, vol. 23, pp. 2022, 2018.
2017
Learning to Communicate Underwater (An exploration of Limited Mobility Agents in Underwater Acoustic Sensor Networks) Proceedings Article
In: 12th ACM International Conference on Underwater Networks & Systems, WUWNet'17, Nov 6-8, 2017, Halifax, pp. 1–5, ACM, 2017.
Anonymous Certification for an e-Assessment Framework Proceedings Article
In: 22nd Nordic Conference on Secure IT Systems (NordSec 2017) Tartu, Estonia, pp. 70–85, Springer, 2017.
Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric Proceedings Article
In: Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723, pp. 293–302, Springer, 2017.
Towards a Security Event Data Taxonomy Proceedings Article
In: 12th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2017), Dinard, France, pp. 29–45, Springer, 2017.
Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band Proceedings Article
In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 3–12, Springer, 2017.
The Sound of Communication in Underwater Acoustic Sensor Networks Proceedings Article
In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 13–23, Springer, 2017.
Selection of Pareto-efficient Response Plans based on Financial and Operational Assessments Journal Article
In: EURASIP Journal on Information Security, vol. 2017, iss. 12, pp. 1–22, 2017.
On the use of Watermark-based Schemes to Detect Cyber-Physical Attacks Journal Article
In: EURASIP Journal on Information Security, vol. 2017, iss. 8, pp. 1–25, 2017.
Introduction to the special section on critical systems modelling and security Journal Article
In: Computers and Electrical Engineering, vol. 59, pp. 73–75, 2017.
Cyber-résilience des infrastructures critiques Analyse préventive des défaillances d ' origine malveillante PhD Thesis
IMT Atlantique, 2017.
Computer Security--ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Book
Springer, 2017.
A game theoretical model for optimal distribution of network security resources Proceedings Article
In: International Conference on Decision and Game Theory for Security, pp. 234–255, Springer 2017.
Discovery and registration protocol Proceedings Article
In: International Conference on Information Systems Security, pp. 243–262, Springer 2017.
Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.
Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.
Developer-centered security and the symmetry of ignorance Journal Article
In: ACM International Conference Proceeding Series, pp. 46–56, 2017, ISBN: 9781450363846.
CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité To cite this version : HAL Id : hal-01577868 CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité Immersive Collaborative Visualization for Cyber Sécurity Journal Article
In: 2017.
DIscovery and registration protocol: For device and person identity management in IoT Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10717 LNCS, pp. 243–262, 2017, ISSN: 16113349.
The iLab Concept: Making Teaching Better, at Scale Journal Article
In: IEEE Communications Magazine, vol. 55, no. 11, pp. 178–185, 2017, ISSN: 01636804.
Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances Journal Article
In: IEEE Access, vol. 6, pp. 8810–8828, 2017.
A polytope-based approach to measure the impact of events against critical infrastructures Journal Article
In: Journal of Computer and System Sciences, vol. 83, no. 1, pp. 3–21, 2017.
Telecom & Management SudParis, France, 2017.
The ilab concept: Making teaching better, at scale Journal Article
In: IEEE Communications Magazine, vol. 55, no. 11, pp. 178–185, 2017.
2016
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks Proceedings Article
In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 3–19, Springer, 2016.
Towards an Automated and Dynamic Risk Management Response System Proceedings Article
In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 37–53, Springer, 2016.
Security of Cyber-Physical Systems. From Theory to Testbeds and Validation Proceedings Article
In: 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems (CyberICPS 2016), pp. 3–18, Springer, 2016.
An n-sided polygonal model to calculate the impact of cyber security events Proceedings Article
In: 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016, pp. 87–102, Springer, 2016.