Michel
Barbeau, Erwan Beurier, Joaquin Garcia‐alfaro, Randy Kuang, Marc-Oliver
Pahl, et al.. The Quantum What? Advantage, Utopia or Threat?. Digitale Welt, 2021, 5 (1), pp.34-39. ⟨10.1007/s42354-021-0397-6⟩. ⟨hal-03628446⟩
Michel
Barbeau, Erwan Beurier, Joaquin Garcia‐alfaro, Randy Kuang, Marc-Oliver
Pahl, et al.. 1. Quantum Applications - Fachbeitrag: The Quantum What?
Advantage, Utopia or Threat?. Digitale Welt, 2021, 5, pp.34-39. ⟨10.1007/s42354-021-0402-0⟩. ⟨hal-03329369⟩
Michel
Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Fillipe Santos.
GPS-free, error tolerant path planning for swarms of micro aerial
vehicles with quality amplification ‡. Sensors, 2021, 21 (14), pp.4731:1-4731:16. ⟨10.3390/s21144731⟩. ⟨hal-03628455⟩
Mikaël
Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An
efficient user-centric consent management design for multiservices
platforms. Security and communication networks, 2021, pp.1-19. ⟨10.1155/2021/5512075⟩. ⟨hal-03753287⟩
Arie
Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical
cross-layer radio frequency-based authentication scheme for internet of
things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
Paul
Marillonnet, Maryline Laurent, Mikaël Ates, Maryline Laurent. Personal
information self-management: A survey of technologies supporting
administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
Ehsan
Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Joaquin
Garcia‐alfaro, et al.. DECA: a Dynamic Energy cost and Carbon
emission-efficient Application placement method for Edge Clouds. IEEE Access, 2021, 9, pp.70192-70213. ⟨10.1109/ACCESS.2021.3075973⟩. ⟨hal-03208423v2⟩
Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
Lukas
Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et
al.. Post-quantum era privacy protection for intelligent
infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
Michel
Barbeau, Frederic Cuppens, Nora Cuppens, Romain Dagnas, Joaquin
Garcia‐alfaro. Resilience estimation of Cyber-Physical Systems via
quantitative metrics. IEEE Access, 2021, 9, pp.46462-46475. ⟨10.1109/ACCESS.2021.3066108⟩. ⟨hal-03626725⟩
Houda Jmila, Gregory Blanc. Towards security-aware 5G slice embedding. Computers and Security, 2021, 100, pp.102075:1-102075:18. ⟨10.1016/j.cose.2020.102075⟩. ⟨hal-03123977⟩
Hassan
Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, et
al.. TRESC: Towards redesigning existing symmetric ciphers. Microprocessors and Microsystems: Embedded Hardware Design , 2021, 87, pp.103478 (11). ⟨hal-03549341⟩
Nesrine
Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set
homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
Nesrine
Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing
technologies for solving the privacy-personalization paradox: Taxonomy
and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807:1-102807:85. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-02934481⟩
Mariana
Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquin
Garcia‐alfaro. Switched-based resilient control of cyber-physical
systems. IEEE Access, 2020, 8, pp.212194 - 212208. ⟨10.1109/ACCESS.2020.3039879⟩. ⟨hal-03113904⟩
Gustavo
Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia‐alfaro, Igor
Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure
selection using hypergraphs. Journal of information security and applications, 2020, 54, pp.102562:1-102562:14. ⟨10.1016/j.jisa.2020.102562⟩. ⟨hal-03125762⟩
David
Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia‐alfaro. A real-time
query log protection method for web search engines. IEEE Access, 2020, 8, pp.87393-87413. ⟨10.1109/ACCESS.2020.2992012⟩. ⟨hal-03125769⟩
Nesrine
Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based
user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-02590316⟩
Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
François
Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte,
Hervé Debar, et al.. Solving security constraints for 5G slice
embedding: a proof-of-concept. Computers and Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
Sana
Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah
Attia. Accountable privacy preserving attribute based framework for
authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03116930⟩
Nesrine
Kaaniche, Christophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro.
Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 2019, pp.1-15. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-02390282⟩
Jema
David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto,
Gregory Blanc, et al.. An empirical approach to phishing countermeasures
through smart glasses and validation agents. IEEE Access, 2019, 7, pp.130758-130771. ⟨10.1109/access.2019.2940669⟩. ⟨hal-02438600⟩
Abdel‐mehsen
Ahmad, Michel Barbeau, Joaquin Garcia‐alfaro, Jamil Kassem, Evangelos
Kranakis. Tuning the demodulation frequency based on a normalized
trajectory model for mobile underwater acoustic communications. Transactions on emerging telecommunications technologies, 2019, ⟨10.1002/ett.3712⟩. ⟨hal-02390285⟩
Abdel‐mehsen
Ahmad, Michel Barbeau, Joaquin Garcia‐alfaro, Jamil Kassem, Evangelos
Kranakis. Tuning the demodulation frequency based on a normalized
trajectory model for mobile underwater acoustic communications. Transactions on emerging telecommunications technologies, In press, ⟨10.1002/ett.3712⟩. ⟨hal-02393482⟩
Qing
Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, et
al.. Guest Editorial The Convergence of Blockchain and IoT:
Opportunities, Challenges and Solutions. IEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩. ⟨hal-02315884⟩
Christophe
Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The
influence of conception paradigms on data protection in e-learning
platforms: a case study. IEEE Access, 2019, 7, pp.64110-64119. ⟨10.1109/ACCESS.2019.2915275⟩. ⟨hal-02281231⟩
Christophe
Kiennert, Ismail Ziad, Hervé Debar, Jean Leneutre. A survey on
game-theoretic approaches for intrusion detection and response
optimization. ACM Computing Surveys, 2019, 51 (5), pp.article 90 -. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
Christophe
Kiennert, Pierre-Marie Bajan, Hervé Debar. Evaluating security
products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
Nazatul
Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a
secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
Abdel-Mehsen
Ahmad, Jamil Kassem, Michel Barbeau, Evangelos Kranakis, Steven
Porretta, et al.. Doppler effect in the acoustic ultra low frequency
band for wireless underwater networks. Mobile Networks and Applications, 2018, 23 (5), pp.1282 - 1292. ⟨10.1007/s11036-018-1036-9⟩. ⟨hal-02013724⟩
Joaquin
Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special
section on critical systems modelling and security (third edition). Computers and Electrical Engineering, 2018, 71, pp.1040 - 1042. ⟨10.1016/j.compeleceng.2018.10.008⟩. ⟨hal-02013479⟩
Jose
Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro.
Cyber‐physical architecture assisted by programmable networking. Internet technology letters, 2018, 1 (4), pp.e44-1 - e44-8. ⟨10.1002/itl2.44⟩. ⟨hal-01869475⟩
Jose
Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive
control-theoretic detection of integrity attacks against cyber-physical
industrial systems. Transactions on emerging telecommunications technologies, 2018, 29 (7), pp.e3209-1 - e3209-17. ⟨10.1002/ett.3209⟩. ⟨hal-01823618⟩
Xavier
Baró‐solé, Ana E. Guerrero‐roldan, Josep Prieto‐blázquez, Anna Rozeva,
Orlin Marinov, et al.. Integration of an adaptive trust-based
e-assessment system into virtual learning environments : the TeSLA
project experience. Internet technology letters, 2018, 1 (4), pp.e56-1 - e56-6. ⟨10.1002/itl2.56⟩. ⟨hal-02013504⟩
Gustavo
Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin
Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk
management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
Gustavo
Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin
Garcia-Alfaro. Hypergraph-driven mitigation of cyber-attacks. Internet technology letters, 2018, 1 (3), pp.e38-1 - e38-6. ⟨10.1002/itl2.38⟩. ⟨hal-02013488⟩
Sana
Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah
Attia. PHOABE: securely outsourcing multi-authority attribute based
encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
Gustavo
Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro.
Using an event data taxonomy to represent the impact of cyber events as
geometrical instances. IEEE Access, 2018, 6, pp.8810 - 8828. ⟨10.1109/ACCESS.2017.2740402⟩. ⟨hal-01729364⟩
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
Alexander
Motzek, Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Joaquin
Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans
based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des télécommunications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
Maryline Laurent. Pare-feu: le couteau suisse de la sécurité informatique. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
Nesrine
Kaaniche, Maryline Laurent. Data security and privacy preservation in
cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
Wei
Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, Meng
Yao. Secure localization in the presence of colluders in WSNs. Sensors, 2017, 17 (8), pp.1892-1 - 1892-15. ⟨10.3390/s17081892⟩. ⟨hal-01701140⟩
Jose
Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of
watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security, 2017, 2017, pp.8-1 - 8-25. ⟨10.1186/s13635-017-0060-9⟩. ⟨hal-01701167⟩
Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2017, 59, pp.73 - 75. ⟨10.1016/j.compeleceng.2017.05.027⟩. ⟨hal-02013472⟩
Gustavo
Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. A
polytope-based approach to measure the impact of events against critical
infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
Khalifa
Toumi, Hela Sfar, Joaquin Garcia-Alfaro. Reputation trust mechanism
under the organizational-based access control model. Security and communication networks, 2016, 9 (18), pp.5295 - 5310. ⟨10.1002/sec.1698⟩. ⟨hal-01453259⟩
Ziad
Ismail, Christophe Kiennert, Jean Leneutre, David Bateman, Lin Chen.
Auditing a Cloud Provider's Compliance with Data Backup Requirements: A
Game Theoretical Analysis. IEEE Transactions on Information Forensics and Security, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩. ⟨hal-01418390⟩
Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Channel selection using a multiple radio model. Journal of Network and Computer Applications (JNCA), 2016, 64 (C), pp.113 - 123. ⟨10.1016/j.jnca.2016.01.021⟩. ⟨hal-01332350⟩
Gustavo
Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez
Lopez, Mohammed El Barbori, Hervé Debar. Selecting optimal
countermeasures for attacks against critical systems using the attack
volume model and the RORI index. Computers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩. ⟨hal-01255033⟩
Joaquin
Garcia-Alfaro, Francesco Longo, Gregorio Martinez-Perez. Introduction
to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2015, 47, pp.255 - 257. ⟨10.1016/j.compeleceng.2015.11.016⟩. ⟨hal-01332012⟩
Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Remarks on Peinado et al.'s analysis of J3Gen. Sensors, 2015, 15 (3), pp.6217 - 6220. ⟨10.3390/s150306217⟩. ⟨hal-01263408⟩
Erwan
Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Automatic
Generation of Correlation Rules to Detect Complex Attack Scenarios. Journal of Information Assurance and Security, 2015, 10 (3), pp.11. ⟨hal-01241807⟩
Yosra
Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A
survey of collaborative services and security-related issues in modern
wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
Romaric
Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed
Kaâniche, et al.. An Invariant-based Approach for Detecting Attacks
against Data in Web Applications. International journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩. ⟨hal-01083296⟩
Yosra
Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent.
Lightweight collaborative key establishment scheme for the Internet of
Things. Computer Networks, 2014, 64, pp.273 - 295. ⟨10.1016/j.comnet.2014.02.001⟩. ⟨hal-01263479⟩
Wiem
Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Yannick
Chevalier, Frédéric Cuppens. KEDGEN2: A key establishment and derivation
protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications (JNCA), 2014, 39, pp.152 - 166. ⟨10.1016/j.jnca.2013.06.002⟩. ⟨hal-00845810⟩
Joan
Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. On the
similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on emerging telecommunications technologies, 2014, 25 (2), pp.151 - 154. ⟨10.1002/ett.2600⟩. ⟨hal-01286097⟩
Gustavo
Daniel Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire
Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
Wei
Shi, Joaquin Garcia-Alfaro, Jean-Pierre Corriveau. Searching for a
black hole in interconnected networks using mobile agents and tokens. Journal of Parallel and Distributed Computing, 2014, 74 (1), pp.1945 - 1958. ⟨10.1016/j.jpdc.2013.08.009⟩. ⟨hal-01255466⟩
Yosra
Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Trust
management system design for the Internet of Things: a context-aware and
multi- service approach. Computers and Security, 2013, 39 (Part B), pp.351 - 365. ⟨10.1016/j.cose.2013.09.001⟩. ⟨hal-01281972⟩
Eugenia
I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis,
Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A Privacy-Aware
Access Control Model for Distributed Network Monitoring. Computers and Electrical Engineering, 2013, 39 (7), pp.2263-2281. ⟨10.1016/j.compeleceng.2012.08.003⟩. ⟨hal-00949776⟩
Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Onion routing circuit construction via latency graphs. Computers and Security, 2013, 37, pp.197-214. ⟨10.1016/j.cose.2013.03.003⟩. ⟨hal-00846345⟩
Yosra
Ben Mustapha, Hervé Debar. Service Dependencies-Aware Policy
Enforcement Framework Based on Hierarchical Colored Petri Net. International Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩. ⟨hal-00858941⟩
Frédéric
Cuppens, Nora Cuppens-Bouhlahia, Ernesto Damiani, Radu State, Joaquin
Garcia-Alfaro, et al.. SETOP'2012 and FPS'2012 special issue. Journal of information security and applications, 2013, 18 (1), pp.1 - 96. ⟨10.1016/j.jisa.2013.08.004⟩. ⟨hal-01260763⟩
Safaa
Hachana, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Joaquin
Garcia-Alfaro. Semantic Analysis of Role Mining Results and Shadowed
Roles Detection. Information Security Technical Report, 2013, 17 (4), pp.131 - 147. ⟨hal-01213882⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. A
multipath routing strategy to prevent flooding disruption attacks in
link state routing protocols for MANETs. Journal of Network and Computer Applications (JNCA), 2013, 36 (2), pp.744 - 755. ⟨10.1016/j.jnca.2012.12.013⟩. ⟨hal-00846121⟩
Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. J3Gen : a PRNG for low-cost passive RFID. Sensors, 2013, 13 (3), pp.3816-3830. ⟨10.3390/s130303816⟩. ⟨hal-00846567⟩
García-Alfaro
Joaquin, Cuppens Frédéric, Nora Cuppens-Boulahia, Salvador Martinez
Perez, Jordi Cabot. Management of stateful firewall misconfiguration. Computers and Security, 2013, 39 (11), pp.64-85. ⟨hal-00869328⟩
Wei
Shi, Michel Barbeau, Joaquin Garcia Alfaro, Jean-Pierre Corriveau.
Handling the Evil Ring Attack on Localization and Routing in Wireless
Sensor Networks. Ad Hoc & Sensor Wireless Networks, 2012, 17 (1), pp.87-102. ⟨hal-00945359⟩
Ethmane El Moustaine, Maryline Laurent. Systèmes et techniques RFID : risques et solutions de sécurité. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2012, H5325. ⟨hal-00770788⟩
Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N. ⟨hal-00738459⟩
Patrick
Battistello, Joaquin Garcia Alfaro, Cyril Delétré. Transaction-based
authentication and key agreement protocol for inter-domain VoIP. Journal of Network and Computer Applications (JNCA), 2012, 35 (5), pp.1579 - 1597. ⟨10.1016/j.jnca.2012.02.010⟩. ⟨hal-02135194⟩
Gustavo
Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé
Debar. An ontology-driven approach to model SIEM information and
operations using the SWRL formalism. International journal of electronic security and digital forensics, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩. ⟨hal-00724431⟩
Aymen Boudguiga, Maryline Laurent. On the use of ID-based cryptography for the definition of new EAP authentication methods. International journal for information security research (IJISR), 2012, 2 (1 & 2), pp.246-255. ⟨hal-00724636⟩
Laurent
Gomez, Maryline Laurent, Ethmane El Moustaine. Risk assessment along
supply chain : a RFID and wireless sensor network integration approach. Sensors & Transducers Journal, 2012, 14 (2), pp.269-282. ⟨hal-00712579⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis.
Preventing the cluster formation attack against the hierarchical OLSR
protocol. Lecture Notes in Computer Science, 2012, 6888 (1), pp.118-131. ⟨hal-00724742⟩
Eugenia
I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis,
Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A contextual
privacy-aware access control model for network monitoring workflows:
work in progress. Lecture Notes in Computer Science, 2012, 6888 (1), pp.208-217. ⟨hal-00704149⟩
Thomas
Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. User
Data Confidentiality in an Orchestration of Web Services. Journal of Information Assurance and Security, 2012, 7 (1), pp.32-40. ⟨hal-00735996⟩
Wiem
Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro.
Formal verification of a key establishment protocol for EPC Gen2 RFID
systems: work in progress. Lecture Notes in Computer Science, 2012, 6888 (1), pp.242-252. ⟨10.1007/978-3-642-27901-0⟩. ⟨hal-00704144⟩
Joaquin
Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Secure
geolocalization of wireless sensor nodes in the presence of misbehaving
anchor nodes. Annals of Telecommunications - annales des télécommunications, 2011, 66 (9-10), pp.535 - 552. ⟨10.1007/s12243-010-0221-z⟩. ⟨hal-02135370⟩
Joan
Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. A
practical implementation attack on weak pseudorandom number generator
designs for EPC Gen2 tags. Wireless Personal Communications, 2011, 59 (1), pp.27-42. ⟨10.1007/s11277-010-0187-1⟩. ⟨hal-00623631⟩
Stere
Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro,
Laurent Toutain. Dynamic deployment of context-aware access control
policies for constrained security devices. Journal of Systems and Software, 2011, 84 (7), pp.1144 - 1159. ⟨10.1016/j.jss.2011.02.005⟩. ⟨hal-00609526⟩
Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Proactive threshold cryptosystem for EPC tags. Ad Hoc & Sensor Wireless Networks, 2011, 12 (3-4), pp.187-208. ⟨hal-00623637⟩
Pere
Montolio-Aranda, Joaquin Garcia Alfaro, David Megias. Improved flooding
of broadcast messages using extended multipoint relaying. Journal of Network and Computer Applications (JNCA), 2011, 34 (2), pp.542-550. ⟨10.1016/j.jnca.2010.12.011⟩. ⟨hal-00704242⟩
Andrei Vlad Sambra, Maryline Laurent. MyProfile - Decentralized User Profile and Identity on the Web. W3C's Federated Social Web (FSW2011), 2011. ⟨hal-00745348⟩
Aymen Boudguiga, Maryline Laurent. Sécurité dans les réseaux 802.11. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2010, TE7377. ⟨hal-01355251⟩
Ludovic Mé, Hervé Debar. New directions in Intrusion Detection and Alert Correlation. Revue I3 - Information Interaction Intelligence, 2010, 10 (1), pp.NC. ⟨hal-00534564⟩
Tony
Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved
performances of the cryptographically generated addresses thanks to ECC
and GPGPU. Computers and Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
Houssem
Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping
great autonomy while under the supervision of a provider. Computers and Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
Omar
Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An
EAP-EHash authentication method adapted to resource constrained
terminals. Annals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
Benjamin
Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé. A logic-based model
to support alert correlation in intrusion detection. Information Fusion, 2009, 10 (4), pp.285-299. ⟨10.1016/j.inffus.2009.01.005⟩. ⟨hal-00353059⟩
Jouni
Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika Tarvainen.
Processing Intrusion Detection Alert Aggregates with Time Series
Modeling. Information Fusion, 2009, 10 (4), pp.312-324. ⟨hal-00353056⟩
Diala Abi Haidar, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. XeNA: an access negotiation framework using XACML. Annals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩. ⟨hal-00448945⟩
Maher
Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental
measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
Maryline Laurent. Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
Maryline Laurent. Sécurité des systèmes P2P de sauvegarde distribuée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 16. ⟨hal-01355031⟩
Joaquin
Garcia Alfaro, Nora Cuppens-Bouhlahia, Frédéric Cuppens. Complete
analysis of configuration rules to guarantee reliable network security
policies. International Journal of Information Security, 2008, 7 (2), pp.103 - 122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-01207771⟩
Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 14. ⟨hal-01355033⟩
Joaquin
Garcia‐alfaro, N. Boulahia-Cuppens, F. Cuppens. Complete analysis of
configuration rules to guarantee reliable network security policies. International Journal of Information Security, 2008, 7 (2), pp.103-122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-03628752⟩
Maryline Laurent, Hakima Chaouchi. Des réseaux ad hoc économiquement viables. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 11. ⟨hal-01355035⟩
Maryline Laurent. Les architectures de fédération d'identité et la garantie de notre vie privée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2007, 9. ⟨hal-01355037⟩
Hervé
Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia. Enabling
automated threat response through the use of a dynamic security policy.
Journal in Computer Virology (JCV), 2007, 3 (3), pp.195-210. ⟨hal-00439845⟩
Frédéric
Cuppens, Fabien Autrel, Yacine Bouzida, Joaquin Garcia‐alfaro, Sylvain
Gombault, et al.. Anti-correlation as a criterion to select appropriate
counter-measures in an intrusion detection network. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197-217. ⟨10.1007/BF03219974⟩. ⟨hal-03646855⟩
Frédéric
Cuppens, Fabien Autrel, Yacine Bouzida, Sylvain Gombault, Thierry Sans,
et al.. L'anti-corrélation comme critère de sélection de contre-mesures
dans le contexte de la détection d'intrusion. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197 - 217. ⟨hal-01923573⟩
Joaquin
Garcia‐alfaro, Sergio Castillo, Guillermo Navarro-Arribas, Joan
Borrell. ACAPS: An Access Control Mechanism to Protect the Components of
an Attack Prevention System. International Journal of Computer Science and Network Security, 2005, 5 (11), pp.87-94. ⟨hal-03628711⟩
Hervé
Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, et
al.. Détection d'intrusions : corrélation d'alertes. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p. ⟨hal-00356418⟩
Maryline Laurent. Protocole IPsec. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2003, TE7545. ⟨hal-01331303⟩
Conference papers335 documents
Maxime
Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic
Mé, et al.. Errors in the CICIDS2017 dataset and the significant
differences in detection performances it makes. CRiSIS 2022 - International Conference on Risks and Security of Internet and Systems, Dec 2022, Sousse, Tunisia. pp.1-16. ⟨hal-03775466⟩
S. Seng, Y. Laarouci, Joaquin Garcia‐alfaro. Implementation of a stateful network protocol intrusion detection systems. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩. ⟨hal-03843013⟩
Adrien
Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric
Majorczyk, et al.. Towards generic quality assessment of synthetic
traffic for evaluating intrusion detection systems. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675359⟩
Maxime
Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic
Mé, et al.. Detecting APT through graph anomaly detection. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675346⟩
Sandrine Bayle, Joaquin Garcia‐alfaro. Plateforme de sécurisation des villes: le projet européen IMPETUS. Colloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France. ⟨emse-03624167⟩
Mustafizur
R. Shahid, Hervé Debar. CVSS-BERT: Explainable Natural Language
Processing to Determine the Severity of a Computer Security
Vulnerability from its Description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨hal-03430826⟩
Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Ontology-based attack graph enrichment. TIEMS 2021: 28th International Emergency Management Society annual conference, Dec 2021, Online, France. ⟨hal-03628443⟩
Alexandre
Dey, Benjamin Costé, Éric Totel, Adrien Bécue. Simulation réaliste
d'utilisateurs pour les systèmes d'information en Cyber Range. CAID 2021 : applications de l’Intelligence Artificielle aux problématiques défense, Nov 2021, Rennes, France. ⟨hal-03437031⟩
Seryne
Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A
validated privacy-utility preserving recommendation system with local
differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Risky zone avoidance strategies for drones. CCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering, Sep 2021, Online, France. pp.1-6, ⟨10.1109/CCECE53047.2021.9569172⟩. ⟨hal-03628452⟩
Fatemeh
Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis,
Tao Wan. Pilot contamination attack detection in 5G massive MIMO
systems using generative adversarial networks. MEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking, Sep 2021, Athens, Greece. pp.479-484, ⟨10.1109/MeditCom49071.2021.9647674⟩. ⟨hal-03628454⟩
Michel
Barbeau, Frederic Cuppens, Nora Cuppens, Dagnas, Romain, Joaquin
Garcia‐alfaro. Metrics to enhance the resilience of cyber-physical
systems. TRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Dec 2020, Guangzhou (online), China. pp.1167-1172, ⟨10.1109/TrustCom50675.2020.00156⟩. ⟨hal-03125741⟩
Olivier Levillain. GASP: a Generic Approach to Secure network Protocols. RESSI 2020: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Evry (online), France. ⟨hal-03114203⟩
Laetitia
Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Novelty detection
on graph structured data to detect network intrusions. CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France. ⟨hal-03115308⟩
Mustafizur
Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar.
Generative Deep Learning for Internet of Things Network Traffic
Generation. 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩. ⟨hal-03127899⟩
Neetu
Sharma, Rajeev Anand-Sahu, Vishal Saraswat, Joaquin Garcia‐alfaro.
Anonymous proof-of-asset transactions using designated blind signatures.
FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩. ⟨hal-03125748⟩
Mariana
Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquin Garcia-Alfaro.
Cyber-resilience evaluation of Cyber-Physical Systems. International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩. ⟨hal-03115317⟩
Olivier Levillain. Implementation flaws in TLS stacks: lessons learned and study of TLS 1.3 benefits. CRiSIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris (en ligne), France. pp.87-104, ⟨10.1007/978-3-030-68887-5_5⟩. ⟨hal-03114218⟩
Michel
Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Geocaching-inspired
navigation for micro aerial vehicles with fallible place recognition. ADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless, Oct 2020, Bari (online), Italy. pp.55-70, ⟨10.1007/978-3-030-61746-2_5⟩. ⟨hal-03125760⟩
Elkin
Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar. Automated
saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
Michel
Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Capacity
requirements in networks of quantum repeaters and terminals. QCE 2020: IEEE International Conference on Quantum Computing and Engineering, Oct 2020, Denver (online), United States. pp.148-157, ⟨10.1109/QCE49297.2020.00028⟩. ⟨hal-03125753⟩
Franklin
Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy
and utility for energy services: an application to demand response
protocols. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
Laetitia
Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Forensic Analysis
of Network Attacks: Restructuring Security Events as Graphs and
Identifying Strongly Connected Sub-graphs. WTMC 2020: 5th
International Workshop on Traffic Measurements for Cybersecurity and
EuroS&PW 2020: IEEE European Symposium on Security and Privacy
Workshops, Sep 2020, Genova, Italy. pp.1-9, ⟨10.1109/EuroSPW51379.2020.00083⟩. ⟨hal-02950490⟩
Omair
Faraj, David Megias, Abdel-Mehsen Ahmad, Joaquin Garcia‐alfaro.
Taxonomy and challenges in machine learning-based approaches to detect
attacks in the internet of things. ARES 2020: 15th international conference on Availability, Reliability and Security, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, ⟨10.1145/3407023.3407048⟩. ⟨hal-03125767⟩
Paul
Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. An
identity-matching process to strengthen trust in federated-identity
architectures. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-02910406⟩
Nathanaël
Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie
Chabridon, et al.. Privacy-preserving content-based publish/subscribe
with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
Nesrine
Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni
Russello. Prov-Trust: towards a trustworthy SGX-based data provenance
system. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-02910405⟩
Laetitia
Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Sec2graph: Network
Attack Detection Based on Novelty Detection on Graph Structured Data. DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.238-258, ⟨10.1007/978-3-030-52683-2_12⟩. ⟨hal-02950489⟩
Aina Toky Rasoamanana, Olivier Levillain. Wombat : one more Bleichenbacher toolkit. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114212⟩
François Contat, Grégory Bénassy, Julien Buttin Le Meur, Olivier Levillain. Que faut-il attendre de DNS-over-HTTPS ?. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114209⟩
Nesrine
Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir.
Privacy preserving cooperative computation for personalized web search
applications. SAC 2020: 35th ACM/SIGAPP Symposium on Applied Computing, Mar 2020, Brno (online), Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03116971⟩
Aida
Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré. CoRA: a scalable
Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
Cristina
Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomarti,
Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. LockDown: balance
availability attack against lightning network channels. FC 2020: 24th international conference on Financial Cryptography and Data Security, Feb 2020, Sabah, Malaysia. pp.245-263, ⟨10.1007/978-3-030-51280-4_14⟩. ⟨hal-03125777⟩
Houda
Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim El Yacoubi. Siamese
network based feature learning for improved intrusion detection. ICONIP 2019: International Conference on Neural Information Processing, Dec 2019, Sydney, Australia. pp.377-389, ⟨10.1007/978-3-030-36708-4_31⟩. ⟨hal-02421070⟩
Eva Gagliardi, Olivier Levillain. Analysis of QUIC session establishment and its implementations. 13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩. ⟨hal-02468596⟩
Michel
Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos.
Quality amplification of error prone navigation for swarms of micro
aerial vehicles. GLOBECOM 2019: IEEE Global Communications workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024394⟩. ⟨hal-03125798⟩
Michel
Barbeau, Joaquin Garcia-Alfaro. Faking and discriminating the
navigation data of a micro aerial vehicle using quantum generative
adversarial networks. GLOBECOM 2019: IEEE Global Communications Workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024550⟩. ⟨hal-03125799⟩
Aina Toky Rasoamanana, Olivier Levillain. Wombat: one more Bleichenbacher attack toolkit. GreHack 2019, Nov 2019, Grenoble, France. ⟨hal-02468592⟩
Fabien
Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource
allocation for secure SDN-based virtual network migration. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-10, ⟨10.1109/nca.2019.8935027⟩. ⟨hal-02438632⟩
Mustafizur
Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Anomalous
communications detection in IoT networks using sparse autoencoders. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-5, ⟨10.1109/NCA.2019.8935007⟩. ⟨hal-02423336⟩
Mariana
Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin
Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
Vicenç Torra, Joaquin Garcia-Alfaro. Towards an adaptive defuzzification: using numerical Choquet integral. MDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence, Sep 2019, Milan, Italy. pp.113-125, ⟨10.1007/978-3-030-26773-5_11⟩. ⟨hal-02393562⟩
Houda Jmila, Gregory Blanc. Designing security-aware service requests for NFV-enabled networks. ICCCN 2019: 28th International Conference on Computer Communication and Networks, Jul 2019, Valencia, Spain. pp.1-9, ⟨10.1109/icccn.2019.8847058⟩. ⟨hal-02438649⟩
Jordi
Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro
Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro. On the
difficulty of hiding the balance of lightning network channels. ASIACCS 2019: 14th ASIA Conference on Computer and Communications Security, Jul 2019, Auckland, New Zealand. pp.602-612, ⟨10.1145/3321705.3329812⟩. ⟨hal-02390275⟩
David
Lanoe, Michel Hurfin, Eric Totel, Carlos Maziero. An Efficient and
Scalable Intrusion Detection System on Logs of Distributed Applications.
SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩. ⟨hal-02409487⟩
Charles
Xosanavongsa, Eric Totel, Olivier Bettan. Discovering Correlations: A
Formal Definition of Causal Dependency Among Heterogeneous Events. EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩. ⟨hal-02363431⟩
Olivier
Paul, Grégory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle
Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif
de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
Maryline
Laurent, Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas
Charbonnier, et al.. MOOC Sécurité des réseaux: un apprentissage massif
de la sécurité par la théorie et la pratique. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-4. ⟨hal-02437172⟩
Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
Maryline
Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated
and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Geocaching-inspired resilient path planning for drone swarms. MISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking, Apr 2019, Paris, France. pp.620 - 625, ⟨10.1109/INFCOMW.2019.8845318⟩. ⟨hal-02127604⟩
Pierre-Marie
Bajan, Christophe Kiennert, Hervé Debar. Methodology of a network
simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
Stevan
Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean
Leneutre. Towards end-to-end privacy for publish/subscribe architectures
in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware
and Applications for the Internet of Things at the 2018 ACM/IFIP
International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
Mariana
Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin
Garcia-Alfaro. A study on mitigation techniques for SCADA-driven
cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
David
Lanoe, Michel Hurfin, Eric Totel. A Scalable and Efficient Correlation
Engine to Detect Multi-step Attacks in Distributed Systems. SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩. ⟨hal-01949183⟩
Jamil
Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. The
implementation of GNU radio blocks for decoding long-lasting frames in
mobile underwater acoustic communications. GRCON 2018: 8th Annual GNU Radio Conference, Sep 2018, Henderson, United States. pp.1 - 8. ⟨hal-02013656⟩
Sophie
Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem.
Augmented chain of ownership : configuring IoT devices with the help of
the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
Abdel-Mehsen
Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassem, Evangelos
Kranakis, et al.. Low frequency mobile communications in underwater
networks. ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.239 - 251, ⟨10.1007/978-3-030-00247-3_22⟩. ⟨hal-02013548⟩
David
Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi
Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for
internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
Gustavo
Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A
pyramidal-based model to compute the impact of cyber security events. ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19 -, ⟨10.1145/3230833.3230847⟩. ⟨hal-01885053⟩
Gregory
Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de
Oca, et al.. Towards a 5G security architecture: articulating
software-defined security and security as a service. 5G-NS 2018: Workshop on 5G Networks Security, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, ⟨10.1145/3230833.3233251⟩. ⟨hal-01988053⟩
Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
Nesrine
Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based
Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
Pierre-Marie
Bajan, Hervé Debar, Christophe Kiennert. A new approach of network
simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
Maryline
Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted
access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
Jamil
Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. GNU
radio blocks for long-lasting frames in mobile underwater acoustic
communications. French GNU Radio days 2018, Jul 2018, Lyon, France. pp.1 - 2. ⟨hal-02013632⟩
Maryline Laurent, Nesrine Kaaniche. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, France. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
Aida
Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré.
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
Paul
Marillonnet, Mikaël Ates, Maryline Laurent. Etat de l'art des
technologies de la gestion des données personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie Privée, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
Cuong
Pham, Gregory Blanc, Hervé Debar. On automatic network environment
cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
Fabien Charmet, Gregory Blanc. Secure migration of virtual SDN topologies. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438748⟩
François
Boutigny, Stephane Betge-Brezetz, Hervé Debar, Gregory Blanc, Antoine
Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
Pernelle
Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle,
et al.. Connectivity Extraction in Cloud Infrastructures. 2017 13th International Conference on Network and Service Management (CNSM), Nov 2017, Tokyo, Japan. pp.1-5, ⟨10.23919/cnsm.2017.8256010⟩. ⟨hal-01593346⟩
Christophe
Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher,
Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment
framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
Steven
Porretta, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis.
Learning to communicate underwater: an exploration of limited mobility
agents. WUWNET 2017 :12th International Conference on Underwater Networks & Systems, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, ⟨10.1145/3148675.3148709⟩. ⟨hal-01740876⟩
Pernelle
Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle,
et al.. Connectivity Graph Reconstruction for Networking Cloud
Infrastructures. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Oct 2017, Cambridge, United States. ⟨10.1109/nca.2017.8171337⟩. ⟨hal-01612988⟩
Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
Fabien
Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa
Toumi. Preserving confidentiality during the migration of virtual SDN
topologies: a formal approach. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171392⟩. ⟨hal-01666374⟩
Ziad
Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen. A Game
Theoretical Model for Optimal Distribution of Network Security
Resources. Gamesec, Oct 2017, Vienna, Austria. ⟨10.1007/978-3-319-68711-7_13⟩. ⟨hal-01688475⟩
Gustavo
Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin
Garcia-Alfaro. Attack graph-based countermeasure selection using a
stateful return on investment metric. FPS 2017: 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. pp.293 - 302, ⟨10.1007/978-3-319-75650-9_19⟩. ⟨hal-01740860⟩
Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. STARLORD: Linked Security Data Exploration in a 3D Graph. VizSec - IEEE Symposium on Visualization for Cyber Security, Oct 2017, Phoenix, United States. pp.1 - 4, ⟨10.1109/VIZSEC.2017.8062203⟩. ⟨hal-01619234⟩
Abdel-Mehsen
Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassen, Evangelos
Kranakis, et al.. Doppler effect in the underwater acoustic ultra low
frequency band. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.3 - 12, ⟨10.1007/978-3-319-74439-1_1⟩. ⟨hal-01699512⟩
Michel
Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Steven Porretta.
The sound of communication in underwater acoustic sensor networks. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.13 - 23, ⟨10.1007/978-3-319-74439-1_2⟩. ⟨hal-01699521⟩
Collins
Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram,
Konstantinos Markantonakis, et al.. Serverless protocols for inventory
and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
Nesrine
Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert,
Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
Nesrine
Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert,
Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
Maxim
Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey
Chechulin, Igor Kotenko, et al.. Choosing models for security metrics
visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
Louis-Philippe
Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination
rate metric for privacy measurements which questions the benefit of
T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
Sana
Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah
Attia. Constant-size threshold attribute based signcryption for cloud
applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
Christophe
Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana
Durcheva, et al.. Security challenges in e-assessment and technical
solutions. IV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩. ⟨hal-01699388⟩
Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, Apr 2017, Belgrade, Serbia. pp.04-1 - 04-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
Gregory
Blanc, David Machniki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki
Kadobayashi, et al.. NECOMA: Nippon-European Cyberdefense-Oriented
Multilayer Analysis. EPS 2017: European Project Space on Networks, Systems and Technologies, Feb 2017, Porto, Portugal. pp.81 - 105, ⟨10.5220/0007902500810105⟩. ⟨hal-02065143⟩
Mounir
Assaf, David A Naumann, Julien Signoles, Eric Totel, Frédéric Tronel.
Hypercollecting Semantics and its Application to Static Analysis of
Information Flow. POPL 2017 - ACM Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.874-887, ⟨10.1145/3009837.3009889⟩. ⟨hal-01618360⟩
Khalifa
Toumi, Muhammad Sabir Idrees, Fabien Charmet, Reda Yaich, Gregory
Blanc. Usage control policy enforcement in SDN-based clouds: a dynamic
availability service use case. HPCC 2016 : 18th IEEE International Conference on High Performance Computing and Communications, Dec 2016, Sydney, Australia. pp.578 - 585, ⟨10.1109/HPCC-SmartCity-DSS.2016.0087⟩. ⟨hal-01449235⟩
Gustavo
Daniel Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. New types
of alert correlation for security information and event management
systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. NordSec 2016, Nov 2016, Oulu, Finland. pp.101--116, ⟨10.1007/978-3-319-47560-8_7⟩. ⟨hal-01387569⟩
Gustavo
Daniel Gonzalez Granadillo, Ender Alvarez, Alexander Motzek, Matteo
Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and
dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
Jose
Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered
watermarking control to handle cyber-physical integrity attacks. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.3 - 19, ⟨10.1007/978-3-319-47560-8_1⟩. ⟨hal-01450276⟩
Kim
Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key
agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
Jose
Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of
cyber-physical systems : from theory to testbeds and validation. CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Sep 2016, Heraklion, Greece. pp.3 - 18, ⟨10.1007/978-3-319-61437-3_1⟩. ⟨hal-01543262⟩
Jonathan Yung, Hervé Debar, Louis Granboulan. Security issues and mitigation in Ethernet POWERLINK. CYBERICPS 2016 : 2nd international workshop on Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2016, Heraklion, Greece. ⟨10.1007/978-3-319-61437-3_6⟩. ⟨hal-01560206⟩
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
François-Xavier
Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar.
Hybrid Risk Assessment Model Based on Bayesian Networks. 11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩. ⟨hal-01393744⟩
Eric
Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche.
Inferring a Distributed Application Behavior Model for Anomaly Based
Intrusion Detection. 12th European Dependable Computing Conference, Sep 2016, Gothenburg, Sweden. ⟨10.1109/edcc.2016.13⟩. ⟨hal-01334596⟩
Gustavo
Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. An
n-sided polygonal model to calculate the impact of cyber security
events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
Gustavo
Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro,
Hervé Debar. Selection of mitigation actions based on financial and
operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
Jose
Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a
watermark-based detection scheme to handle cyber-physical attacks. 11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzbourg, Austria. pp.21 - 28, ⟨10.1109/ARES.2016.2⟩. ⟨hal-01449821⟩
Gustavo
Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro,
Hervé Debar. Considering internal vulnerabilities and the attacker's
knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
Sana
Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah
Attia. PAbAC: a Privacy preserving Attribute based framework for fine
grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
Eric
Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche.
Anomaly Based Intrusion Detection in Distributed Applications without
global clock. SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. ⟨hal-01334608⟩
Nesrine
Kaaniche, Maryline Laurent, Sébastien Canard. A novel proof of data
possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
Mounir Assaf, Julien Signoles, Eric Totel, Frédéric Tronel. The Cardinal Abstraction for Quantitative Information Flow. Workshop on Foundations of Computer Security 2016 (FCS 2016), Jun 2016, Lisbon, Portugal. ⟨hal-01334604⟩
Ehsan
Ahvar, Shohreh Ahvar, Zoltan Adam-Mann, Noel Crespi, Joaquin
Garcia-Alfaro, et al.. CACEV: a Cost and CArbon Emission-Efficient
Virtual machine placement method for green distributed clouds. SCC 2016 : 13th IEEE International Conference on Services Computing , Jun 2016, San Francisco, United States. pp.275 - 282, ⟨10.1109/SCC.2016.43⟩. ⟨hal-01359868⟩
Mickael Salaun, Marion Daubignard, Hervé Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
Guillaume Endignoux, Olivier Levillain, Jean-Yves Migeon. Caradoc: a pragmatic approach to PDF parsing and validation. 2016 IEEE Security and Privacy Workshops (SPW), May 2016, San Jose, France. pp.126-139. ⟨hal-02143706⟩
Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator. 11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩. ⟨hal-01241810⟩
Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
Ehsan
Ahvar, Shohreh Ahvar, Noel Crespi, Joaquin Garcia-Alfaro, Zoltan
Adam-Mann. NACER : a network-aware cost-efficient resource allocation
method for processing-intensive tasks in distributed clouds. NCA 2015 : 14th International Symposium on Network Computing and Applications, Nov 2015, Cambridge, Ma, United States. pp.90 - 97, ⟨10.1109/NCA.2015.37⟩. ⟨hal-01263401⟩
Guillaume Hiet, Hervé Debar, Sélim Ménouar, Vérène Houdebine. Etude comparative des formats d’alertes. C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148. ⟨hal-01242786⟩
Daisuke
Miyamoto, Gregory Blanc, Youki Kadobayashi. Eye can tell : on the
correlation between eye movement and phishing identification. ICONIP 2015 : 22nd International Conference on Neural Information Processing, Nov 2015, Istanbul, Turkey. pp.223 - 232, ⟨10.1007/978-3-319-26555-1_26⟩. ⟨hal-01263381⟩
Pernelle
Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki
Kadobayashi. AJNA : anti-phishing JS-based visual analysis, to mitigate
users' excessive trust in SSL/TLS. BADGERS 2015 : 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Nov 2015, Kyoto, Japan. pp.74 - 84, ⟨10.1109/BADGERS.2015.019⟩. ⟨hal-01453228⟩
Daniel
Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline
Laurent, et al.. Recommendations for IPsec configuration on homenet and
M2M devices. Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Nov 2015, Cancun, Mexico. pp.9 - 17, ⟨10.1145/2815317.2815323⟩. ⟨hal-01263312⟩
Gustavo
Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a
3D geometrical model to improve accuracy in the evaluation and
selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
Armen
Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in
digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
Kim
Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight
certificateless and provably-secure signcryptosystem for the internet of
things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
Collins
Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight
mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
Gustavo
Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar,
Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and
financial impact in the selection of security countermeasures against
Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
Malek
Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. Evaluating the
comprehensive complexity of authorization-based access control policies
using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. Services 2015 : IEEE World Congress on Services , Jun 2015, New York, United States. pp.143 - 150, ⟨10.1109/SERVICES.2015.29⟩. ⟨hal-01254993⟩
Olivier Levillain. SSL/TLS, 3 ans après. Symposium sur la Sécurité des Technologies de l'Information et de la Communication, Jun 2015, Rennes, France. ⟨hal-01154823⟩
Nizar
Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro, Dingqi Yang.
Automated classification of C&C connections through malware URL
clustering. 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩. ⟨hal-01255089⟩
Salvador
Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora
Cuppens-Bouhlahia, Jordi Cabot. Model-Driven Integration and Analysis of
Access-control Policies in Multi-layer Information Systems. 30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩. ⟨hal-01152528⟩
Michel
Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro, Bita
Hasannezhad, et al.. Simulation of underwater communications with a
colored noise approximation and mobility. CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1532 - 1537, ⟨10.1109/CCECE.2015.7129508⟩. ⟨hal-01263406⟩
Michel
Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro,
Evangelos Kranakis. Location-free link state routing for underwater
acoustic sensor networks. CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1544 - 1549, ⟨10.1109/CCECE.2015.7129510⟩. ⟨hal-01263407⟩
Florian Maury, Jean-Rene Reinhard, Olivier Levillain, Henri Gilbert. Format Oracles on OpenPGP. Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.220-236, ⟨10.1007/978-3-319-16715-2_12⟩. ⟨hal-01154822⟩
Olivier
Levillain, Baptiste Gourdin, Hervé Debar. TLS Record Protocol: Security
Analysis and Defense-in-depth Countermeasures for HTTPS. 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩. ⟨hal-01154820⟩
Rishikesh
Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. Towards autonomic
DDoS mitigation using Software Defined Networking. SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩. ⟨hal-01257899⟩
Jose
Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of
physical-layer failure detection mechanisms to handle attacks against
SCADA systems. Digital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France. ⟨hal-01281994⟩
Erwan
Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Automatic
Generation of Correlation Rules to Detect Complex Attack Scenarios. 2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩. ⟨hal-01091385⟩
E
Godefroy, E Totel, M Hurfin, F Majorczyk, A Maaroufi. Automatiser la
construction de règles de corrélation : prérequis et processus. C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Nov 2014, Rennes, France. pp.9. ⟨hal-01091327⟩
Brahim
Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen. Data Integrity
and Availability Verification Game in Untrusted Cloud Storage. GameSec, Nov 2014, Los Angeles, United States. ⟨hal-01110522⟩
Yosra Ben Mustapha, Hervé Debar, Gregory Blanc. Policy enforcement point model. SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩. ⟨hal-01263380⟩
Daniel
Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent. Secure
IPsec based offload architectures for mobile data : architecture
description and performance evaluation. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks, Sep 2014, Montreal, Canada. pp.95 - 104, ⟨10.1145/2642687.2642690⟩. ⟨hal-01263065⟩
Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent. Elastic virtual private cloud. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks , Sep 2014, Montreal, Canada. pp.127 - 131, ⟨10.1145/2642687.2642704⟩. ⟨hal-01264790⟩
Michel
Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. The
bidirectional algorithm for channel selection using a two-radio model. VTC Fall 2014 : IEEE 80th Vehicular Technology Conference, Sep 2014, Vancouver, Canada. pp.1 - 5, ⟨10.1109/VTCFall.2014.6966200⟩. ⟨hal-01264783⟩
Daisuke
Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki
Kadobayashi. EyeBit: eye-tracking approach for enforcing phishing
prevention habits. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.56 - 65, ⟨10.1109/BADGERS.2014.14⟩. ⟨hal-01304643⟩
Sirikarn
Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro,
Hervé Debar. Classification of SSL servers based on their SSL handshake
for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
Joaquin
Garcia-Alfaro, Cristina Romero-Tris, Jose Rubio-Hernan. Simulaciones
software para el estudio de amenazas contra sistemas SCADA. RECSI 2014 : XIII Reunión Española sobre Criptología y Seguridad de la Información, Sep 2014, Alicante, España. pp.151 - 156. ⟨hal-01264800⟩
Nesrine
Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel
public-key based framework to handle data sharing security in clouds. SECRYPT 2014 : 11th International Conference on Security and Cryptography, Aug 2014, Vienne, Austria. pp.5 - 18, ⟨10.5220/0005010600050018⟩. ⟨hal-01263351⟩
Wiem
Tounsi, Benjamin Justus, Nora Cuppens-Bouhlahia, Frédéric Cuppens,
Joaquin Garcia Alfaro. Probabilistic Cycle Detection for Schneier's
Solitaire Keystream Algorithm. SERE-C 2014 : IEEE 8th International Conference on Software Security and Reliability, Jun 2014, San Francisco, United States. pp.113 - 120, ⟨10.1109/SERE-C.2014.29⟩. ⟨hal-01073179⟩
Michel
Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis.
Revisiting the performance of the modular clock algorithm for
distributed blind rendezvous in cognitive radio networks. ADHOC-NOW 2014 : 13th International Conference on Ad-Hoc Networks and Wireless , Jun 2014, Benidorm, Spain. pp.197 - 208, ⟨10.1007/978-3-319-07425-2_15⟩. ⟨hal-01264803⟩
Armen
Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation,
identités multiples et protection des données à caractère personnel dans
le champ des identités numériques : quelques aspects du paysage
européen. 5ème Atelier sur la Protection de la Vie Privée, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
Michel
Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A
new analysis of the cognitive radio jump-stay algorithm under the
asymmetric model. ICC 2014 : IEEE International Conference on Communications, Jun 2014, Sidney, Australia. pp.1590 - 1595, ⟨10.1109/ICC.2014.6883549⟩. ⟨hal-01264809⟩
Gustavo
Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé
Debar. Combining technical and financial impacts for countermeasure
selection. AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩. ⟨hal-01257903⟩
Nesrine
Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel
zero-knowledge scheme for proof of data possession in cloud storage
applications. CCGRID 2014 : 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing , May 2014, Chicago, United States. pp.522 - 531, ⟨10.1109/CCGrid.2014.81⟩. ⟨hal-01263463⟩
Olivier Levillain. Parsifal: a Pragmatic Solution to the Binary Parsing Problem. LangSec Workshop at IEEE Security & Privacy, May 2014, San Jose, United States. ⟨hal-01020138⟩
Jaeger Eric, Olivier Levillain. Mind your Language(s): A Discussion about Languages and Security. LangSec Workshop at IEEE Security & Privacy, May 2014, San Jose, United States. ⟨hal-01020129⟩
Erwan
Godefroy, Eric Totel, Frédéric Majorczyk, Michel Hurfin. Génération
automatique de règles de corrélation pour la détection d'attaques
complexes. 9eme conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI), May 2014, Lyon, France. pp.10. ⟨hal-01083699⟩
Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security , Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, ⟨10.1109/NTMS.2014.6814002⟩. ⟨hal-01263425⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. QoS
and security in Link State Routing protocols for MANETs. WD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 6, ⟨10.1109/WD.2013.6686442⟩. ⟨hal-01260585⟩
Michel
Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A
new analytic model for the cognitive radio jump-stay algorithm. WD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 3, ⟨10.1109/WD.2013.6686443⟩. ⟨hal-01260581⟩
Wiem
Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro.
Fine-Grained Privacy Control for the RFID Middleware of EPCglobal
Networks. MEDES 2013 : 5th ACM Conference on Management of Emergent Digital EcoSystems , Oct 2013, Neumünster Abbey, Luxembourg. pp.60 - 67. ⟨hal-00944940⟩
Wiem
Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro.
Privacy-enhanced Filtering and Collection Middleware in EPCglobal
Networks. CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. ⟨hal-00944945⟩
Olivier Levillain, Hervé Debar, Benjamin Morin. Parsifal: writing efficient and robust binary parsers, quickly. 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. pp.1. ⟨hal-00924120⟩
Eugenia
I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis,
Nikolaos Dellas, Joaquin Garcia-Alfaro, et al.. Leveraging Ontologies
upon a Holistic Privacy-Aware Access Control Model. FPS 2013 : the sixth international symposium on foundations & practice of security, Oct 2013, La Rochelle, France. pp.209 - 226, ⟨10.1007/978-3-319-05302-8_13⟩. ⟨hal-01161938⟩
Nabil
Hachem, Joaquin Garcia-Alfaro, Hervé Debar. An adaptive mitigation
framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
Salvador
Martinez Perez, García-Alfaro Joaquin, Cuppens Frédéric, Nora
Cuppens-Boulahia, Jordi Cabot. Model-Driven Extraction and Analysis of
Network Security Policies. Model-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013, Sep 2013, Miami, United States. pp.52-68. ⟨hal-00869319⟩
Mounir
Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Moniteur hybride
de flux d'information pour un langage supportant des pointeurs. SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France. ⟨hal-00909293⟩
Daniel
Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High
Availability for IPsec VPN Platforms: ClusterIP Evaluation. 8th International Conference on Availability, Reliability and Security (ARES 2013), Sep 2013, Regensburg, Germany. pp.1. ⟨hal-00863418⟩
Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. 2013
IEEE International Conference on Green Computing and Communications and
IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135. ⟨hal-01126288⟩
Ahmad
Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro.
Attribute-based mining process for the organization-based access control
model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
Daniel
Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert,
Maryline Laurent. PREFETCHing to overcome DNSSEC deployment over large
resolving platforms. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.694 - 703, ⟨10.1109/TrustCom.2013.84⟩. ⟨hal-01262120⟩
Sergi
Martinez-Bea, Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Real-time
malicious fast-flux detection using DNS and bot related features. PST 2013 : 11th International Conference on Privacy, Security and Trust, Jul 2013, Tarragona, Spain. pp.369 - 372, ⟨10.1109/PST.2013.6596093⟩. ⟨hal-01275014⟩
Salvador
Martinez Perez, García-Alfaro Joaquin, Cuppens Frédéric, Nora
Cuppens-Boulahia, Jordi Cabot. Towards an Access-Control Metamodel for
Web Content Management Systems. ICWE 2013: the International Conference on Web Engineering - MDWE 2013: Model-Driven Web Engineering, Jul 2013, Aalborg, Denmark. pp 148-155. ⟨hal-00869324⟩
Mounir
Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Program
Transformation for Non-interference Verification on Programs with
Pointers. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.231-244, ⟨10.1007/978-3-642-39218-4_18⟩. ⟨hal-00814671v2⟩
Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
Daniel Palomares, Daniel Migault, Maryline Laurent. Failure preventive mechanism for IPsec gateways. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.167-172, ⟨10.1109/ICCITechnology.2013.6579543⟩. ⟨hal-00860251⟩
Khaled
El Dassouki, Hervé Debar, Haidar Safa, Abbas Hijazi. A TCP delay based
mechanism for detecting congestion in the internet. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.141-145, ⟨10.1109/ICCITechnology.2013.6579538⟩. ⟨hal-00860428⟩
Emmanuel
Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort,
Maryline Laurent. Routing tables building methods for increasing
DNS(SEC) resolving platforms efficiency. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.824-827. ⟨hal-00860157⟩
Daniel
Migault, Stanislas Francfort, Stéphane Sénécal, Emmanuel Herbert,
Maryline Laurent. Overcoming DNSSEC performance issues with DHT-based
architectures. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819. ⟨hal-00860147⟩
Ethmane El Moustaine, Maryline Laurent. GPS+ : a back-end coupons identification for low-cost RFID. WiSec '13 : 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Apr 2013, Budapest, Hungary. pp.73-78, ⟨10.1145/2462096.2462109⟩. ⟨hal-00843977⟩
Olivier Levillain, Arnaud Ebalard, Benjamin Morin, Hervé Debar. One year of SSL internet measurement. ACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00768258⟩
Daniel
Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et
al.. ISP offload infrastructure to minimize cost and time deployment. GLOBECOM '12 : IEEE Global Communications Conference, Dec 2012, Anaheim, United States. pp.1041-1047, ⟨10.1109/GLOCOM.2012.6503250⟩. ⟨hal-00833402⟩
Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
Nabil Hachem, Hervé Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference, Dec 2012, Austin, United States. pp.171-180, ⟨10.1109/PCCC.2012.6407750⟩. ⟨hal-00813393⟩
Catherine Bernard, Hervé Debar, Salim Benayoune. Cross-domain vulnerabilities over social networks. CASoN '12 : 4th International Conference on Computational Aspects of Social Networks, Nov 2012, Sao Carlos, Brazil. pp.8-13, ⟨10.1109/CASoN.2012.6412370⟩. ⟨hal-00813344⟩
Marc Lacoste, Aurelien Wailly, Hervé Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong. User Defined Control Flow Policy for Web Service Orchestration. C&ESAR 2012, Nov 2012, Rennes, France. pp.NC. ⟨hal-00761354⟩
Ethmane El Moustaine, Maryline Laurent. A lattice based authentication for low-cost RFID. RFID-TA '12 : IEEE International Conference on RFID Technology and Applications, Nov 2012, Nice, France. pp.68-73, ⟨10.1109/RFID-TA.2012.6404569⟩. ⟨hal-00772773⟩
Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of honeypot/honeynet databases to enhance alert correlation. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩. ⟨hal-00747133⟩
Gustavo
Daniel Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel
Gaber, Mohamed Achemlal. Individual countermeasure selection based on
the return on response investment index. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.156-170, ⟨10.1007/978-3-642-33704-8_14⟩. ⟨hal-00747144⟩
Romaric
Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed
Kaâniche, et al.. Detecting Attacks Against Data in Web Applications. CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8. ⟨hal-00735997⟩
Salvador
Martínez, García-Alfaro Joaquin, Cuppens Frédéric, Nora
Cuppens-Boulahia, Jordi Cabot. A model-driven approach for the
extraction of network access-control policies. Model-Driven Security Workshop, Nora Koch, Alexander Knapp, Geri Georg, Marina Egea, Benoit Baudry, Oct 2012, Innsbruck, Austria. ⟨hal-00734230⟩
Gustavo
Daniel Gonzalez Granadillo, Grégoire Jacob, Hervé Debar, Luigi
Coppolino. Combination approach to select optimal countermeasures based
on the RORI index. INTECH '12 : Second International Conference on Innovative Computing Technology, Sep 2012, Casablanca, Morocco. pp.38-45, ⟨10.1109/INTECH.2012.6457801⟩. ⟨hal-00788696⟩
Aurelien Wailly, Marc Lacoste, Hervé Debar. VESPA : multi-layered self-protection for cloud resources. ICAC '12 : The 9th ACM International Conference on Autonomic Computing, Sep 2012, San José, United States. pp.155-160, ⟨10.1145/2371536.2371564⟩. ⟨hal-00738174⟩
Roland
Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison.
Challenges for advanced security monitoring : the MASSIF project. TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩. ⟨hal-00747573⟩
Daniel
Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et
al.. E2E : an optimized IPsec architecture for secure and fast offload.
IWSMA '12 : The First International Workshop on Security of Mobile Applications, Aug 2012, Prague, Czech Republic. pp.365-374, ⟨10.1109/ARES.2012.80⟩. ⟨hal-00756529⟩
Safaa
Hachana, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Joaquin Garcia
Alfaro. Towards Automated Assistance for Mined Roles Analysis in Role
Mining Applications. ARES 2012 : 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.123 - 132, ⟨10.1109/ARES.2012.61⟩. ⟨hal-01213900⟩
Jean-Michel
Combes, Ghada Arfaoui, Maryline Laurent. Dynamic DNS update security,
based on cryptographically generated addresses and ID-based
cryptography, in an IPv6 autoconfiguration context. AReS '12 : The 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.206-211, ⟨10.1109/ARES.2012.69⟩. ⟨hal-00756609⟩
Andrei Vlad Sambra, Maryline Laurent. Context-aware decentralized approach for web services. DTSOS '12 : IEEE SERVICES Workshop on Discovery, Testing, and Services-Oriented Software, Jun 2012, Honolulu, Hawaii, United States. pp.73-79, ⟨10.1109/SERVICES.2012.65⟩. ⟨hal-00734243⟩
Olivier Levillain. SSL/TLS: état des lieux et recommandations. SSTIC - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2012, Rennes, France. pp.3. ⟨hal-00770472⟩
Jean-Michel
Combes, Maryline Laurent. Source address validation improvements
(SAVI): mécanismes de prévention contre l'usurpation d'adresses IP
source. SSTIC 2012 : Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
Frédéric
Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz,
Xavier Rimasson. Handling Stateful Firewall Anomalies. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩. ⟨hal-00737170⟩
Frédéric
Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz,
Stéphane Morucci, et al.. Detection des anomalies dans les pare-feux de
nouvelles generations. SAR-SII 2012 : 7th Conference on Network and Information Systems Security, May 2012, Cabourg, France. ⟨hal-01865228⟩
Jean-Michel
Combes, Aurelien Wailly, Maryline Laurent. CGA as alternative security
credentials with IKEv2 : implementation and analysis. SAR-SSI '12 : 7th Conference on Network Architectures and Information Systems Security, May 2012, Cabourg, France. pp.53-59. ⟨hal-00747186⟩
Yosra Ben Saied, Alexis Olivereau, Maryline Laurent. A distributed approach for secure M2M communications. NTMS '12 : 5th IFIP International Conference on New Technologies, Mobility and Security, May 2012, Istambul, Turkey. pp.1-7, ⟨10.1109/NTMS.2012.6208702⟩. ⟨hal-00811949⟩
Kheira
Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of
european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
Aymen
Boudguiga, Maryline Laurent. An authentication scheme for IEEE 802.11s
mesh networks relying on Sakai-Kasahara ID-based cryptographic
algorithms. ComNet '12 : The Third International Conference on Communications and Networking, Mar 2012, Tunis, Tunisia. pp.1-8, ⟨10.1109/ComNet.2012.6217728⟩. ⟨hal-00819802⟩
Aymen Boudguiga, Maryline Laurent. An EAP ID-Based authentication method for wireless networks. ISTP '11 : International Workshop on Information Security, Theory and Practice, Dec 2011, Abu Dhabi, United Arab Emirates. pp.232-239. ⟨hal-00802365⟩
Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Preventing data leakage in service orchestration. IAS 2011, Dec 2011, Malacca, Malaysia. 6 p., ⟨10.1109/ISIAS.2011.6122806⟩. ⟨hal-00657796⟩
Joan
Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti.
Multiple-polynomial LFSR based pseudorandom number generator for EPC
Gen2 RFID tags. IECON 2011: 37th Annual Conference of the IEEE Industrial Electronics Society, Nov 2011, Melbourne, Australia. pp.3820 - 3825, ⟨10.1109/IECON.2011.6119932⟩. ⟨hal-00725612⟩
Daniel Palomares, Maryline Laurent. Mechanisms to Ensure Continuity of Service for IPsec/IKEv2 Based Communications. ICSNA-2011: International Conference on Secure Networking and Applications ,24-25 October, Paris, France, Oct 2011, Paris, France. pp.1. ⟨hal-00863428⟩
Andrei Vlad Sambra, Maryline Laurent. MyProfile - Privacy Aware Decentralized Identity on the Web. 1st International Conference on Secure networking and Applications (ICSNA), Oct 2011, Paris, France. ⟨hal-00745416⟩
Samia
Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy
preservation and low cost authentication in federated identity
management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
Tony
Cheneau, Andrei Vlad Sambra, Maryline Laurent. A Trustful
Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.249--253, ⟨10.1109/ICNSS.2011.6060009⟩. ⟨hal-00745353⟩
Gustavo
Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé
Debar. An ontology-based model for SIEM environments. ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩. ⟨hal-00728521⟩
Laurent
Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and
wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
Emmanuelle
Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel
Hurfin, et al.. From SSIR to CIDre: a New Security Research Group in
Rennes. 1st SysSec Workshop, Jul 2011, Amsterdam, Netherlands. ⟨hal-00656940⟩
Sondes
Larafa, Maryline Laurent. Towards multiple-exchange protocol use in
distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
Romaric
Ludinard, Loic Le Hennaff, Eric Totel. RRABIDS, un système de détection
d'intrusion pour les applications Ruby on Rails. SSTIC 2011, Jun 2011, Rennes, France. 11 p. ⟨hal-00657814⟩
Jonathan-Christofer
Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel. Detecting
illegal system calls using a data-oriented detection model. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩. ⟨hal-00657971⟩
Sophie
Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline
Laurent. Decisive heuristics to differentiate legitimate from phishing
sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
Aurelien
Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic
isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
Tony
Cheneau, Maryline Laurent. Using SEND signature algorithm agility and
multiple-key CGA to secure proxy neighbor discovery and anycast
addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Hervé Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
Wiem
Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro.
Formal verification of a key establishment protocol for EPC Gen2 RFID
systems: work in progress. FPS 2011: 4th Canada-France MITACS Workshop on Foundations & Practice of Security, May 2011, Paris, France. pp.242-252. ⟨hal-00668166⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis.
Mitigation of flooding disruption attacks in hierarchical OLSR networks.
CNSR 2011: 9th Annual Communication Networks and Services Research Conference, May 2011, Ottawa, Canada. pp.167-174, ⟨10.1109/CNSR.2011.32⟩. ⟨hal-00623195⟩
Aurelien
Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic
isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
Sophie
Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline
Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
Laurent
Gomez, Mehdi Khalfaoui, Elie El-Khoury, Cedric Ulmer, Jean-Pierre
Deutsch, et al.. RESCUEIT : sécuRisation dE la Chaîne logiStique
orientée serviCe depUis le mondE des objets jusqu'à l'univers
InformaTique. WISG '11 : Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2011, Troyes, France. ⟨hal-00727624⟩
Pascal
Urien, Marc Pasquet, Christophe Kiennert. A breakthrough for prepaid
payment: End to end token exchange and management using secure SSL
channels created by EAP-TLS smart cards. CTS, 2011, United States. pp.476 - 483, ⟨10.1109/CTS.2011.5928726⟩. ⟨hal-00673667⟩
Pascal Urien, Estelle Marie, Christophe Kiennert. A New Convergent Identity System Based on EAP-TLS Smart Cards. SAR-SSI, 2011, France. pp.1-6. ⟨hal-00673666⟩
Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, Pékin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
Daniel Migault, Cédric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis.
Mitigation of topology control traffic attacks in OLSR networks. 5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Oct 2010, Montréal, Canada. pp.1-8, ⟨10.1109/CRISIS.2010.5764920⟩. ⟨hal-00623629⟩
Joaquin
Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda.
MIRAGE: a management tool for the analysis and deployment of network
security policies. 3rd SETOP International Workshop on Autonomous and Spontaneous Security (Co-located with ESORICS 2010), Sep 2010, Athens, Greece. pp.203-215, ⟨10.1007/978-3-642-19348-4_15⟩. ⟨hal-00623634⟩
Peter
Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo,
Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
Nizar
Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. A service
dependency model for cost-sensitive intrusion response. ESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩. ⟨hal-01164601⟩
Nizar
Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. Ex-SDF:
an extended service dependency framework for intrusion impact
assessment. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩. ⟨hal-00565624⟩
Hervé Debar, Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens. Service dependencies in information systems security. MMM-ACNS 2010 : 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, Sep 2010, Saint Petersburg, Russia. pp.1 - 20, ⟨10.1007/978-3-642-14706-7_1⟩. ⟨hal-01164740⟩
Sondes
Larafa, Maryline Laurent. Authentication protocol runtime evaluation in
distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, Pékin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
Joaquin
Garcia Alfaro, Jordi Herrera Joancomarti, Joan Melia Segui. A
multiple-polynomial LFSR based pseudorandom number generator design for
EPC gen2 systems. Mitacs Workshop on Network Security & Cryptography, Jun 2010, Toronto, Canada. ⟨hal-00527573⟩
Kheira Bekara, Maryline Laurent. La vie privée dans les environnements fédérés. Atelier protection de la vie privée 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
Wiem
Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens.
Sécuriser les communications dans les systèmes de surveillance médicale
- Protocoles appliqués aux étiquettes à faible coût. INFORSID 2010 : XXIIIe congrès INFORSID, May 2010, Marseille, France. ⟨hal-00565842⟩
Wiem
Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens.
Protocoles d'échange de clés pour des systèmes de surveillance à base
de radio-étiquettes. 5th Conference on Network Architectures and Information Systems, May 2010, Rocquebrune Cap-Martin, France. ⟨hal-00609294⟩
Jonathan-Christofer
Demay, Eric Totel, Frédéric Tronel. Generation et evaluation de
mecanismes de detection d'intrusion au niveau applicatif. SARSSI 2010, May 2010, Menton, France. pp.NC. ⟨hal-00536661⟩
Tony
Cheneau, Maryline Laurent. Étude des solutions de proxy Neighbor
Discovery sécurisées et proposition basée sur la Signature Agility. 5ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
Thomas
Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon.
Protection des données utilisateurs dans une orchestration de
Web-Services. SARSSI 2010, May 2010, Menton, France. pp.NC. ⟨hal-00536660⟩
Wiem
Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens.
Securing the communications of home health care systems based on RFID
Sensor networks. Conference on Communications Networks and Services Research, May 2010, Montréal, Canada. ⟨hal-00484511⟩
Yannick Carlinet, Ludovic Mé, Yvon Gourhant, Hervé Debar. Evaluation of P4P based on real traffic measurement. 5th International Conference on Internet Monitoring and Protection, May 2010, Barcelona, Spain. pp.NC. ⟨hal-00534571⟩
Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Caching P2P traffic: what are the benefits for an ISP?. 9th International Conference on Networks - ICN 2010, Apr 2010, Menuires, France. pp.NC. ⟨hal-00534574⟩
Grégoire Jacob, Eric Filiol, Hervé Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
Stere
Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro,
Laurent Toutain. Model-driven security policy deployment: property
oriented approach. ESSos 2010 : second International symposium on Engineering Secure Software and Systems, Feb 2010, Pise, Italy. pp.123-139, ⟨10.1007/978-3-642-11747-3_10⟩. ⟨hal-00540842⟩
Joan
Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. Analysis
and improvement of a pseudorandom number generator for EPC Gen2 tags. FC 2010 Workshops and 14th Financial Cryptograpy and Data Security International Conference, Jan 2010, Ténénérife, Spain. pp.34-56. ⟨hal-00527593⟩
Pascal
Urien, Estelle Marie, Christophe Kiennert. An Innovative Solution for
Cloud Computing Authentication: Grids of EAP-TLS Smart Cards. ICDT, 2010, Greece. pp.22-27, ⟨10.1109/ICDT.2010.12⟩. ⟨hal-00673665⟩
Sergio Castillo-Perez, Joaquin Garcia Alfaro. Spyware-based menaces against web applications. International Conference on Intelligent Networking and Collaborative Systems, Nov 2009, Barcelone, Spain. pp.409-412, ⟨10.1109/INCOS.2009.31⟩. ⟨hal-00527605⟩
Olivier Sarrouy, Eric Totel, Bernard Jouga. Application data consistency checking for anomaly based intrusion detection. The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Nov 2009, Lyon, France. pp.NC. ⟨hal-00424584⟩
Stere
Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens,
Joaquin Garcia Alfaro. A secured delegation of remote services on IPv6
home networks. The 4th International Conference on Risks and Security of Internet and Systems, Oct 2009, Toulouse, France. ⟨hal-02369611⟩
Jonathan-Christofer
Demay, Eric Totel, Frédéric Tronel. SIDAN: a tool dedicated to Software
Instrumentation for Detecting Attacks on Non-control-data. 4th International Conference on Risks and Security of Internet and Systems (CRISIS'2009), Oct 2009, Toulouse, France. pp.NC. ⟨hal-00424574⟩
Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Security threat mitigation trends in low-cost RFID systems. DPM-SETOP
2009 : 4th International Workshop on Data Privacy Management and Second
International Workshop on Autonomous and Spontaneous Security, Sep 2009, Saint Malo, France. pp.193-207. ⟨hal-00540876⟩
Olivier Sarrouy, Eric Totel, Bernard Jouga. Building an application data behavior model for intrusion detection. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Jul 2009, Montreal, Canada. pp. 299-306. ⟨hal-00441423⟩
Nizar
Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni
Viinikka. A service dependency modeling framework for policy-based
response enforcement. DIMVA 09 : 6th international conference on Detection of Intrusions, Malware and Vulnerability Assessment, Jul 2009, Como, Italy. pp.176-195. ⟨hal-00433302v2⟩
Olivier
Sarrouy, Eric Totel, Bernard Jouga. Un modèle de comportement fondé sur
les données pour la détection d'intrusion dans les applications. 4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI 2009), Jun 2009, Luchon, France. pp.NC. ⟨hal-00424582⟩
Tony
Cheneau, Aymen Boudguiga, Maryline Laurent. Amélioration des
performances des adresses CGA et du protocole SEND : étude comparée de
RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4ème Conférence sur la sécurité des architectures réseaux et des systèmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
Jean-Philippe
Wary, Maryline Laurent. Secure communications between multi-capacity
devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
Joaquin
Garcia‐alfaro, M. Barbeau, E. Kranakis. Secure Localization of Nodes in
Wireless Sensor Networks with Limited Number of Truth Tellers. 2009 Seventh Annual Communication Networks and Services Research Conference (CNSR), May 2009, Moncton, Canada. pp.86-93, ⟨10.1109/CNSR.2009.23⟩. ⟨hal-03628765⟩
Sondes Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
Guillermo
Navarro-Arribas, Joaquin Garcia‐alfaro. A Policy Based Approach for the
Management of Web Browser Resources to Prevent Anonymity Attacks in
Tor. 24th IFIP TC-11 International Information Security Conference (IFIPsec2009), May 2009, Pafos, Cyprus. pp.164-175, ⟨10.1007/978-3-642-01244-0_15⟩. ⟨hal-03628762⟩
Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Evaluation of Two Privacy-Preserving Protocols for the DNS. 2009 Sixth International Conference on Information Technology: New Generations, Apr 2009, Las Vegas, United States. pp.411-416, ⟨10.1109/ITNG.2009.195⟩. ⟨hal-03628760⟩
Stere
Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro,
Laurent Toutain, et al.. Semantic context aware security policy
deployment. ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Mar 2009, Sydney, Australia. pp.251 - 261, ⟨10.1145/1533057.1533092⟩. ⟨hal-02369624⟩
Stere
Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro,
Laurent Toutain, et al.. Semantic context aware security policy
deployment. the 4th International Symposium, Mar 2009, Sydney, France. pp.251, ⟨10.1145/1533057.1533092⟩. ⟨hal-03628758⟩
Chakib
Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining
DoS attacks on broadcast source authentication on wireless sensors
networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
Chakib
Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop
broadcast source authentication protocol for WSN to mitigate DoS
attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Anonymous Resolution of DNS Queries. International Workshop on Information Security (IS'08), International OTM Conference, Nov 2008, Monterrey, Mexico. pp.987-1000, ⟨10.1007/978-3-540-88873-4_5⟩. ⟨hal-03628757⟩
Alexis
Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent,
Kheira Bekara, et al.. Federation of circles of trust and secure usage
of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
Sondes Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Evaluation of Anonymized ONS Queries. Workshop on Security of Autonomous and Spontaneous Networks (SETOP 2008), Oct 2008, Loctudy, France. ⟨hal-03628755⟩
Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
Frédéric
Majorczyk, Eric Totel, Ludovic Mé, Ayda Saidane. Anomaly Detection with
Diagnosis in Diversified Systems using Information Flow Graphs. IFIP SEC 2008, Sep 2008, Milan, Italy. 15 p. ⟨hal-00353005⟩
Yannick
Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Analysis of Computer
Virus Infection Risk Factors based on Customer Network Usage. 2nd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Aug 2008, Cap Estérel, France. ⟨hal-00353009⟩
Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
Joaquin
Garcia‐alfaro, M. Jaeger, G. Muhl, I. Barrera, J. Borrell. Distributed
Exchange of Alerts for the Detection of Coordinated Attacks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR '08), May 2008, Halifax, Canada. pp.96-103, ⟨10.1109/CNSR.2008.70⟩. ⟨hal-03628753⟩
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Analysis of Threats to the Security of EPC Networks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR), May 2008, Halifax, Canada. pp.67-74, ⟨10.1109/CNSR.2008.69⟩. ⟨hal-03628754⟩
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Security Threats on EPC Based RFID Systems. 2008 Fifth International Conference on Information Technology: New Generations (ITNG), Apr 2008, Las Vegas, United States. pp.1242-1244, ⟨10.1109/ITNG.2008.206⟩. ⟨hal-03628751⟩
Amir
R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay
distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
Chakib
Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation
Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
Amin
Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi,
Maher Ben Jemaa. Architecture de sécurité dans un réseau mesh multi
sauts. GRES 2007 : 8ème Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des réseaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. 2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007), Nov 2007, Vilamoura, Portugal. pp.1770-1784, ⟨10.1007/978-3-540-76843-2_45⟩. ⟨hal-03628749⟩
Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
Joaquin
Garcia‐alfaro, Guillermo Navarro-Arribas. A Survey on Detection
Techniques to Prevent Cross-Site Scripting Attacks on Current Web
Applications. IFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security, Oct 2007, Malaga, Spain. pp.287-298, ⟨10.1007/978-3-540-89173-4_24⟩. ⟨hal-03628748⟩
Stere
Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro,
Laurent Toutain. Reliable process for security policy deployment. SECRYPT 2007 : international conference on security and cryptography, Jul 2007, Barcelone, Spain. ⟨hal-02368751⟩
Stere
Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia‐alfaro,
Laurent Toutain. Reliable Process for Security Policy Deployment. International Conference on Security and Cryptography, Jul 2007, Barcelona, France. pp.5-15, ⟨10.5220/0002119200050015⟩. ⟨hal-03628747⟩
Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
Frédéric
Majorczyk, Eric Totel, Ludovic Mé, Ayda Saidane. Détection d'intrusions
et diagnostic d'anomalies dans un système diversifié par comparaison de
graphes de flux d'informations. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. ⟨hal-00268620⟩
Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Sondes Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING
2007 : 6th international IFIP-TC6 networking conference on ad hoc and
sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP
2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on
Information Security Theory and Practices : Smart Cards, Mobile and
Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
Joaquin Garcia‐alfaro, Frederic Cuppens, Nora Cuppens-Boulahia. Aggregating and Deploying Network Access Control Policies. The Second International Conference on Availability, Reliability and Security (ARES'07), Apr 2007, Vienna, France. pp.532-542, ⟨10.1109/ARES.2007.34⟩. ⟨hal-03628743⟩
Frédéric Majorczyk, Eric Totel, Ludovic Mé. Experiments on COTS Diversity as an Intrusion Detection and Tolerance Mechanism. Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS), Mar 2007, Lisbon, Portugal. ⟨hal-00268683⟩
Michel
Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda
Saidane, et al.. A dependable intrusion detection architecture based on
agreement services. Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p. ⟨hal-00269302⟩
Omar Cheikhrouhou, Maher Ben Jemaa, Maryline Laurent-Maknavicius. Nouvelle méthode d'authentification EAP-EHash. CFIP 2006/ Colloque Francophone sur l'Ingénierie des Protocoles, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. ⟨inria-00111911⟩
Joaquin
Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Analysis of
policy anomalies on distributed network security setups. ESORICS 2006 : 11th European Symposium on Research in Computer Security, Sep 2006, Hamburg, Germany. pp.496-511. ⟨hal-00540450⟩
Joaquin
Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards
filtering and alerting rule rewriting on single-component policies. Proceedings of the 25th International Conference, SAFECOMP 2006, Jun 2006, Gdansk, Poland. pp.182-194. ⟨hal-00540448⟩
Frederic
Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection of
Network Security Component Misconfiguration by Rewriting and
Correlation. 5th Conference on Security and Network Architectures (SAR-SSI2006), Jun 2006, Seignose, France. ⟨hal-03628721⟩
Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Seguier. Time series modeling for IDS alert management. ACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113. ⟨hal-00143467⟩
Julien
Bournelle, Guillaume Valadon, David Binet, Saber Zrelli, Maryline
Laurent-Maknavicius, et al.. AAA considerations within several NEMO
deployment scenarios. WONEMO 2006, Jan 2006, Sendai, Japan. ⟨hal-01351674⟩
Y. Thomas, Benjamin Morin, Hervé Debar. Improving security management through passive network observation. First International Conference on Availability, Reliability and Security (ARES), 2006, France. ⟨hal-00269297⟩
Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro. Misconfiguration Management of Network Security Components. 7th International Symposium on System and Information Security (SSI 2005), Nov 2005, Sao Paolo, Brazil. ⟨hal-03628705⟩
Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection and Removal of Firewall Misconfiguration. 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 ), Nov 2005, Phoenix, United States. ⟨hal-03628708⟩
Joaquin Garcia‐alfaro, S. Castillo, G. Navarro, J. Borrell. Mechanisms for attack protection on a prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.137-140, ⟨10.1109/CCST.2005.1594872⟩. ⟨hal-03628695⟩
G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro, S. Robles. Secure agent-based management for pervasive environments. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.133-136, ⟨10.1109/CCST.2005.1594864⟩. ⟨hal-03628681⟩
Joaquin
Garcia‐alfaro, J. Borrell, M.A. Jaeger, G. Muhl. An alert communication
infrastructure for a decentralized attack prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.234-237, ⟨10.1109/CCST.2005.1594878⟩. ⟨hal-03628691⟩
Frédéric Majorczyk, Eric Totel, Ludovic Mé. COTS diversity based intrusion detection and application to web servers. 8th international Symposium on the Recent Advances in Intrusion Detection, Sep 2005, Seattle, United States. 18 p. ⟨hal-00356396⟩
Frédéric Majorczyk, Eric Totel, Ludovic Mé. Détection d'intrusions par diversification de COTS. 4ème conférence "Security and Network Architectures" (SAR), Jun 2005, France. 12 p. ⟨hal-00354844⟩
J. Castella-Roca, G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro. Digital chips for an on-line casino. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, ⟨10.1109/ITCC.2005.130⟩. ⟨hal-03628687⟩
Joaquin
Garcia Alfaro, Frédéric Cuppens, Fabien Autrel, Jordi Castella-Roca,
Joan Borrell, et al.. Protecting on-line casinos against fraudulent
player drop-out. ITCC 2005 : IEEE international conference on information technology , Apr 2005, Las Vegas, United States. pp.500 - 505, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-00540862⟩
Joaquin
Garcia‐alfaro, F. Cuppens, F. Autrel, J. Castella-Roca, J. Borrell, et
al.. Protecting on-line casinos against fraudulent player drop-out. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-03628680⟩
Joaquin
Garcia Alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric
Cuppens, et al.. Decentralized publish-subscribe system to prevent
coordinated attacks via alert correlation. ICICS 2004: 6th International Conference on Informa- tion and Communications Security, Oct 2004, Malaga, Spain. pp.223 - 235, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-00540841⟩
Elvis
Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé. A Serial
Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p. ⟨hal-00356403⟩
Eric Totel, Bernard Vivinis, Ludovic Mé. A Language Driven Intrusion Detection System for Events and Alerts Correlation. 19th IFIP International Information Security Conference, Aug 2004, Toulouse, France. 16 p. ⟨hal-00356409⟩
Olivier
Paul, Maryline Laurent, Sylvain Gombault. An asynchronous distributed
access control architecture for IP over ATM networks. ACSAC 1999 : 15th Annual Computer Security Applications Conference, Dec 1999, Phoenix, United States. ⟨10.1109/CSAC.1999.816015⟩. ⟨hal-01840923⟩
Books44 documents
Joaquin
Garcia‐alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel
Soriano. Data privacy management, cryptocurrencies and blockchain
technology: ESORICS 2021 international workshops, DPM 2021 and CBT 2021,
Darmstadt, Germany, October 8, 2021, revised selected papers. Springer,
13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS),
978-3-030-93943-4. ⟨10.1007/978-3-030-93944-1⟩. ⟨hal-03628440⟩
Esma
Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin
Garcia‐alfaro. Foundations and Practice of Security. Springer
International Publishing, 13291, 2022, Lecture Notes in Computer
Science, ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
Joaquin
Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.
Security and privacy in communication networks: 17th EAI international
conference, SecureComm 2021, virtual event, September 6–9, 2021,
proceedings, part I. Springer, 398, pp.xvii-539, 2021, Lecture Notes of
the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
Joaquin
Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.
Security and privacy in communication networks: 17th EAI international
conference, SecureComm 2021, virtual event, September 6–9, 2021,
proceedings, part II. Springer, 399, pp.xvii-527, 2021, Lecture Notes of
the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
Anna
Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, José
Francisco Ruiz, et al.. Cybersecurity research analysis report for
Europe and Japan: cybersecurity and privacy dialogue between Europe and
Japan. Springer, 75, pp.172, 2021, Studies in Big Data,
978-3-030-62311-1. ⟨10.1007/978-3-030-62312-8⟩. ⟨hal-03124036⟩
Maryline
Laurent, Thanassis Giannetsos. Information Security Theory and
Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris,
France, December 11–12, 2019, Proceedings. Springer, LNCS-12024,
pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
Hamid
Brahim, Gallina Barbara, Shabtai Asaf, Elovici Yuval, Joaquin
Garcia-Alfaro. Security and safety interplay of intelligent software
systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018,
Barcelona, Spain, September 6-7, 2018, revised selected papers.
Springer, pp.173, 2019, Security and Cryptology, LNCS, vol. 11552,
Security and Cryptology, LNCS, vol. 11552, 978-3-030-16873-5. ⟨hal-02086531⟩
David
Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc,
et al.. Information and communications security: 20th International
Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings.
Springer, pp.818, 2018, Lecture Notes in Computer Science, Security and
Cryptology, 11149, Lecture Notes in Computer Science, Security and
Cryptology, 11149, 978-3-030-01949-5. ⟨hal-01987497⟩
Ali
Miri, Xiaodai Dong, Masoud Ardakani, Joaquin Garcia-Alfaro. 29th
biennial symposium on communications : Toronto, Ontario, Canada, June
6-7, 2018. IEEE Computer Society, pp.128, 2018, Biennial Symposium on
Communications proceedings, Biennial Symposium on Communications
proceedings, 978-1-5386-5735-5. ⟨hal-02014409⟩
Nora
Cuppens-Bouhlahia, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay,
Joaquin Garcia-Alfaro. Risks and security of internet and systems : 12th
international conference, CRiSIS 2017, Dinard, France, September 19-21,
2017, revised selected papers. Springer, 10694, pp.269, 2018, Lecture
Notes in Computer Science, Lecture Notes in Computer Science (vol.
10694), 978-3-319-76686-7. ⟨hal-01865019⟩
Joaquin
Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios.
Data privacy management, cryptocurrencies and blockchain technology :
ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona,
Spain, September 6-7, 2018, proceedings. Springer, pp.442, 2018, Lecture
Notes in Computer Science book series (LNCS, volume 11025), Lecture
Notes in Computer Science book series (LNCS, volume 11025),
978-3-030-00304-3. ⟨hal-02014097⟩
Cristiano
Giuffrida, Sébastien Bardin, Gregory Blanc. Detection of intrusions and
malware, and vulnerability assessment : 5th international conference,
DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Springer,
pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security
and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol.
10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5. ⟨hal-01864973⟩
Frédéric
Cuppens, Lingyu Wang, Nora Cuppens-Bouhlahia, Nadia Tawbi, Joaquin
Garcia-Alfaro. Foundations and practice of security : 9th International
Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016,
Revised Selected Papers. Springer, 10128, pp.361, 2017, Lecture Notes in
Computer Science, Lecture Notes in Computer Science, 978-3-319-51965-4.
⟨hal-01449657⟩
Joaquin
Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi
Herrera-Joancomarti. Data privacy management, cryptocurrencies and
blockchain technology: ESORICS 2017 International Workshops, DPM 2017
and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings.
Springer, 10436, pp.446, 2017, Lecture Notes in Computer Science,
978-3-319-67815-3. ⟨10.1007/978-3-319-67816-0⟩. ⟨hal-01740241⟩
Qing
Yang, Rongxing Lu, Yacine Challal, Maryline Laurent. Security, and
privacy in emerging wireless networks : security and communication
networks journal. Wiley; Hindawi Limited, 2017, Security and
Communication Networks Journal, Security and Communication Networks
Journal. ⟨hal-01682207⟩
Fabian
Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro. Research in
attacks, intrusions, and defenses : 19th international symposium, RAID
2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854,
pp.482, 2016, Lecture notes in computer science, Lecture notes in
computer science, 978-3-319-45718-5. ⟨hal-01450264⟩
Joaquin
Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio
Martinelli, Neeraj Suri. Data privacy management, and security assurance
: 10th international workshop, DPM 2015, and 4th international
workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised
selected papers. Springer International Publishing, 9481, pp.291, 2016,
Lecture Notes in Computer Science, Lecture Notes in Computer Science,
978-3-319-29882-5. ⟨hal-01333425⟩
Didier
El Baz, Julien Bourgeois, Bruno Defude, Zhangbing Zhou, Guangjie Han,
et al.. ATC 2016 : 13th Annual International Conference on Advanced and
Trusted Computing. IEEE Computer Society, pp.1242, 2016,
978-1-5090-2770-5. ⟨hal-01449669⟩
Joaquin
Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante. Foundations and
practice of security : 8th international symposium, FPS 2015,
Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers.
Springer International Publishing, 9482, pp.323, 2016, Lecture Notes in
Computer Science, Lecture Notes in Computer Science, 978-3-319-30302-4.
⟨hal-01333422⟩
Maryline Laurent, Samia Bouzefrane. Digital Identity Management. Iste, 2015. ⟨hal-01126495⟩
Joaquin
Garcia-Alfaro, Jordi Herrera-Joancomarti, Emil Lupu, Joachim Posegga,
Alessandro Aldini, et al.. Data privacy management, autonomous
spontaneous security, and security assurance : 9th international
workshop, DPM 2014, 7th international workshop, SETOP 2014, and 3rd
international workshop, QASA 2014, Wroclaw, Poland, September 10-11,
2014 : revised selected papers. Springer international publishing, 8872,
pp.343, 2015, Lecture Notes in Computer Science, Lecture Notes in
Computer Science, 978-3-319-17015-2. ⟨hal-01263419⟩
Frédéric
Cuppens, Joaquin Garcia Alfaro, A. Nur Zincir Heywood, Philip W. L.
Fong. FPS 2014 : 7th International Symposium on Foundations and Practice
of Security : revised selected papers. 8930, pp.375, 2015, LNCS
(Lecture Notes in Computer Science), 978-3-319-17039-8. ⟨hal-01162133⟩
Herbert
Bos, Fabian Monrose, Gregory Blanc. Research in Attacks, Intrusions,
and Defenses: 18th International Symposium, RAID 2015, Kyoto,
Japan,November 2-4, 2015. Proceedings. Springer, 9404, pp.638, 2015,
Lecture notes in computer science, Lecture notes in computer science,
978-3-319-26361-8. ⟨hal-01453167⟩
Ali
Ghorbani, Vicenç Torra, Huseyin Hisil, Ali Miri, Ahmet Koltuksuz, et
al.. 2015 Thirteenth annual conference on privacy, security and trust.
IEEE, pp.200, 2015, 978-1-4673-7828-4. ⟨hal-01332268⟩
Maryline Laurent, Samia Bouzefrane. La gestion des identités numériques. ISTE. pp.340, 2014, à paraître. ⟨hal-01126448⟩
Maryline
Laurent, Sara Foresti, Heng Xu. Privacy-aware electronic society.
Springer, 2014, Annals of Telecommunication, Volume 69, Issue 1-2,
Annals of Telecommunication, Volume 69, Issue 1-2, 0003-4347. ⟨hal-01261315⟩
Jean-Luc
Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur
Zincir Heywood. Foundations and practice of security : 6th international
symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, revised
selected papers. Springer, 8352, pp.444, 2014, Lecture Notes in Computer
Science, Lecture Notes in Computer Science, 978-3-319-05302-8. ⟨hal-01264784⟩
Joaquin
Garcia-Alfaro, Gürkan Gür. Proceedings 2014 : International Workshop on
Advanced Intrusion Detection and Prevention. Electronic Proceedings in
Theoretical Computer Science, 165, pp.58, 2014. ⟨hal-01740931⟩
Joaquin
Garcia Alfaro, Georgios V. Lioudakis, Nora Cuppens-Bouhlahia, Simon N.
Foley, William M. Fitzgerald. Data Privacy Management and Autonomous
Spontaneous Security : DPM 2013 : 8th International Workshop, SETOP 2013
: 6th International Workshop, Ehgam, UK, September 12-13, 2013 -
Revised Selected Papers. Springer, 8247, pp.400, 2014, LNCS - Lecture
Notes in Computer Science, 978-3-642-54567-2. ⟨hal-01174201⟩
Ali
Miri, Urs Hengartner, Huang Nen-Fu, Audun Josang, Joaquin
Garcia-Alfaro. 2014 Twelfth annual conference on privacy, security and
trust. IEEE, pp.426, 2014, 978-1-4799-3503-1. ⟨hal-01264786⟩
Joaquin
Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri,
Nadia Tawbi. Foundations and practice of security. Springer, 2013,
978-3-642-37118-9. ⟨hal-00846997⟩
Jordi
Castella-Roca, Josep Domingo-Ferrer, Joaquin Garcia-Alfaro, Ali
Ghorbani, Christian Damsgaard Jensen, et al.. 2013 Eleventh annual
conference on privacy, security and trust. IEEE, pp.390, 2013,
978-1-4673-5839-2. ⟨hal-01264789⟩
Joaquin
Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri,
Nadia Tawbi. FPS 2012 : 5th International Symposium on Foundations and
Practice of Security. Springer, 7743, pp.381, 2013, LNCS (Lecture Notes
in Computer Science), 978-3-642-37118-9. ⟨hal-01162190⟩
Joaquin
Garcia Alfaro, Pascal Lafourcade. Foundations and practice of security :
4th Canada-France MITACS workshop, FPS 2011, (Paris, May 12-13 2011).
Springer Science, Business Media, 6888, pp.253, 2012, Lecture Notes in
Computer Science, 978-3-642-27901-0. ⟨hal-00724727⟩
Nora
Cuppens-Bouhlahia, Philip Fong, Joaquin Garcia Alfaro, Stephen Marsh,
Jan-Philipp Steghöfer. PST 2012 : tenth Annual International Conference
on Privacy, Security and Trust Privacy, Security and Trust, Paris, July
16-18. IEEE, pp.262, 2012, 978-1-4673-2323-9. ⟨hal-01164792⟩
Nora
Cuppens-Bouhlahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Data and
Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3
Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings.
Springer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science,
978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩. ⟨hal-01164720⟩
Joaquin
Garcia Alfaro, Guillermo Navarro, Nora Cuppens-Boulahia, Sabrina de
Capitani Di Vimercati. Data Privacy Management and Autonomous Spontaneus
Security : DPM 2011 : 6th International Workshop and SETOP 2011 : 4th
International Workshop, Leuven, September 15-16, Revised Selected
Papers. Springer, 7122, pp.319, 2012, LNCS - Lecture Notes in Computer
Science, LNCS - Lecture Notes in Computer Science, 978-3-642-28878-4. ⟨hal-01164894⟩
Joaquin
Garcia Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Bouhlahia, Yves
Roudier. Data Privacy Management and Autonomous Spontaneous Security :
DPM 2009 : 4th International Workshop and SETOP 2009 : second
International Workshop, St. Malo, France, September 24-25, 2009 -
Revised Selected Papers. Springer, 5939, pp.265, 2010, LNCS (Lecture
Notes in Computer Science), 978-3-642-11206-5. ⟨hal-01164774⟩
Hakima
Chaouchi, Maryline Laurent. Wireless and mobile networks security :
security basics, security in on-the-shelf and emerging technologies.
ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9.
⟨hal-01370514⟩
Hakima
Chaouchi, Georg Carle, Maryline Laurent. Mobile and wireless network
security : proceedings of the 2nd International Workshop, MWNS 2009,
Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009,
978-3-8322-8177-9. ⟨hal-01370512⟩
Maryline
Laurent, Hakima Chaouchi. Mobile and wireless networks security :
proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World
Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
Hakima
Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et
mobiles. 3, Technologies émergentes. Hermes Science; Lavoisier, pp.291,
2007, IC2 : information, commande, communication. Réseaux et télécoms,
IC2 : information, commande, communication. Réseaux et télécoms,
978-2-7462-1699-0. ⟨hal-01329422⟩
Hakima
Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et
mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239,
2007, IC2, Série Réseaux et Télécoms IC2, Série Réseaux et Télécoms
978-2-7462-1697-6. ⟨hal-01328159⟩
Hakima
Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et
mobiles. 2, Technologies du marché. Hermes Science; Lavoisier, pp.249,
2007, IC2 : information, commande, communication. Réseaux et télécoms,
IC2 : information, commande, communication. Réseaux et télécoms,
978-2-7462-1698-3. ⟨hal-01328157⟩
Book sections37 documents
Montassar
Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized
identity and access management system for IOT Combining self-sovereign
identity and smart contracts. Foundations and Practice of Security, 13291, Springer International Publishing, pp.208-217, 2022, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03754058⟩
Nathanael
Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security
and performance to the internet of things through
usage control and blockchains. Privacy and Identity Management. Between Data Protection and Security, 644, Springer International Publishing, pp.57-72, 2022, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions,
34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and
Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩. ⟨hal-02393547⟩
Armen
Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick
Waelbroeck. Conclusion. Signes de confiance : l’impact des labels sur la
gestion des données personnelles. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
Armen
Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick
Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal
data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-Télécom, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs
of trust – The impact of seals on personal data management, Paris,
Handbook 2 Chair Values and Policies of Personal Information,
Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs
of trust – The impact of seals on personal data management, Paris,
Handbook 2 Chair Values and Policies of Personal Information,
Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
Maryline Laurent, Claire Levallois-Barth. Gestion de la vie privée et protection des données à caractère personnel. La gestion des identités numériques, ISTE Edition, pp.179 - 236, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263062⟩
Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Les identités numériques. La gestion des identités numériques, ISTE Edition, pp.19 - 90, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263060⟩
Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
Christophe Kiennert, Samia Bouzefrane, Amira Benkara Mostefa. L?identité numérique dans le Cloud Computing. ISTE. La gestion des identités numériques, pp.340, 2014, à paraître. ⟨hal-01126447⟩
Christophe Kiennert, Samia Bouzefrane, P. Thoniel. Systèmes d?authentification. ISTE. La gestion des identités numériques, pp.340, 2014, à paraître. ⟨hal-01126446⟩
Aymen Boudguiga, Maryline Laurent, Mohamed Hamdi. Fundamentals of identity-based cryptography. Practical cryptography : algorithms and implementations using C++, CRC Press, pp.225 - 250, 2014, 978-1-4822-2889-2. ⟨10.1201/b17707-13⟩. ⟨hal-01255480⟩
Joaquin
Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Security
and privacy concerns about the RFID layer of EPC Gen2 networks. Advanced research in data privacy, 567, Springer international publishing, pp.303 - 324, 2014, Studies in Computational Intelligence 978-3-319-09884-5. ⟨10.1007/978-3-319-09885-2_17⟩. ⟨hal-01264797⟩
Emmanuel
Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort,
Maryline Laurent. Analyzing Internet DNS(SEC) traffic with R for
resolving platform optimization. Data Mining Applications with R, Elsevier; Academic Press, pp.435 - 456, 2014, 978-0-12-411511-8. ⟨10.1016/B978-0-12-411511-8.00016-5⟩. ⟨hal-01263426⟩
Gimer
Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis.
Security issues in link state routing protocols for MANETs. Advances in network analysis and its applications network security and cryptography, Springer, pp.117-148, 2013, Mathematics in Industry, 978-3-642-30903-8. ⟨10.1007/978-3-642-30904-5_6⟩. ⟨hal-00949321⟩
Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Handling security threats to the RFID system of EPC networks. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, Taylor & Francis Group, pp.45-64, 2010. ⟨hal-00623632⟩
Houssem Jarraya, Maryline Laurent. Sécurité des réseaux P2P. Evolution des technologies pair-à-pair : optimisation, sécurité et application, Hermès science; Lavoisier, pp.135 - 154, 2010, IC2 : Traité réseaux et télécoms, 978-2-7462-2579-4. ⟨hal-01355245⟩
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
José-Marcos
Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara,
Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
Joaquin Garcia‐alfaro, F. Cuppens, N. Cuppens-Boulahia. Management of Exceptions on Access Control Policies. New Approaches for Security, Privacy and Trust in Complex Environments, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, ⟨10.1007/978-0-387-72367-9_9⟩. ⟨hal-03628745⟩
Chakib Bekara, Maryline Laurent. Gestion de clés dans les réseaux de capteurs. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes,
Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information,
commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328150⟩
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux mobiles IP. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes,
Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information,
commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328154⟩
José-Marcos
Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara,
Maryline Laurent, et al.. Sécurité dans les réseaux de capteurs sans
fil. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes,
Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information,
commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328149⟩
Maryline Laurent, Hakima Chaouchi, Olivier Paul. Mécanismes de sécurité fondamentaux. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux,
Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information,
commande, communication. Réseaux et télécoms, 978-2-7462-1697-6. ⟨hal-01328102⟩
Joaquin
Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro,
Joan Borrell. Protection of Components Based on a Smart-Card Enhanced
Security Module. Critical Information Infrastructures Security, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, ⟨10.1007/11962977_11⟩. ⟨hal-03628730⟩
Joaquin
Garcia‐alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards
Filtering and Alerting Rule Rewriting on Single-Component Policies. Computer Safety, Reliability, and Security, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, ⟨10.1007/11875567_14⟩. ⟨hal-03628725⟩
Joaquin
Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro,
Joan Borrell. SMARTCOP – A Smart Card Based Access Control for the
Protection of Network Security Components. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, ⟨10.1007/11915034_65⟩. ⟨hal-03628734⟩
Joaquin
Garcia‐alfaro, Michael Jaeger, Gero Mühl, Joan Borrell. Decoupling
Components of an Attack Prevention System Using Publish/Subscribe. Intelligence in Communication Systems, Springer-Verlag, pp.87-97, 2005, ⟨10.1007/0-387-32015-6_9⟩. ⟨hal-03628700⟩
G.
Navarro, J. Peñalver, J.A. Ortega-Ruiz, J. Ametller, Joaquin
Garcia‐alfaro, et al.. Amapola: a simple infrastructure for ubiquitous
computing. Roch Glitho; Ahmed Karmouch; Samuel Pierre. Intelligence in Communication Systems, 190, Springer-Verlag, pp.77-86, 2005, IFIP — The International Federation for Information Processing book series (IFIPAICT), ⟨10.1007/0-387-32015-6_8⟩. ⟨hal-03628697⟩
Joaquin
Garcia‐alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic
Cuppens, et al.. Decentralized Publish-Subscribe System to Prevent
Coordinated Attacks via Alert Correlation. Information and Communications Security, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-03628684⟩