Our Publications

Here you find our publications.

246 entries « 4 of 5 »

2018

Bkakria, Anis; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frederic; Lanet, Jean Louis

Real-time detection and reaction to activity hijacking attacks in android smartphones (short paper) Journal Article

In: Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017, pp. 253–258, 2018, ISBN: 9781538624876.

Abstract | Links | BibTeX | Tags:

Rooney, Vivien M; Foley, Simon N

What users want: Adapting qualitative research methods to security policy elicitation Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10683 LNCS, pp. 229–249, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags:

Bkakria, Anis; Cuppens-Boulahia, Nora; Cuppens, Frédéric

Linking differential identifiability with differential privacy Proceedings Article

In: International Conference on Information and Communications Security, pp. 232–247, Springer 2018.

BibTeX | Tags:

Kome, Marco Lobe; Cuppens, Frederic; Cuppens-Boulahia, Nora; Frey, Vincent

CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article

In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.

Abstract | Links | BibTeX | Tags: CoAP, Discovery, IoT, Publish/Subscribe, Security

Kabil, Alexandre; Duval, Thierry; Cuppens, Nora; Comte, Gérard Le; Halgand, Yoran; Ponchel, Christophe

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform Proceedings Article

In: Ganapathy, Vinod; Jaeger, Trent; Shyamasundar, R K (Ed.): Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 272–287, Springer, 2018.

Abstract | Links | BibTeX | Tags:

Rooney, Vivien M; Foley, Simon N

What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11252 LNCS, pp. 219–235, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: CSIRT Human experience, psychology, Security, SOC

Foley, Simon

A grounded theory approach to security policy elicitation Journal Article

In: vol. 26, no. 4, pp. 454–471, 2018.

Abstract | Links | BibTeX | Tags:

Rooney, Vivien M; Foley, Simon N

An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice Proceedings Article

In: Proceedings of the New Security Paradigms Workshop, pp. 64–79, Association for Computing Machinery, New York, NY, USA, 2018, ISBN: 9781450365970.

Links | BibTeX | Tags:

Pahl, Marc Oliver; Donini, Lorenzo

Securing IoT microservices with certificates Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous certificate management, Certificates, IoT, Microservices, Security, Unattended nodes, X.509

Pahl, Marc Oliver; Aubet, François Xavier; Liebald, Stefan

Graph-based IoT microservice security Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous service management, firewall, IoT, Mi-croservices, Passive monitoring, Security, Unattended nodes

Duffany, Jeffrey L

Computer Security Book Section

In: Computer and Network Security Essentials, pp. 3–20, Springer, 2018, ISBN: 9783319584249.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin

A pyramidal-based model to compute the impact of cyber security events Proceedings Article

In: ACM, (Ed.): 13th International Conference on Availability, Reliability and Security (ARES 2018), pp. 1–10, New York, 2018.

Links | BibTeX | Tags:

Cuppens-Boulahia, Nora; Cuppens, Frédéric; Lanet, Jean-Louis; Legay, Axel; Garcia-Alfaro, Joaquin

12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers Book

Springer, 2018.

Links | BibTeX | Tags:

Imine, Abdessamad; Fernandez, Jose-M.; Marion, Jean-Yves; Logrippo, Luigi; Garcia-Alfaro, Joaquin

10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers Book

Springer, 2018.

Links | BibTeX | Tags:

Rubio-Hernan, Jose; Cicco, Luca De; Garcia-Alfaro, Joaquin

Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems Journal Article

In: Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, pp. 1–17, 2018.

Links | BibTeX | Tags:

Pahl, Marc-Oliver; Aubet, François-Xavier; Liebald, Stefan

Graph-based IoT microservice security Proceedings Article

In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–3, IEEE 2018.

BibTeX | Tags:

Aubet, François-Xavier; Pahl, Marc-Oliver; Liebald, Stefan; Norouzian, Mohammad Reza

Graph-based anomaly detection for iot microservices Journal Article

In: Measurements, vol. 120, no. 140, pp. 160, 2018.

BibTeX | Tags:

Pahl, Marc-Oliver; Donini, Lorenzo

Securing IoT microservices with certificates Proceedings Article

In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–5, IEEE 2018.

BibTeX | Tags:

Pahl, Marc-Oliver; Loipfinger, Markus

Machine learning as a reusable microservice Proceedings Article

In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1–7, IEEE 2018.

BibTeX | Tags:

Pahl, Marc-Oliver; Aubet, François-Xavier

All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection Proceedings Article

In: 2018 14th International Conference on Network and Service Management (CNSM), pp. 72–80, IEEE 2018.

BibTeX | Tags:

Pahl, MO; Aubet, FX

DS2OS traffic traces, 2018 Miscellaneous

2018.

BibTeX | Tags:

Aubet, FX; Pahl, MO

DS2OS traffic traces Journal Article

In: Retrieved April, vol. 23, pp. 2022, 2018.

BibTeX | Tags:

2017

Porretta, Steven; Barbeau, Michel; Garcia-Alfaro, Joaquin; Kranakis, Evangelos

Learning to Communicate Underwater (An exploration of Limited Mobility Agents in Underwater Acoustic Sensor Networks) Proceedings Article

In: 12th ACM International Conference on Underwater Networks & Systems, WUWNet'17, Nov 6-8, 2017, Halifax, pp. 1–5, ACM, 2017.

Links | BibTeX | Tags:

Kiennert, Christophe; Kaaniche, Nesrine; Laurent, Maryline; Rocher, Pierre-Olivier; Garcia-Alfaro, Joaquin

Anonymous Certification for an e-Assessment Framework Proceedings Article

In: 22nd Nordic Conference on Secure IT Systems (NordSec 2017) Tartu, Estonia, pp. 70–85, Springer, 2017.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Doynikova, Elena; Kotenko, Igor; Garcia-Alfaro, Joaquin

Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric Proceedings Article

In: Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723, pp. 293–302, Springer, 2017.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin

Towards a Security Event Data Taxonomy Proceedings Article

In: 12th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2017), Dinard, France, pp. 29–45, Springer, 2017.

Links | BibTeX | Tags:

Ahmad, Abdel; Barbeau, Michel; Garcia-Alfaro, Joaquin; Kassem, Jamil; Kranakis, Evangelos; Porretta, Steven

Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band Proceedings Article

In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 3–12, Springer, 2017.

Links | BibTeX | Tags:

Barbeau, Michel; Garcia-Alfaro, Joaquin; Kranakis, Evangelos; Porretta, Steven

The Sound of Communication in Underwater Acoustic Sensor Networks Proceedings Article

In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 13–23, Springer, 2017.

Links | BibTeX | Tags:

Motzek, Alexander; Gonzalez-Granadillo, Gustavo; Debar, Hervé; Garcia-Alfaro, Joaquin; Möller, Ralf

Selection of Pareto-efficient Response Plans based on Financial and Operational Assessments Journal Article

In: EURASIP Journal on Information Security, vol. 2017, iss. 12, pp. 1–22, 2017.

Links | BibTeX | Tags:

Rubio-Hernan, Jose; Cicco, Luca De; Garcia-Alfaro, Joaquin

On the use of Watermark-based Schemes to Detect Cyber-Physical Attacks Journal Article

In: EURASIP Journal on Information Security, vol. 2017, iss. 8, pp. 1–25, 2017.

Links | BibTeX | Tags:

Garcia-Alfaro, Joaquin; Martinez-Perez, Gregorio

Introduction to the special section on critical systems modelling and security Journal Article

In: Computers and Electrical Engineering, vol. 59, pp. 73–75, 2017.

Links | BibTeX | Tags:

LÉDEL, Thomas C

Cyber-résilience des infrastructures critiques Analyse préventive des défaillances d ' origine malveillante PhD Thesis

IMT Atlantique, 2017.

BibTeX | Tags:

Foley, Simon N; Gollmann, Dieter; Snekkenes, Einar

Computer Security--ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Book

Springer, 2017.

BibTeX | Tags:

Ismail, Ziad; Kiennert, Christophe; Leneutre, Jean; Chen, Lin

A game theoretical model for optimal distribution of network security resources Proceedings Article

In: International Conference on Decision and Game Theory for Security, pp. 234–255, Springer 2017.

BibTeX | Tags:

Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

Discovery and registration protocol Proceedings Article

In: International Conference on Information Systems Security, pp. 243–262, Springer 2017.

BibTeX | Tags:

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Pieczul, Olgierd; Foley, Simon; Zurko, Mary Ellen

Developer-centered security and the symmetry of ignorance Journal Article

In: ACM International Conference Proceeding Series, pp. 46–56, 2017, ISBN: 9781450363846.

Abstract | Links | BibTeX | Tags: •Security and privacy Usability in security and p, Software security engineering

Kabil, Alexandre; Kabil, Alexandre; Collaborative, Cybercopd Visualisation; Atlantique, I M T; Kabil, Alexandre

CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité To cite this version : HAL Id : hal-01577868 CyberCOP3D : Visualisation Collaborative et Immersive pour la cybersécurité Immersive Collaborative Visualization for Cyber Sécurity Journal Article

In: 2017.

BibTeX | Tags: a, collaborative visualization, common operational, Cyber security, des pratiques, ectuer, fonction des donn{é}es et, human, n de disposer d, nous allons e, un cas d, utilisation r{é}el

Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

DIscovery and registration protocol: For device and person identity management in IoT Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10717 LNCS, pp. 243–262, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Identity management, IoT, MQTT, OAuth, Security

Pahl, Marc Oliver

The iLab Concept: Making Teaching Better, at Scale Journal Article

In: IEEE Communications Magazine, vol. 55, no. 11, pp. 178–185, 2017, ISSN: 01636804.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin

Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances Journal Article

In: IEEE Access, vol. 6, pp. 8810–8828, 2017.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Garcia-Alfaro, Joaquin; Debar, Hervé

A polytope-based approach to measure the impact of events against critical infrastructures Journal Article

In: Journal of Computer and System Sciences, vol. 83, no. 1, pp. 3–21, 2017.

Links | BibTeX | Tags:

Rubio-Hernán, José Manuel

Detection of attacks against cyber-physical industrial systems. (Détection des attaques contre les systèmes cyber-physiques industriels) PhD Thesis

Telecom & Management SudParis, France, 2017.

Links | BibTeX | Tags:

Pahl, Marc-Oliver

The ilab concept: Making teaching better, at scale Journal Article

In: IEEE Communications Magazine, vol. 55, no. 11, pp. 178–185, 2017.

BibTeX | Tags:

2016

Rubio-Hernan, Jose; Cicco, Luca De; Garcia-Alfaro, Joaquin

Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks Proceedings Article

In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 3–19, Springer, 2016.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Alvarez, Ender; Motzek, Alexander; Merialdo, Matteo; Garcia-Alfaro, Joaquin; Debar, Hervé

Towards an Automated and Dynamic Risk Management Response System Proceedings Article

In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 37–53, Springer, 2016.

Links | BibTeX | Tags:

Rubio-Hernan, Jose; Rodolfo-Mejias, Juan; Joaquin, Garcia-Alfaro

Security of Cyber-Physical Systems. From Theory to Testbeds and Validation Proceedings Article

In: 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems (CyberICPS 2016), pp. 3–18, Springer, 2016.

Links | BibTeX | Tags:

Gonzalez-Granadillo, Gustavo; Garcia-Alfaro, Joaquin; Debar, Hervé

An n-sided polygonal model to calculate the impact of cyber security events Proceedings Article

In: 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016, pp. 87–102, Springer, 2016.

Links | BibTeX | Tags:

Monrose, Fabien; Dacier, Marc; Blanc, Gregory; Garcia-Alfaro, Joaquin

Research in Attacks, Intrusions, and Defenses (19th International Symposium, RAID 2016) Book

2016.

Links | BibTeX | Tags:

246 entries « 4 of 5 »