Articles dans une revue

  • Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
  • Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. A survey on cyber-resilience approaches for cyber-physical systems. ACM Computing Surveys, 2024, 56 (8), pp.1-37. ⟨10.1145/3652953⟩. ⟨hal-04562096⟩
  • Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and resilient 6 G RAN networks: a decentralized approach with zero trust architecture. Journal of Network and Systems Management, 2024, 32 (33), ⟨10.1007/s10922-024-09807-x⟩. ⟨hal-04610740⟩
  • Nathanaël Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des télécommunications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
  • Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos. SigML++: supervised log anomaly with probabilistic polynomial approximation. Cryptography, 2023, 7 (4), pp.52. ⟨10.3390/cryptography7040052⟩. ⟨hal-04304189⟩
  • Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari. Secure attack detection framework for hierarchical 6G-enabled internet of vehicles. IEEE Transactions on Vehicular Technology, 2023, 73 (2), pp.1-11. ⟨10.1109/TVT.2023.3317940⟩. ⟨hal-04227768⟩
  • Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
  • David Pàmies-Estrems, Joaquin Garcia‐alfaro. On the self-adjustment of privacy safeguards for query log streams. Computers & Security, 2023, 134, pp.103450. ⟨10.1016/j.cose.2023.103450⟩. ⟨hal-04189131⟩
  • Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys, 2023, 55 (14s), pp.1-40. ⟨10.1145/3588999⟩. ⟨hal-04401069⟩
  • Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. Computer, 2023, 56 (7), pp.54-66. ⟨10.1109/MC.2023.3273491⟩. ⟨hal-04400976⟩
  • Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
  • Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
  • Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
  • Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. IEEE Internet of Things Magazine, 2023, 6 (1), pp.46-50. ⟨10.1109/IOTM.001.2200244⟩. ⟨hal-04401093⟩
  • Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization’s data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
  • Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-03997331⟩
  • Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
  • Badis Hammi, Jean-Philippe Monteuuis, Jonathan Petit. PKIs in C-ITS: Security functions, architectures and projects: A survey. Vehicular Communications, 2022, 38, pp.100531. ⟨10.1016/j.vehcom.2022.100531⟩. ⟨hal-04400865⟩
  • Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, et al.. Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.789-812. ⟨10.1007/s12243-022-00926-7⟩. ⟨hal-03965590⟩
  • Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
  • Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Transactions on Engineering Management, 2022, 69 (6), pp.3710-3725. ⟨10.1109/TEM.2021.3087112⟩. ⟨hal-04400815⟩
  • Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.727-729. ⟨10.1007/s12243-022-00935-6⟩. ⟨hal-04164335⟩
  • Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
  • Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
  • Sophie Dramé-Maigné, Hervé Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
  • Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
  • Mariana Segovia, Joaquin Garcia‐alfaro. Design, modeling and implementation of digital twins. Sensors, 2022, 22 (14), pp.5396-5426. ⟨10.3390/s22145396⟩. ⟨hal-03843008⟩
  • Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers & Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Research trends in collaborative drones. Sensors, 2022, 22 (9), pp.3321:1-3321:17. ⟨10.3390/s22093321⟩. ⟨hal-03654021⟩
  • Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh. Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on emerging telecommunications technologies, 2022, 33 (3), pp.1-20. ⟨10.1002/ett.3667⟩. ⟨hal-03990998⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro. Cyber-physical defense in the quantum Era. Scientific Reports, 2022, 12, pp.1905. ⟨10.1038/s41598-022-05690-1⟩. ⟨hal-03628438⟩
  • Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Fillipe Santos. GPS-free, error tolerant path planning for swarms of micro aerial vehicles with quality amplification ‡. Sensors, 2021, 21 (14), pp.4731:1-4731:16. ⟨10.3390/s21144731⟩. ⟨hal-03628455⟩
  • Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, et al.. Framework, tools and good practices for cybersecurity curricula. IEEE Access, 2021, 9, pp.94723-94747. ⟨10.1109/ACCESS.2021.3093952⟩. ⟨hal-03997196⟩
  • Mikaël Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. Security and communication networks, 2021, 2021, pp.1 - 19. ⟨10.1155/2021/5512075⟩. ⟨hal-03991134⟩
  • Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
  • Paul Marillonnet, Maryline Laurent, Mikaël Ates. Personal information self-management: A survey of technologies supporting administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
  • Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally. A blockchain-based certificate revocation management and status verification system. Computers & Security, 2021, 104, pp.102209. ⟨10.1016/j.cose.2021.102209⟩. ⟨hal-03295357⟩
  • Edgar Galván, Joaquin Garcia‐alfaro, Vicenç Torra, Guillermo Navarro-Arribas. Agents in a privacy-preserving world. Transactions on Data Privacy, 2021, 14 (1), pp.53-63. ⟨hal-04337700⟩
  • Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Joaquin Garcia‐alfaro, et al.. DECA: a Dynamic Energy cost and Carbon emission-efficient Application placement method for Edge Clouds. IEEE Access, 2021, 9, pp.70192-70213. ⟨10.1109/ACCESS.2021.3075973⟩. ⟨hal-03208423v2⟩
  • Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
  • Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
  • Michel Barbeau, Frederic Cuppens, Nora Cuppens, Romain Dagnas, Joaquin Garcia‐alfaro. Resilience estimation of Cyber-Physical Systems via quantitative metrics. IEEE Access, 2021, 9, pp.46462-46475. ⟨10.1109/ACCESS.2021.3066108⟩. ⟨hal-03626725⟩
  • Hassan Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, et al.. TRESC: Towards redesigning existing symmetric ciphers. Microprocessors and Microsystems: Embedded Hardware Design , 2021, 87, pp.103478 (11). ⟨hal-03549341⟩
  • Houda Jmila, Gregory Blanc. Towards security-aware 5G slice embedding. Computers & Security, 2021, 100, pp.102075:1-102075:18. ⟨10.1016/j.cose.2020.102075⟩. ⟨hal-03123977⟩
  • Michel Barbeau, Erwan Beurier, Joaquin Garcia‐alfaro, Randy Kuang, Marc-Oliver Pahl, et al.. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?. Digitale Welt, 2021, 5 (1), pp.34-39. ⟨10.1007/s42354-021-0402-0⟩. ⟨hal-03628446v2⟩
  • Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
  • Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
  • Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia‐alfaro. Switched-based resilient control of cyber-physical systems. IEEE Access, 2020, 8 (3), pp.212194 - 212208. ⟨10.1109/ACCESS.2020.3039879⟩. ⟨hal-03113904⟩
  • Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi. PROUD: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 2020, 111, pp.899-918. ⟨10.1016/j.future.2019.11.012⟩. ⟨hal-03990965⟩
  • Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia‐alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs. Journal of information security and applications, 2020, 54, pp.102562:1-102562:14. ⟨10.1016/j.jisa.2020.102562⟩. ⟨hal-03125762⟩
  • Jean-Paul Yaacoub, Ola Salman, Hassan N Noura, Nesrine Kaaniche, Ali Chehab, et al.. Cyber-physical systems security: limitations, issues and future trends. Microprocessors and Microsystems: Embedded Hardware Design , 2020, 77, pp.103201. ⟨10.1016/j.micpro.2020.103201⟩. ⟨hal-03990927⟩
  • Sana Belguith, Nesrine Kaaniche, Giovanni Russello. CUPS: secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update. Security and Privacy , 2020, 3 (4), pp.1-24. ⟨10.1002/spy2.85⟩. ⟨hal-03991066⟩
  • David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia‐alfaro. A real-time query log protection method for web search engines. IEEE Access, 2020, 8, pp.87393-87413. ⟨10.1109/ACCESS.2020.2992012⟩. ⟨hal-03125769⟩
  • Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
  • Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
  • Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, et al.. A Secure Multipath Reactive Protocol for Routing in IoT and HANETs. Ad Hoc Networks, 2020, pp.102118. ⟨10.1016/j.adhoc.2020.102118⟩. ⟨hal-02491851⟩
  • François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. Computers & Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
  • Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
  • Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal, 2020, ⟨10.1109/JSYST.2020.2970167⟩. ⟨hal-02491845⟩
  • Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia‐alfaro, Jamil Kassem, Evangelos Kranakis. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications. Transactions on emerging telecommunications technologies, 2019, 30 (12), ⟨10.1002/ett.3712⟩. ⟨hal-02390285⟩
  • Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 14, pp.14979-14993. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-03991234⟩
  • Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, et al.. An empirical approach to phishing countermeasures through smart glasses and validation agents. IEEE Access, 2019, 7, pp.130758-130771. ⟨10.1109/access.2019.2940669⟩. ⟨hal-02438600⟩
  • Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, et al.. Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩. ⟨hal-02315884⟩
  • Christophe Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The influence of conception paradigms on data protection in e-learning platforms: a case study. IEEE Access, 2019, 7, pp.64110-64119. ⟨10.1109/ACCESS.2019.2915275⟩. ⟨hal-02281231⟩
  • Christophe Kiennert, Pierre-Marie Bajan, Hervé Debar. Evaluating security products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
  • Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
  • Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security (third edition). Computers and Electrical Engineering, 2018, 71, pp.1040 - 1042. ⟨10.1016/j.compeleceng.2018.10.008⟩. ⟨hal-02013479⟩
  • Abdel-Mehsen Ahmad, Jamil Kassem, Michel Barbeau, Evangelos Kranakis, Steven Porretta, et al.. Doppler effect in the acoustic ultra low frequency band for wireless underwater networks. Mobile Networks and Applications, 2018, 23 (5), pp.1282 - 1292. ⟨10.1007/s11036-018-1036-9⟩. ⟨hal-02013724⟩
  • Badis Hammi, Sherali Zeadally, Rida Khatoun. An empirical investigation of botnet as a service for cyberattacks. Transactions on emerging telecommunications technologies, 2018, 30 (3), pp.e3537. ⟨10.1002/ett.3537⟩. ⟨hal-02364360⟩
  • Christophe Kiennert, Ismail Ziad, Hervé Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
  • Jose Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro. Cyber‐physical architecture assisted by programmable networking. Internet technology letters, 2018, 1 (4), pp.e44-1 - e44-8. ⟨10.1002/itl2.44⟩. ⟨hal-01869475⟩
  • Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on emerging telecommunications technologies, 2018, 29 (7), pp.e3209-1 - e3209-17. ⟨10.1002/ett.3209⟩. ⟨hal-01823618⟩
  • Xavier Baró‐solé, Ana E. Guerrero‐roldan, Josep Prieto‐blázquez, Anna Rozeva, Orlin Marinov, et al.. Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experience. Internet technology letters, 2018, 1 (4), pp.e56-1 - e56-6. ⟨10.1002/itl2.56⟩. ⟨hal-02013504⟩
  • Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
  • Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Hypergraph-driven mitigation of cyber-attacks. Internet technology letters, 2018, 1 (3), pp.e38-1 - e38-6. ⟨10.1002/itl2.38⟩. ⟨hal-02013488⟩
  • Rémi Cogranne, Guillaume Doyen, Nisrine Ghadban, Badis Hammi. Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments. IEEE Transactions on Network and Service Management, 2018, 15 (1), pp.68-82. ⟨10.1109/tnsm.2017.2785628⟩. ⟨hal-02407678⟩
  • Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
  • Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi. IoT technologies for smart cities. IET Networks, 2018, 7 (1), pp.1-13. ⟨10.1049/iet-net.2017.0163⟩. ⟨hal-02273965⟩
  • Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Using an event data taxonomy to represent the impact of cyber events as geometrical instances. IEEE Access, 2018, 6, pp.8810 - 8828. ⟨10.1109/ACCESS.2017.2740402⟩. ⟨hal-01729364⟩
  • Mohamed T. Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni. Bubbles of Trust: a decentralized Blockchain-based authentication system for IoT. Computers & Security, Elsevier, 2018, pp.15. ⟨hal-02287885⟩
  • Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
  • Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
  • Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des télécommunications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
  • Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
  • Maryline Laurent. Pare-feu: le couteau suisse de la sécurité informatique. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
  • Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers & Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
  • Badis Hammi, Houda Labiod, Gérard Segarra, Alain Servel, Jean-Philippe Monteuuis. CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems. Advances in Science, Technology and Engineering Systems Journal, 2017, 2 (3), pp.1422-1431. ⟨10.25046/aj0203178⟩. ⟨hal-02287687⟩
  • Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, Meng Yao. Secure localization in the presence of colluders in WSNs. Sensors, 2017, 17 (8), pp.1892-1 - 1892-15. ⟨10.3390/s17081892⟩. ⟨hal-01701140⟩
  • Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security, 2017, 2017, pp.8-1 - 8-25. ⟨10.1186/s13635-017-0060-9⟩. ⟨hal-01701167⟩
  • Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
  • Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2017, 59, pp.73 - 75. ⟨10.1016/j.compeleceng.2017.05.027⟩. ⟨hal-02013472⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
  • Khalifa Toumi, Hela Sfar, Joaquin Garcia-Alfaro. Reputation trust mechanism under the organizational-based access control model. Security and communication networks, 2016, 9 (18), pp.5295 - 5310. ⟨10.1002/sec.1698⟩. ⟨hal-01453259⟩
  • Ziad Ismail, Christophe Kiennert, Jean Leneutre, David Bateman, Lin Chen. Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis. IEEE Transactions on Information Forensics and Security, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩. ⟨hal-01418390⟩
  • Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Channel selection using a multiple radio model. Journal of Network and Computer Applications (JNCA), 2016, 64 (C), pp.113 - 123. ⟨10.1016/j.jnca.2016.01.021⟩. ⟨hal-01332350⟩
  • Joaquin Garcia-Alfaro, Francesco Longo, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2015, 47, pp.255 - 257. ⟨10.1016/j.compeleceng.2015.11.016⟩. ⟨hal-01332012⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, Mohammed El Barbori, Hervé Debar. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Computers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩. ⟨hal-01255033⟩
  • Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
  • Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Remarks on Peinado et al.'s analysis of J3Gen. Sensors, 2015, 15 (3), pp.6217 - 6220. ⟨10.3390/s150306217⟩. ⟨hal-01263408⟩
  • Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios. Journal of Information Assurance and Security, 2015, 10 (3), pp.11. ⟨hal-01241807⟩
  • Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. An Invariant-based Approach for Detecting Attacks against Data in Web Applications. International journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩. ⟨hal-01083296⟩
  • Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, 2014, 64, pp.273 - 295. ⟨10.1016/j.comnet.2014.02.001⟩. ⟨hal-01263479⟩
  • Wiem Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Yannick Chevalier, Frédéric Cuppens. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications (JNCA), 2014, 39, pp.152 - 166. ⟨10.1016/j.jnca.2013.06.002⟩. ⟨hal-00845810⟩
  • Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. On the similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on emerging telecommunications technologies, 2014, 25 (2), pp.151 - 154. ⟨10.1002/ett.2600⟩. ⟨hal-01286097⟩
  • Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
  • Wei Shi, Joaquin Garcia-Alfaro, Jean-Pierre Corriveau. Searching for a black hole in interconnected networks using mobile agents and tokens. Journal of Parallel and Distributed Computing, 2014, 74 (1), pp.1945 - 1958. ⟨10.1016/j.jpdc.2013.08.009⟩. ⟨hal-01255466⟩
  • Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Trust management system design for the Internet of Things: a context-aware and multi- service approach. Computers & Security, 2013, 39 (Part B), pp.351 - 365. ⟨10.1016/j.cose.2013.09.001⟩. ⟨hal-01281972⟩
  • Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A Privacy-Aware Access Control Model for Distributed Network Monitoring. Computers and Electrical Engineering, 2013, 39 (7), pp.2263-2281. ⟨10.1016/j.compeleceng.2012.08.003⟩. ⟨hal-00949776⟩
  • Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Onion routing circuit construction via latency graphs. Computers & Security, 2013, 37, pp.197-214. ⟨10.1016/j.cose.2013.03.003⟩. ⟨hal-00846345⟩
  • Yosra Ben Mustapha, Hervé Debar. Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. International Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩. ⟨hal-00858941⟩
  • Frédéric Cuppens, Nora Cuppens-Bouhlahia, Ernesto Damiani, Radu State, Joaquin Garcia-Alfaro, et al.. SETOP'2012 and FPS'2012 special issue. Journal of information security and applications, 2013, 18 (1), pp.1 - 96. ⟨10.1016/j.jisa.2013.08.004⟩. ⟨hal-01260763⟩
  • Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Joaquin Garcia-Alfaro. Semantic Analysis of Role Mining Results and Shadowed Roles Detection. Information Security Technical Report, 2013, 17 (4), pp.131 - 147. ⟨hal-01213882⟩
  • Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. J3Gen : a PRNG for low-cost passive RFID. Sensors, 2013, 13 (3), pp.3816-3830. ⟨10.3390/s130303816⟩. ⟨hal-00846567⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. Journal of Network and Computer Applications (JNCA), 2013, 36 (2), pp.744 - 755. ⟨10.1016/j.jnca.2012.12.013⟩. ⟨hal-00846121⟩
  • García-Alfaro Joaquin, Cuppens Frédéric, Nora Cuppens-Boulahia, Salvador Martinez Perez, Jordi Cabot. Management of stateful firewall misconfiguration. Computers & Security, 2013, 39 (11), pp.64-85. ⟨hal-00869328⟩
  • Wei Shi, Michel Barbeau, Joaquin Garcia Alfaro, Jean-Pierre Corriveau. Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks, 2012, 17 (1), pp.87-102. ⟨hal-00945359⟩
  • Ethmane El Moustaine, Maryline Laurent. Systèmes et techniques RFID : risques et solutions de sécurité. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2012, H5325. ⟨hal-00770788⟩
  • Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N. ⟨hal-00738459⟩
  • Patrick Battistello, Joaquin Garcia Alfaro, Cyril Delétré. Transaction-based authentication and key agreement protocol for inter-domain VoIP. Journal of Network and Computer Applications (JNCA), 2012, 35 (5), pp.1579 - 1597. ⟨10.1016/j.jnca.2012.02.010⟩. ⟨hal-02135194⟩
  • Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar. An ontology-driven approach to model SIEM information and operations using the SWRL formalism. International journal of electronic security and digital forensics, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩. ⟨hal-00724431⟩
  • Aymen Boudguiga, Maryline Laurent. On the use of ID-based cryptography for the definition of new EAP authentication methods. International journal for information security research (IJISR), 2012, 2 (1 & 2), pp.246-255. ⟨hal-00724636⟩
  • Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Risk assessment along supply chain : a RFID and wireless sensor network integration approach. Sensors & Transducers., 2012, 14 (2), pp.269-282. ⟨hal-00712579⟩
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. User Data Confidentiality in an Orchestration of Web Services. Journal of Information Assurance and Security, 2012, 7 (1), pp.32-40. ⟨hal-00735996⟩
  • Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress. Lecture Notes in Computer Science, 2012, 6888 (1), pp.242-252. ⟨10.1007/978-3-642-27901-0⟩. ⟨hal-00704144⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Preventing the cluster formation attack against the hierarchical OLSR protocol. Lecture Notes in Computer Science, 2012, 6888 (1), pp.118-131. ⟨hal-00724742⟩
  • Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A contextual privacy-aware access control model for network monitoring workflows: work in progress. Lecture Notes in Computer Science, 2012, 6888 (1), pp.208-217. ⟨hal-00704149⟩
  • Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. Annals of Telecommunications - annales des télécommunications, 2011, 66 (9-10), pp.535 - 552. ⟨10.1007/s12243-010-0221-z⟩. ⟨hal-02135370⟩
  • Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Laurent Toutain. Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 2011, 84 (7), pp.1144 - 1159. ⟨10.1016/j.jss.2011.02.005⟩. ⟨hal-00609526⟩
  • Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags. Wireless Personal Communications, 2011, 59 (1), pp.27-42. ⟨10.1007/s11277-010-0187-1⟩. ⟨hal-00623631⟩
  • Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Proactive threshold cryptosystem for EPC tags. Ad Hoc & Sensor Wireless Networks, 2011, 12 (3-4), pp.187-208. ⟨hal-00623637⟩
  • Pere Montolio-Aranda, Joaquin Garcia Alfaro, David Megias. Improved flooding of broadcast messages using extended multipoint relaying. Journal of Network and Computer Applications (JNCA), 2011, 34 (2), pp.542-550. ⟨10.1016/j.jnca.2010.12.011⟩. ⟨hal-00704242⟩
  • Andrei Vlad Sambra, Maryline Laurent. MyProfile - Decentralized User Profile and Identity on the Web. W3C's Federated Social Web (FSW2011), 2011. ⟨hal-00745348⟩
  • Aymen Boudguiga, Maryline Laurent. Sécurité dans les réseaux 802.11. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2010, TE7377. ⟨hal-01355251⟩
  • Ludovic Mé, Hervé Debar. New directions in Intrusion Detection and Alert Correlation. Revue I3 - Information Interaction Intelligence, 2010, 10 (1), pp.NC. ⟨hal-00534564⟩
  • Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers & Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
  • Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers & Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
  • Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
  • Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé. A logic-based model to support alert correlation in intrusion detection. Information Fusion, 2009, 10 (4), pp.285-299. ⟨10.1016/j.inffus.2009.01.005⟩. ⟨hal-00353059⟩
  • Jouni Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika Tarvainen. Processing Intrusion Detection Alert Aggregates with Time Series Modeling. Information Fusion, 2009, 10 (4), pp.312-324. ⟨hal-00353056⟩
  • Diala Abi Haidar, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. XeNA: an access negotiation framework using XACML. Annals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩. ⟨hal-00448945⟩
  • Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
  • Maryline Laurent. Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
  • Maryline Laurent. Sécurité des systèmes P2P de sauvegarde distribuée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 16. ⟨hal-01355031⟩
  • Joaquin Garcia Alfaro, Nora Cuppens-Bouhlahia, Frédéric Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 2008, 7 (2), pp.103 - 122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-01207771⟩
  • Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 14. ⟨hal-01355033⟩
  • Joaquin Garcia‐alfaro, N. Boulahia-Cuppens, F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 2008, 7 (2), pp.103-122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-03628752⟩
  • Maryline Laurent, Hakima Chaouchi. Des réseaux ad hoc économiquement viables. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 11. ⟨hal-01355035⟩
  • Maryline Laurent. Les architectures de fédération d'identité et la garantie de notre vie privée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2007, 9. ⟨hal-01355037⟩
  • Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia. Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology (JCV), 2007, 3 (3), pp.195-210. ⟨hal-00439845⟩
  • Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquin Garcia‐alfaro, Sylvain Gombault, et al.. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197-217. ⟨10.1007/BF03219974⟩. ⟨hal-03646855⟩
  • Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Sylvain Gombault, Thierry Sans, et al.. L'anti-corrélation comme critère de sélection de contre-mesures dans le contexte de la détection d'intrusion. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197 - 217. ⟨hal-01923573⟩
  • Joaquin Garcia‐alfaro, Sergio Castillo, Guillermo Navarro-Arribas, Joan Borrell. ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System. International Journal of Computer Science and Network Security, 2005, 5 (11), pp.87-94. ⟨hal-03628711⟩
  • Hervé Debar, B. Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Me, et al.. Corrélation d'alertes en détection d'intrusions. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23 (3). ⟨hal-02964546⟩
  • Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, et al.. Détection d'intrusions : corrélation d'alertes. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p. ⟨hal-00356418⟩
  • Maryline Laurent. Protocole IPsec. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2003, TE7545. ⟨hal-01331303⟩
  • Olivier Paul, Maryline Laurent. Improving packet filters management through automatic and dynamic schemes. Annals of Telecommunications - annales des télécommunications, 2001, 56 (9-10), pp.595-608. ⟨10.1007/BF03008836⟩. ⟨hal-03643165⟩
  • Herbert Leitold, Reinhard Posch, Enrique Areizaga, Ahmed Bouabdallah, Maryline Laurent, et al.. Security services in ATM networks. Interoperable communication networks journal, 1999, 2 (1), pp.107 - 119. ⟨hal-02341316⟩

Communications dans un congrès

  • Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. Towards privacy-preserving and fairness-aware federated learning framework. Privacy Enhancing Technologies (PETs), Jul 2025, Washinghton, DC, United States. pp.845-865, ⟨10.56553/popets-2025-0044⟩. ⟨hal-04782394⟩
  • Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
  • Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024), Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. ⟨hal-04739382⟩
  • Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: a model for accurate predictions with inherent fairness evaluation. 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI), Oct 2024, Santiago de Compostela, SPAIN, Spain. ⟨10.3233/FAIA240592⟩. ⟨hal-04745438⟩
  • Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Venkata Srinivas Kothapalli. Location optimization for tethered aerial base station serving mmWave high altitude UAVs. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.271-276, ⟨10.1109/CCECE59415.2024.10667117⟩. ⟨hal-04762101⟩
  • Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Optimal UAV-trajectory design in a dynamic environment using NOMA and deep reinforcement learning. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.277-282, ⟨10.1109/CCECE59415.2024.10667252⟩. ⟨hal-04762084⟩
  • Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. The 19th International Conference on Availability, Reliability and Security (ARES), Jul 2024, Vienna, Austria. pp.1-13, ⟨10.1145/3664476.3664500⟩. ⟨hal-04669287⟩
  • Hugo Teixeira de Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, et al.. A model-based approach for assessing the security of cyber-physical systems. The 19th International Conference on Availability, Reliability and Security (ARES) (2024), Jul 2024, Vienne, Austria. pp.1-10, ⟨10.1145/3664476.3670470⟩. ⟨hal-04669279⟩
  • Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩. ⟨hal-04695972⟩
  • Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID/session token abuse on openID connect. 21st International Conference on Security and Cryptography (SECRYPT 2024), Jul 2024, Dijon, France. pp.674-679, ⟨10.5220/0012757900003767⟩. ⟨hal-04719043⟩
  • Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphael Troncy. X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), ACM, Jul 2024, Singapore, Singapore. pp.35-48, ⟨10.1145/3634737.3637654⟩. ⟨hal-04446027⟩
  • Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel. DDoS mitigation while preserving QoS: a deep reinforcement learning-based approach. 2024 IEEE : 10th International Conference on Network Softwarization (NetSoft), Jun 2024, Saint Louis, MO, United States. pp.369-374, ⟨10.1109/NetSoft60951.2024.10588889⟩. ⟨hal-04659906⟩
  • Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. XAI-driven adversarial attacks on network intrusion detectors. European Interdisciplinary Cybersecurity Conference (EICC), Jun 2024, Xanthi, Greece. pp.65-73, ⟨10.1145/3655693.3655714⟩. ⟨hal-04660625⟩
  • Romain Dagnas, Michel Barbeau, Joaquin Garcia‐alfaro, Reda Yaich. Resilience assessment of multi-layered cyber-physical systems. IFIP Networking 2024 - IOCRCI, Jun 2024, Thessaloniki, Greece. ⟨hal-04559568v2⟩
  • Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. TBS joint optimization to serve mmWave high altitude UAVs: a counterfactual MAB approach. 13th International Conference on Communications, Circuits and Systems (ICCCAS), May 2024, Xiamen, France. pp.424-429, ⟨10.1109/ICCCAS62034.2024.10652678⟩. ⟨hal-04762130⟩
  • Badis Hammi, Tristan Billot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.314-325, ⟨10.1007/978-3-031-57916-5_27⟩. ⟨hal-04580467⟩
  • Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in copyright management applications : the blockchain perspective. Barolli, L. (eds) Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.169-182, ⟨10.1007/978-3-031-57942-4_18⟩. ⟨hal-04690838⟩
  • Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
  • Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. 2024 IEEE 14th annual computing and communication workshop and conference (CCWC), Jan 2024, Las vegas, NV (US), United States. ⟨10.1109/CCWC60891.2024.10427731⟩. ⟨hal-04402381⟩
  • Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. 18th International Conference on Risks and Security of Internet and Systems ( CRiSIS), Dec 2023, Rabat (MOROCCO), Morocco. pp.185-199, ⟨10.1007/978-3-031-61231-2_12⟩. ⟨hal-04609669⟩
  • Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, ⟨10.1145/3576915.3624027⟩. ⟨hal-04325353⟩
  • Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Towards understanding alerts raised by unsupervised network intrusion detection systems. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ), Oct 2023, Hong Kong China, France. pp.135-150, ⟨10.1145/3607199.3607247⟩. ⟨hal-04172470⟩
  • Iain Burge, Michel Barbeau, Joaquin Garcia‐alfaro. Quantum algorithms for shapley value calculation. 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep 2023, Bellevue, United States. pp.1-9, ⟨10.1109/QCE57702.2023.00024⟩. ⟨hal-04386997⟩
  • Marwan Abbas-Escribano, Hervé Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
  • Pablo Martínez-Sanchez, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. 2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444. ⟨hal-04198175⟩
  • Mario Fernández-Tárraga, Alejandro David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. VIII National Conference on Cybersecurity Research (JNIC), Universidad de la Rioja, Jun 2023, Vigo, España. pp.469--476. ⟨hal-04198177⟩
  • Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Automated enrichment of logical attack graphs via formal ontologies. ICT Systems Security and Privacy Protection (SEC), Jun 2023, Poznan, Poland. pp.59-72, ⟨10.1007/978-3-031-56326-3_5⟩. ⟨hal-04563448⟩
  • Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. 2023 IFIP Networking Conference (IFIP Networking), Jun 2023, Barcelone, Spain. ⟨10.23919/IFIPNetworking57963.2023.10186355⟩. ⟨hal-04083180⟩
  • Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier, Olivier Levillain, et al.. Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3. ⟨hal-04165396⟩
  • Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), LIFO, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164470⟩
  • Joaquin Garcia‐alfaro, Sandrine Bayle. Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS). Colloque IMT 2023 : « Sécurité et Résilience », Apr 2023, Palaiseau, France. ⟨hal-04098069⟩
  • Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
  • Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. 17th International Conference on Risks and Security of Internet and Systems (CRiSIS), Dec 2022, Sousse, Tunisia. pp.18-33, ⟨10.1007/978-3-031-31108-6_2⟩. ⟨hal-03775466⟩
  • Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA. 2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩. ⟨hal-04006345⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro, Christian Lübben, Marc-Oliver Pahl, Wüstrich Lars. Resilience via blackbox self-piloting plants. ECW 2022: European Cyber Week, Pôle d’Excellence Cyber, Nov 2022, Rennes, France. pp.35-46. ⟨hal-04006320⟩
  • Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
  • Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar. Towards a systematic and automatic use of state machine inference to uncover security flaws and fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
  • Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
  • S. Seng, Joaquin Garcia‐alfaro, Y. Laarouci. Implementation of a stateful network protocol intrusion detection systems. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩. ⟨hal-03843013⟩
  • Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez-Granadillo. Efficient hybrid model for intrusion detection systems. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.694-700, ⟨10.5220/0011328300003283⟩. ⟨hal-04137867⟩
  • Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
  • Tristan Bilot, Grégoire Geis, Badis Hammi. PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, France. pp.428-435, ⟨10.5220/0011328600003283⟩. ⟨hal-04401167⟩
  • Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. Switched-based control testbed to assure cyber-physical resilience by design. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩. ⟨hal-03843016⟩
  • Alexandre Dey, Eric Totel, Benjamin Costé. DAEMON: dynamic auto-encoders for contextualised anomaly detection applied to security monitoring. 37th IFIP TC 11 International Conference, SEC 2022,, Jun 2022, Copenhagen, Denmark. ⟨10.1007/978-3-031-06975-8_4⟩. ⟨hal-04181626⟩
  • Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. IEEE International Conference on Communications(ICC ), May 2022, Seoul, South Korea. pp.5238-5243, ⟨10.1109/ICC45855.2022.9838338⟩. ⟨hal-04069291⟩
  • Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675359⟩
  • Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Detecting APT through graph anomaly detection. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675346⟩
  • Sandrine Bayle, Joaquin Garcia‐alfaro. Plateforme de sécurisation des villes: le projet européen IMPETUS. Colloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France. ⟨emse-03624167⟩
  • Mustafizur R. Shahid, Hervé Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨10.1109/ICMLA52953.2021.00256⟩. ⟨hal-03430826⟩
  • Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. The 14th International Symposium on Foundations and Practice of Security ( FPS), Dec 2021, Paris, France. pp.208-217, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03997389⟩
  • Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Ontology-based attack graph enrichment. TIEMS 2021: 28th International Emergency Management Society annual conference, Dec 2021, Online, France. ⟨hal-03628443⟩
  • Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue. Simulation réaliste d'utilisateurs pour les systèmes d'information en Cyber Range. CAID 2021 : applications de l’Intelligence Artificielle aux problématiques défense, Nov 2021, Rennes, France. ⟨hal-03437031⟩
  • Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Risky zone avoidance strategies for drones. CCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering, Sep 2021, Online, France. pp.1-6, ⟨10.1109/CCECE53047.2021.9569172⟩. ⟨hal-03628452⟩
  • Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Tao Wan. Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks. MEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking, Sep 2021, Athens, Greece. pp.479-484, ⟨10.1109/MeditCom49071.2021.9647674⟩. ⟨hal-03628454⟩
  • Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and performance to the internet of things through usage control and blockchains. 16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2021, Virtual, Luxembourg. pp.57-72, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
  • Olivier Levillain, Sébastien Naud, Aina Toky Rasoamanana. Work-in-Progress: towards a platform to compare binary parser generators. IEEE Security and Privacy Workshops, SPW (LangSec), May 2021, San Jose, United States. ⟨hal-04001619⟩
  • Michel Barbeau, Frederic Cuppens, Nora Cuppens, Dagnas, Romain, Joaquin Garcia‐alfaro. Metrics to enhance the resilience of cyber-physical systems. TRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Dec 2020, Guangzhou (online), China. pp.1167-1172, ⟨10.1109/TrustCom50675.2020.00156⟩. ⟨hal-03125741⟩
  • Olivier Levillain. GASP: a Generic Approach to Secure network Protocols. RESSI 2020: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Evry (online), France. ⟨hal-03114203⟩
  • Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Novelty detection on graph structured data to detect network intrusions. CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France. ⟨hal-03115308⟩
  • Neetu Sharma, Rajeev Anand-Sahu, Vishal Saraswat, Joaquin Garcia‐alfaro. Anonymous proof-of-asset transactions using designated blind signatures. FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩. ⟨hal-03125748⟩
  • Mustafizur Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar. Generative Deep Learning for Internet of Things Network Traffic Generation. 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩. ⟨hal-03127899⟩
  • Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩. ⟨hal-03115317⟩
  • Olivier Levillain. Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits. CRiSIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris (en ligne), France. pp.87-104, ⟨10.1007/978-3-030-68887-5_5⟩. ⟨hal-03114218⟩
  • Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Geocaching-inspired navigation for micro aerial vehicles with fallible place recognition. ADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless, Oct 2020, Bari (online), Italy. pp.55-70, ⟨10.1007/978-3-030-61746-2_5⟩. ⟨hal-03125760⟩
  • Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar. Automated saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
  • Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Capacity requirements in networks of quantum repeaters and terminals. QCE 2020: IEEE International Conference on Quantum Computing and Engineering, Oct 2020, Denver (online), United States. pp.148-157, ⟨10.1109/QCE49297.2020.00028⟩. ⟨hal-03125753⟩
  • Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova, Italy. pp.1-9, ⟨10.1109/EuroSPW51379.2020.00083⟩. ⟨hal-02950490⟩
  • Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
  • Omair Faraj, David Megias, Abdel-Mehsen Ahmad, Joaquin Garcia‐alfaro. Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. ARES 2020: 15th international conference on Availability, Reliability and Security, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, ⟨10.1145/3407023.3407048⟩. ⟨hal-03125767⟩
  • Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
  • Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
  • Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
  • Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.238-258, ⟨10.1007/978-3-030-52683-2_12⟩. ⟨hal-02950489⟩
  • François Contat, Grégory Bénassy, Julien Buttin Le Meur, Olivier Levillain. Que faut-il attendre de DNS-over-HTTPS ?. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114209⟩
  • Aina Toky Rasoamanana, Olivier Levillain. Wombat : one more Bleichenbacher toolkit. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114212⟩
  • Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
  • Aida Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
  • Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. LockDown: balance availability attack against lightning network channels. FC 2020: 24th international conference on Financial Cryptography and Data Security, Feb 2020, Sabah, Malaysia. pp.245-263, ⟨10.1007/978-3-030-51280-4_14⟩. ⟨hal-03125777⟩
  • Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim El Yacoubi. Siamese network based feature learning for improved intrusion detection. ICONIP 2019: International Conference on Neural Information Processing, Dec 2019, Sydney, Australia. pp.377-389, ⟨10.1007/978-3-030-36708-4_31⟩. ⟨hal-02421070⟩
  • Eva Gagliardi, Olivier Levillain. Analysis of QUIC session establishment and its implementations. 13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩. ⟨hal-02468596⟩
  • Michel Barbeau, Joaquin Garcia-Alfaro. Faking and discriminating the navigation data of a micro aerial vehicle using quantum generative adversarial networks. GLOBECOM 2019: IEEE Global Communications Workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024550⟩. ⟨hal-03125799⟩
  • Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos. Quality amplification of error prone navigation for swarms of micro aerial vehicles. GLOBECOM 2019: IEEE Global Communications workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024394⟩. ⟨hal-03125798⟩
  • Aina Toky Rasoamanana, Olivier Levillain. Wombat: one more Bleichenbacher attack toolkit. GreHack 2019, Nov 2019, Grenoble, France. ⟨hal-02468592⟩
  • Achraf Fayad, Rida Khatoun, Badis Hammi, Ahmed Serhrouchni. A Blockchain-based Lightweight Authentication Solution for IoT. Cyber Security in Networking, Oct 2019, Quito, Ecuador. ⟨hal-02364380⟩
  • Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Anomalous communications detection in IoT networks using sparse autoencoders. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-5, ⟨10.1109/NCA.2019.8935007⟩. ⟨hal-02423336⟩
  • Fabien Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource allocation for secure SDN-based virtual network migration. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-10, ⟨10.1109/nca.2019.8935027⟩. ⟨hal-02438632⟩
  • Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
  • Vicenç Torra, Joaquin Garcia-Alfaro. Towards an adaptive defuzzification: using numerical Choquet integral. MDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence, Sep 2019, Milan, Italy. pp.113-125, ⟨10.1007/978-3-030-26773-5_11⟩. ⟨hal-02393562⟩
  • Houda Jmila, Gregory Blanc. Designing security-aware service requests for NFV-enabled networks. ICCCN 2019: 28th International Conference on Computer Communication and Networks, Jul 2019, Valencia, Spain. pp.1-9, ⟨10.1109/icccn.2019.8847058⟩. ⟨hal-02438649⟩
  • Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. ASIACCS 2019: 14th ASIA Conference on Computer and Communications Security, Jul 2019, Auckland, New Zealand. pp.602-612, ⟨10.1145/3321705.3329812⟩. ⟨hal-02390275⟩
  • David Lanoe, Michel Hurfin, Eric Totel, Carlos Maziero. An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩. ⟨hal-02409487⟩
  • Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2019, Tangier, Morocco. pp.1582-1587, ⟨10.1109/IWCMC.2019.8766478⟩. ⟨hal-04331571⟩
  • Charles Xosanavongsa, Eric Totel, Olivier Bettan. Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events. EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩. ⟨hal-02363431⟩
  • Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
  • Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
  • Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
  • Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Geocaching-inspired resilient path planning for drone swarms. MISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking, Apr 2019, Paris, France. pp.620 - 625, ⟨10.1109/INFCOMW.2019.8845318⟩. ⟨hal-02127604⟩
  • Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
  • Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche. Authledger: a novel Blockchain-based domain name authentication scheme. 5th International Conference on Information Systems Security and Privacy(ICISSP), Feb 2019, Prague, Czech Republic. pp.345-352, ⟨10.5220/0007366803450352⟩. ⟨hal-03991038⟩
  • Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
  • Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM/IFIP International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
  • Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
  • Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello. Coop-DAAB: cooperative attribute based data aggregation for internet of things applications. On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018,, Oct 2018, Valetta,, Malta. pp.498-515, ⟨10.1007/978-3-030-02610-3_28⟩. ⟨hal-03991056⟩
  • Achraf Fayad, Badis Hammi, Rida Khatoun. An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach. 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, China. pp.1-7, ⟨10.1109/SSIC.2018.8556668⟩. ⟨hal-04401199⟩
  • Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Houda Labiod. Total Eclipse: How To Completely Isolate a Bitcoin Peer. 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, China. pp.1-7, ⟨10.1109/SSIC.2018.8556790⟩. ⟨hal-03295356⟩
  • David Lanoe, Michel Hurfin, Eric Totel. A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems. SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩. ⟨hal-01949183⟩
  • Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications. GRCON 2018: 8th Annual GNU Radio Conference, Sep 2018, Henderson, United States. pp.1 - 8. ⟨hal-02013656⟩
  • Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
  • Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassem, Evangelos Kranakis, et al.. Low frequency mobile communications in underwater networks. ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.239 - 251, ⟨10.1007/978-3-030-00247-3_22⟩. ⟨hal-02013548⟩
  • David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
  • Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A pyramidal-based model to compute the impact of cyber security events. ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19 -, ⟨10.1145/3230833.3230847⟩. ⟨hal-01885053⟩
  • Nesrine Kaaniche, Sana Belguith, Giovanni Russello. EMA-LAB: efficient multi authorisation level attribute based access control. International Conference on Network and System Security (NSS), Aug 2018, Hong Kong, China. pp.187-201, ⟨10.1007/978-3-030-02744-5_14⟩. ⟨hal-03991168⟩
  • Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, et al.. Towards a 5G security architecture: articulating software-defined security and security as a service. 5G-NS 2018: Workshop on 5G Networks Security, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, ⟨10.1145/3230833.3233251⟩. ⟨hal-01988053⟩
  • Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
  • Sana Belguith, Nesrine Kaaniche, Giovanni Russello. Lightweight attribute-based encryption supporting access policy update for cloud assited IoT. Secrypt 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.135-146, ⟨10.5220/0006854603010312⟩. ⟨hal-03991119⟩
  • Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
  • Pierre-Marie Bajan, Hervé Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
  • Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
  • Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
  • Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. GNU radio blocks for long-lasting frames in mobile underwater acoustic communications. French GNU Radio days 2018, Jul 2018, Lyon, France. pp.1 - 2. ⟨hal-02013632⟩
  • Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
  • Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré. Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
  • Paul Marillonnet, Mikaël Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des données personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie Privée, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
  • Cuong Pham, Gregory Blanc, Hervé Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
  • Fabien Charmet, Gregory Blanc. Secure migration of virtual SDN topologies. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438748⟩
  • Nesrine Kaaniche, Jung Eunjin, Ashish Gehani. Efficiently validating aggregated IoT data integrity. 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Mar 2018, Bamberg, Germany. pp.17897073, ⟨10.1109/BigDataService.2018.00046⟩. ⟨hal-03991079⟩
  • François Boutigny, Stephane Betge-Brezetz, Hervé Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
  • Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, et al.. Connectivity Extraction in Cloud Infrastructures. 2017 13th International Conference on Network and Service Management (CNSM), Nov 2017, Tokyo, Japan. pp.1-5, ⟨10.23919/cnsm.2017.8256010⟩. ⟨hal-01593346⟩
  • Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
  • Steven Porretta, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Learning to communicate underwater: an exploration of limited mobility agents. WUWNET 2017 :12th International Conference on Underwater Networks & Systems, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, ⟨10.1145/3148675.3148709⟩. ⟨hal-01740876⟩
  • Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, et al.. Connectivity Graph Reconstruction for Networking Cloud Infrastructures. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Oct 2017, Cambridge, United States. ⟨10.1109/nca.2017.8171337⟩. ⟨hal-01612988⟩
  • Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi. Preserving confidentiality during the migration of virtual SDN topologies: a formal approach. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171392⟩. ⟨hal-01666374⟩
  • Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
  • Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack graph-based countermeasure selection using a stateful return on investment metric. FPS 2017: 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. pp.293 - 302, ⟨10.1007/978-3-319-75650-9_19⟩. ⟨hal-01740860⟩
  • Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen. A Game Theoretical Model for Optimal Distribution of Network Security Resources. Gamesec, Oct 2017, Vienna, Austria. ⟨10.1007/978-3-319-68711-7_13⟩. ⟨hal-01688475⟩
  • Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. STARLORD: Linked Security Data Exploration in a 3D Graph. VizSec - IEEE Symposium on Visualization for Cyber Security, Oct 2017, Phoenix, United States. pp.1 - 4, ⟨10.1109/VIZSEC.2017.8062203⟩. ⟨hal-01619234⟩
  • Badis Hammi, Jean-Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni. Using Butterfly Keys: a Performance Study of Pseudonym Certificates Requests in C-ITS. 1st Cyber Security in Networking Conference, Oct 2017, Rio de Janeiro, Brazil. ⟨hal-02287689⟩
  • Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassen, Evangelos Kranakis, et al.. Doppler effect in the underwater acoustic ultra low frequency band. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.3 - 12, ⟨10.1007/978-3-319-74439-1_1⟩. ⟨hal-01699512⟩
  • Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Steven Porretta. The sound of communication in underwater acoustic sensor networks. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.13 - 23, ⟨10.1007/978-3-319-74439-1_2⟩. ⟨hal-01699521⟩
  • Gustavo Gonzalez-Granadillo, José Rubio-Hernán, Joaquin Garcia‐alfaro. Towards a security event data taxonomy. International Conference on Risks and Security of Internet and Systems (CRISIS), Sep 2017, Dinard, France. pp.29-45, ⟨10.1007/978-3-319-76687-4_3⟩. ⟨hal-04308618⟩
  • Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
  • Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
  • Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
  • Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
  • Jean-Philippe Monteuuis, Badis Hammi, Eduardo Salles Daniel, Houda Labiod, Rémi Blancher, et al.. Securing PKI Requests for C-ITS systems. 3rd International Workshop on Vehicular Networking and Intelligent Transportation Systems. Held within the 26th International Conference on Computer Communications and Networks (ICCCN 2017), Aug 2017, Vancouver, Canada. ⟨hal-02287688⟩
  • Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
  • Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
  • Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
  • Christophe Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana Durcheva, et al.. Security challenges in e-assessment and technical solutions. IV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩. ⟨hal-01699388⟩
  • Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
  • Badis Hammi, Jean Philippe Monteuuis, Eduardo Salles Daniel, Houda Labiod. ASN.1 Specification for ETSI Certificates and Encoding Performance Study. 2017 18th IEEE International Conference on Mobile Data Management (MDM), May 2017, Daejeon, South Korea. pp.291-298, ⟨10.1109/MDM.2017.47⟩. ⟨hal-04401213⟩
  • Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
  • Gregory Blanc, David Machniki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, et al.. NECOMA: Nippon-European Cyberdefense-Oriented Multilayer Analysis. EPS 2017: European Project Space on Networks, Systems and Technologies, Feb 2017, Porto, Portugal. pp.81 - 105, ⟨10.5220/0007902500810105⟩. ⟨hal-02065143⟩
  • Mounir Assaf, David A Naumann, Julien Signoles, Eric Totel, Frédéric Tronel. Hypercollecting Semantics and its Application to Static Analysis of Information Flow. POPL 2017 - ACM Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.874-887, ⟨10.1145/3009837.3009889⟩. ⟨hal-01618360⟩
  • Houda Labiod, Alain Servel, Gérard Segarra, Badis Hammi, Jean-Philippe Monteuuis. Proposal of new solution for service advertisement for ETSI ITS environments: CAM-Infrastructure. the 8th IFIP International Conference on New Technologies, Mobility and Security, 2017, Larnaca, Cyprus. pp.1-4. ⟨hal-02287542⟩
  • Khalifa Toumi, Muhammad Sabir Idrees, Fabien Charmet, Reda Yaich, Gregory Blanc. Usage control policy enforcement in SDN-based clouds: a dynamic availability service use case. HPCC 2016 : 18th IEEE International Conference on High Performance Computing and Communications, Dec 2016, Sydney, Australia. pp.578 - 585, ⟨10.1109/HPCC-SmartCity-DSS.2016.0087⟩. ⟨hal-01449235⟩
  • Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. New types of alert correlation for security information and event management systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
  • Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. NordSec 2016, Nov 2016, Oulu, Finland. pp.101--116, ⟨10.1007/978-3-319-47560-8_7⟩. ⟨hal-01387569⟩
  • Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered watermarking control to handle cyber-physical integrity attacks. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.3 - 19, ⟨10.1007/978-3-319-47560-8_1⟩. ⟨hal-01450276⟩
  • Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
  • Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
  • Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
  • Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
  • Jonathan Yung, Hervé Debar, Louis Granboulan. Security issues and mitigation in Ethernet POWERLINK. CYBERICPS 2016 : 2nd international workshop on Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2016, Heraklion, Greece. ⟨10.1007/978-3-319-61437-3_6⟩. ⟨hal-01560206⟩
  • Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of cyber-physical systems : from theory to testbeds and validation. CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Sep 2016, Heraklion, Greece. pp.3 - 18, ⟨10.1007/978-3-319-61437-3_1⟩. ⟨hal-01543262⟩
  • François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar. Hybrid Risk Assessment Model Based on Bayesian Networks. 11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩. ⟨hal-01393744⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
  • Eric Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche. Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection. 12th European Dependable Computing Conference, Sep 2016, Gothenburg, Sweden. ⟨10.1109/edcc.2016.13⟩. ⟨hal-01334596⟩
  • Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Hervé Debar. Selection of mitigation actions based on financial and operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
  • Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a watermark-based detection scheme to handle cyber-physical attacks. 11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzbourg, Austria. pp.21 - 28, ⟨10.1109/ARES.2016.2⟩. ⟨hal-01449821⟩
  • Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Hervé Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
  • Badis Hammi, M-C Rahal, R. Khatoun. Clustering methods comparison: application to source based detection of botclouds. The second International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'2016), Aug 2016, Paris, France. ⟨hal-02287423⟩
  • Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
  • Eric Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock. SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. ⟨hal-01334608⟩
  • Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
  • Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam-Mann, Noel Crespi, Joaquin Garcia-Alfaro, et al.. CACEV: a Cost and CArbon Emission-Efficient Virtual machine placement method for green distributed clouds. SCC 2016 : 13th IEEE International Conference on Services Computing , Jun 2016, San Francisco, United States. pp.275 - 282, ⟨10.1109/SCC.2016.43⟩. ⟨hal-01359868⟩
  • Mounir Assaf, Julien Signoles, Eric Totel, Frédéric Tronel. The Cardinal Abstraction for Quantitative Information Flow. Workshop on Foundations of Computer Security 2016 (FCS 2016), Jun 2016, Lisbon, Portugal. ⟨hal-01334604⟩
  • Mickael Salaun, Marion Daubignard, Hervé Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
  • Guillaume Endignoux, Olivier Levillain, Jean-Yves Migeon. Caradoc: a pragmatic approach to PDF parsing and validation. 2016 IEEE Security and Privacy Workshops (SPW), May 2016, San Jose, France. pp.126-139. ⟨hal-02143706⟩
  • Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. Proc. 2e atelier sur la Sécurité dans les Clouds, Feb 2016, paris, France. ⟨hal-03991200⟩
  • Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator. 11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩. ⟨hal-01241810⟩
  • Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
  • Ehsan Ahvar, Shohreh Ahvar, Noel Crespi, Joaquin Garcia-Alfaro, Zoltan Adam-Mann. NACER : a network-aware cost-efficient resource allocation method for processing-intensive tasks in distributed clouds. NCA 2015 : 14th International Symposium on Network Computing and Applications, Nov 2015, Cambridge, Ma, United States. pp.90 - 97, ⟨10.1109/NCA.2015.37⟩. ⟨hal-01263401⟩
  • Guillaume Hiet, Hervé Debar, Sélim Ménouar, Vérène Houdebine. Etude comparative des formats d’alertes. C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148. ⟨hal-01242786⟩
  • Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi. Eye can tell : on the correlation between eye movement and phishing identification. ICONIP 2015 : 22nd International Conference on Neural Information Processing, Nov 2015, Istanbul, Turkey. pp.223 - 232, ⟨10.1007/978-3-319-26555-1_26⟩. ⟨hal-01263381⟩
  • Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi. AJNA : anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLS. BADGERS 2015 : 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Nov 2015, Kyoto, Japan. pp.74 - 84, ⟨10.1109/BADGERS.2015.019⟩. ⟨hal-01453228⟩
  • Daniel Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline Laurent, et al.. Recommendations for IPsec configuration on homenet and M2M devices. Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Nov 2015, Cancun, Mexico. pp.9 - 17, ⟨10.1145/2815317.2815323⟩. ⟨hal-01263312⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
  • Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
  • Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
  • Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
  • Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
  • Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
  • Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
  • Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. Services 2015 : IEEE World Congress on Services , Jun 2015, New York, United States. pp.143 - 150, ⟨10.1109/SERVICES.2015.29⟩. ⟨hal-01254993⟩
  • Olivier Levillain. SSL/TLS, 3 ans après. Symposium sur la Sécurité des Technologies de l'Information et de la Communication, Jun 2015, Rennes, France. pp.227-273. ⟨hal-01154823⟩
  • Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩. ⟨hal-01255089⟩
  • Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Jordi Cabot. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. 30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩. ⟨hal-01152528⟩
  • Hammi Badis, Guillaume Doyen, Rida Khatoun. A collaborative approach for a source based detection of botclouds. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), May 2015, Ottawa, France. pp.906-909, ⟨10.1109/INM.2015.7140406⟩. ⟨hal-02342672⟩
  • Michel Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro, Bita Hasannezhad, et al.. Simulation of underwater communications with a colored noise approximation and mobility. CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1532 - 1537, ⟨10.1109/CCECE.2015.7129508⟩. ⟨hal-01263406⟩
  • Michel Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Location-free link state routing for underwater acoustic sensor networks. CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1544 - 1549, ⟨10.1109/CCECE.2015.7129510⟩. ⟨hal-01263407⟩
  • Florian Maury, Jean-Rene Reinhard, Olivier Levillain, Henri Gilbert. Format Oracles on OpenPGP. The Cryptographer's Track at the RSA (CT-RSA), Apr 2015, San Francisco, United States. pp.220-236, ⟨10.1007/978-3-319-16715-2_12⟩. ⟨hal-01154822⟩
  • Olivier Levillain, Baptiste Gourdin, Hervé Debar. TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩. ⟨hal-01154820⟩
  • Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. Towards autonomic DDoS mitigation using Software Defined Networking. SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩. ⟨hal-01257899⟩
  • Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. Digital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France. ⟨hal-01281994⟩
  • Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios. 2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩. ⟨hal-01091385⟩
  • E Godefroy, E Totel, M Hurfin, F Majorczyk, A Maaroufi. Automatiser la construction de règles de corrélation : prérequis et processus. C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Nov 2014, Rennes, France. pp.9. ⟨hal-01091327⟩
  • Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen. Data Integrity and Availability Verification Game in Untrusted Cloud Storage. GameSec, Nov 2014, Los Angeles, United States. ⟨hal-01110522⟩
  • Yosra Ben Mustapha, Hervé Debar, Gregory Blanc. Policy enforcement point model. SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩. ⟨hal-01263380⟩
  • Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent. Secure IPsec based offload architectures for mobile data : architecture description and performance evaluation. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks, Sep 2014, Montreal, Canada. pp.95 - 104, ⟨10.1145/2642687.2642690⟩. ⟨hal-01263065⟩
  • Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent. Elastic virtual private cloud. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks , Sep 2014, Montreal, Canada. pp.127 - 131, ⟨10.1145/2642687.2642704⟩. ⟨hal-01264790⟩
  • Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. The bidirectional algorithm for channel selection using a two-radio model. VTC Fall 2014 : IEEE 80th Vehicular Technology Conference, Sep 2014, Vancouver, Canada. pp.1 - 5, ⟨10.1109/VTCFall.2014.6966200⟩. ⟨hal-01264783⟩
  • Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi. EyeBit: eye-tracking approach for enforcing phishing prevention habits. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.56 - 65, ⟨10.1109/BADGERS.2014.14⟩. ⟨hal-01304643⟩
  • Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Hervé Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
  • Joaquin Garcia-Alfaro, Cristina Romero-Tris, Jose Rubio-Hernan. Simulaciones software para el estudio de amenazas contra sistemas SCADA. RECSI 2014 : XIII Reunión Española sobre Criptología y Seguridad de la Información, Sep 2014, Alicante, España. pp.151 - 156. ⟨hal-01264800⟩
  • Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel public-key based framework to handle data sharing security in clouds. SECRYPT 2014 : 11th International Conference on Security and Cryptography, Aug 2014, Vienne, Austria. pp.5 - 18, ⟨10.5220/0005010600050018⟩. ⟨hal-01263351⟩
  • Wiem Tounsi, Benjamin Justus, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. SERE-C 2014 : IEEE 8th International Conference on Software Security and Reliability, Jun 2014, San Francisco, United States. pp.113 - 120, ⟨10.1109/SERE-C.2014.29⟩. ⟨hal-01073179⟩
  • Hammi Badis, Guillaume Doyen, Rida Khatoun. Toward a Source Detection of Botclouds: A PCA-Based Approach. 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.105-117, ⟨10.1007/978-3-662-43862-6_13⟩. ⟨hal-01401295⟩
  • Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks. ADHOC-NOW 2014 : 13th International Conference on Ad-Hoc Networks and Wireless , Jun 2014, Benidorm, Spain. pp.197 - 208, ⟨10.1007/978-3-319-07425-2_15⟩. ⟨hal-01264803⟩
  • Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identités multiples et protection des données à caractère personnel dans le champ des identités numériques : quelques aspects du paysage européen. 5ème Atelier sur la Protection de la Vie Privée, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
  • Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model. ICC 2014 : IEEE International Conference on Communications, Jun 2014, Sidney, Australia. pp.1590 - 1595, ⟨10.1109/ICC.2014.6883549⟩. ⟨hal-01264809⟩
  • Gustavo Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar. Combining technical and financial impacts for countermeasure selection. AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩. ⟨hal-01257903⟩
  • Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel zero-knowledge scheme for proof of data possession in cloud storage applications. CCGRID 2014 : 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing , May 2014, Chicago, United States. pp.522 - 531, ⟨10.1109/CCGrid.2014.81⟩. ⟨hal-01263463⟩
  • Olivier Levillain. Parsifal: a Pragmatic Solution to the Binary Parsing Problem. LangSec Workshop at IEEE Security & Privacy, May 2014, San Jose, United States. ⟨hal-01020138⟩
  • Jaeger Eric, Olivier Levillain. Mind your Language(s): A Discussion about Languages and Security. LangSec Workshop at IEEE Security & Privacy, May 2014, San Jose, United States. ⟨hal-01020129⟩
  • Erwan Godefroy, Eric Totel, Frédéric Majorczyk, Michel Hurfin. Génération automatique de règles de corrélation pour la détection d'attaques complexes. 9eme conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI), May 2014, Lyon, France. pp.10. ⟨hal-01083699⟩
  • Hammi Badis, Guillaume Doyen, Rida Khatoun. Understanding botclouds from a system perspective: A principal component analysis. NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium, May 2014, Krakow, France. pp.1-9, ⟨10.1109/NOMS.2014.6838310⟩. ⟨hal-02342695⟩
  • Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security , Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, ⟨10.1109/NTMS.2014.6814002⟩. ⟨hal-01263425⟩
  • Badis Hammi, Rida Khatoun, Guillaume Doyen. A Factorial Space for a System-Based Detection of Botcloud Activity. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), Mar 2014, Dubai, France. pp.1-5, ⟨10.1109/NTMS.2014.6813996⟩. ⟨hal-02342696⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. QoS and security in Link State Routing protocols for MANETs. WD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 6, ⟨10.1109/WD.2013.6686442⟩. ⟨hal-01260585⟩
  • Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A new analytic model for the cognitive radio jump-stay algorithm. WD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 3, ⟨10.1109/WD.2013.6686443⟩. ⟨hal-01260581⟩
  • Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks. MEDES 2013 : 5th ACM Conference on Management of Emergent Digital EcoSystems , Oct 2013, Neumünster Abbey, Luxembourg. pp.60 - 67. ⟨hal-00944940⟩
  • Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Privacy-enhanced Filtering and Collection Middleware in EPCglobal Networks. CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. ⟨hal-00944945⟩
  • Olivier Levillain, Hervé Debar, Benjamin Morin. Parsifal: writing efficient and robust binary parsers, quickly. 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. pp.1. ⟨hal-00924120⟩
  • Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos Dellas, Joaquin Garcia-Alfaro, et al.. Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. FPS 2013 : the sixth international symposium on foundations & practice of security, Oct 2013, La Rochelle, France. pp.209 - 226, ⟨10.1007/978-3-319-05302-8_13⟩. ⟨hal-01161938⟩
  • Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
  • Salvador Martinez Perez, García-Alfaro Joaquin, Cuppens Frédéric, Nora Cuppens-Boulahia, Jordi Cabot. Model-Driven Extraction and Analysis of Network Security Policies. Model-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013, Sep 2013, Miami, United States. pp.52-68. ⟨hal-00869319⟩
  • Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs. SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France. ⟨hal-00909293⟩
  • Hammi Badis, Rida Khatoun, Guillaume Doyen. Caractérisation des attaques DDoS générées par un Botcloud. 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), Sep 2013, Mont de Marsan, France. ⟨hal-02611041⟩
  • Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High Availability for IPsec VPN Platforms: ClusterIP Evaluation. 8th International Conference on Availability, Reliability and Security (ARES 2013), Sep 2013, Regensburg, Germany. pp.1. ⟨hal-00863418⟩
  • Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135. ⟨hal-01126288⟩
  • Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent. PREFETCHing to overcome DNSSEC deployment over large resolving platforms. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.694 - 703, ⟨10.1109/TrustCom.2013.84⟩. ⟨hal-01262120⟩
  • Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
  • Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Real-time malicious fast-flux detection using DNS and bot related features. PST 2013 : 11th International Conference on Privacy, Security and Trust, Jul 2013, Tarragona, Spain. pp.369 - 372, ⟨10.1109/PST.2013.6596093⟩. ⟨hal-01275014⟩
  • Salvador Martinez Perez, García-Alfaro Joaquin, Cuppens Frédéric, Nora Cuppens-Boulahia, Jordi Cabot. Towards an Access-Control Metamodel for Web Content Management Systems. ICWE 2013: the International Conference on Web Engineering - MDWE 2013: Model-Driven Web Engineering, Jul 2013, Aalborg, Denmark. pp 148-155. ⟨hal-00869324⟩
  • Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. Program Transformation for Non-interference Verification on Programs with Pointers. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.231-244, ⟨10.1007/978-3-642-39218-4_18⟩. ⟨hal-00814671v2⟩
  • Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
  • Khaled El Dassouki, Hervé Debar, Haidar Safa, Abbas Hijazi. A TCP delay based mechanism for detecting congestion in the internet. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.141-145, ⟨10.1109/ICCITechnology.2013.6579538⟩. ⟨hal-00860428⟩
  • Daniel Palomares, Daniel Migault, Maryline Laurent. Failure preventive mechanism for IPsec gateways. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.167-172, ⟨10.1109/ICCITechnology.2013.6579543⟩. ⟨hal-00860251⟩
  • Emmanuel Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Maryline Laurent. Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.824-827. ⟨hal-00860157⟩
  • Daniel Migault, Stanislas Francfort, Stéphane Sénécal, Emmanuel Herbert, Maryline Laurent. Overcoming DNSSEC performance issues with DHT-based architectures. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819. ⟨hal-00860147⟩
  • Ethmane El Moustaine, Maryline Laurent. GPS+ : a back-end coupons identification for low-cost RFID. WiSec '13 : 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Apr 2013, Budapest, Hungary. pp.73-78, ⟨10.1145/2462096.2462109⟩. ⟨hal-00843977⟩
  • Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
  • Olivier Levillain, Arnaud Ebalard, Benjamin Morin, Hervé Debar. One year of SSL internet measurement. ACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00768258⟩
  • Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. ISP offload infrastructure to minimize cost and time deployment. GLOBECOM '12 : IEEE Global Communications Conference, Dec 2012, Anaheim, United States. pp.1041-1047, ⟨10.1109/GLOCOM.2012.6503250⟩. ⟨hal-00833402⟩
  • Nabil Hachem, Hervé Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference, Dec 2012, Austin, United States. pp.171-180, ⟨10.1109/PCCC.2012.6407750⟩. ⟨hal-00813393⟩
  • Catherine Bernard, Hervé Debar, Salim Benayoune. Cross-domain vulnerabilities over social networks. CASoN '12 : 4th International Conference on Computational Aspects of Social Networks, Nov 2012, Sao Carlos, Brazil. pp.8-13, ⟨10.1109/CASoN.2012.6412370⟩. ⟨hal-00813344⟩
  • Marc Lacoste, Aurelien Wailly, Hervé Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong. User Defined Control Flow Policy for Web Service Orchestration. C&ESAR 2012, Nov 2012, Rennes, France. pp.NC. ⟨hal-00761354⟩
  • Ethmane El Moustaine, Maryline Laurent. A lattice based authentication for low-cost RFID. RFID-TA '12 : IEEE International Conference on RFID Technology and Applications, Nov 2012, Nice, France. pp.68-73, ⟨10.1109/RFID-TA.2012.6404569⟩. ⟨hal-00772773⟩
  • Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohamed Achemlal. Individual countermeasure selection based on the return on response investment index. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.156-170, ⟨10.1007/978-3-642-33704-8_14⟩. ⟨hal-00747144⟩
  • Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of honeypot/honeynet databases to enhance alert correlation. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩. ⟨hal-00747133⟩
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. Detecting Attacks Against Data in Web Applications. CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8. ⟨hal-00735997⟩
  • Salvador Martínez, García-Alfaro Joaquin, Cuppens Frédéric, Nora Cuppens-Boulahia, Jordi Cabot. A model-driven approach for the extraction of network access-control policies. Model-Driven Security Workshop, Nora Koch, Alexander Knapp, Geri Georg, Marina Egea, Benoit Baudry, Oct 2012, Innsbruck, Austria. ⟨hal-00734230⟩
  • Gustavo Daniel Gonzalez Granadillo, Grégoire Jacob, Hervé Debar, Luigi Coppolino. Combination approach to select optimal countermeasures based on the RORI index. INTECH '12 : Second International Conference on Innovative Computing Technology, Sep 2012, Casablanca, Morocco. pp.38-45, ⟨10.1109/INTECH.2012.6457801⟩. ⟨hal-00788696⟩
  • Aurelien Wailly, Marc Lacoste, Hervé Debar. VESPA : multi-layered self-protection for cloud resources. ICAC '12 : The 9th ACM International Conference on Autonomic Computing, Sep 2012, San José, United States. pp.155-160, ⟨10.1145/2371536.2371564⟩. ⟨hal-00738174⟩
  • Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison. Challenges for advanced security monitoring : the MASSIF project. TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩. ⟨hal-00747573⟩
  • Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. E2E : an optimized IPsec architecture for secure and fast offload. IWSMA '12 : The First International Workshop on Security of Mobile Applications, Aug 2012, Prague, Czech Republic. pp.365-374, ⟨10.1109/ARES.2012.80⟩. ⟨hal-00756529⟩
  • Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Joaquin Garcia Alfaro. Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. ARES 2012 : 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.123 - 132, ⟨10.1109/ARES.2012.61⟩. ⟨hal-01213900⟩
  • Jean-Michel Combes, Ghada Arfaoui, Maryline Laurent. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context. AReS '12 : The 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.206-211, ⟨10.1109/ARES.2012.69⟩. ⟨hal-00756609⟩
  • Andrei Vlad Sambra, Maryline Laurent. Context-aware decentralized approach for web services. DTSOS '12 : IEEE SERVICES Workshop on Discovery, Testing, and Services-Oriented Software, Jun 2012, Honolulu, Hawaii, United States. pp.73-79, ⟨10.1109/SERVICES.2012.65⟩. ⟨hal-00734243⟩
  • Olivier Levillain. SSL/TLS: état des lieux et recommandations. SSTIC - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2012, Rennes, France. pp.3. ⟨hal-00770472⟩
  • Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): mécanismes de prévention contre l'usurpation d'adresses IP source. SSTIC 2012 : Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
  • Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz, Xavier Rimasson. Handling Stateful Firewall Anomalies. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩. ⟨hal-00737170⟩
  • Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz, Stéphane Morucci, et al.. Detection des anomalies dans les pare-feux de nouvelles generations. SAR-SII 2012 : 7th Conference on Network and Information Systems Security, May 2012, Cabourg, France. ⟨hal-01865228⟩
  • Jean-Michel Combes, Aurelien Wailly, Maryline Laurent. CGA as alternative security credentials with IKEv2 : implementation and analysis. SAR-SSI '12 : 7th Conference on Network Architectures and Information Systems Security, May 2012, Cabourg, France. pp.53-59. ⟨hal-00747186⟩
  • Yosra Ben Saied, Alexis Olivereau, Maryline Laurent. A distributed approach for secure M2M communications. NTMS '12 : 5th IFIP International Conference on New Technologies, Mobility and Security, May 2012, Istambul, Turkey. pp.1-7, ⟨10.1109/NTMS.2012.6208702⟩. ⟨hal-00811949⟩
  • Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
  • Aurelien Wailly, Marc Lacoste, Hervé Debar. KungFuVisor : enabling hypervisor self-defense. EuroDW '12 : The 6th EuroSys Doctoral Workshop, Apr 2012, Bern, Switzerland. ⟨hal-00738069⟩
  • Aymen Boudguiga, Maryline Laurent. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-based cryptographic algorithms. ComNet '12 : The Third International Conference on Communications and Networking, Mar 2012, Tunis, Tunisia. pp.1-8, ⟨10.1109/ComNet.2012.6217728⟩. ⟨hal-00819802⟩
  • Aymen Boudguiga, Maryline Laurent. An EAP ID-Based authentication method for wireless networks. ISTP '11 : International Workshop on Information Security, Theory and Practice, Dec 2011, Abu Dhabi, United Arab Emirates. pp.232-239. ⟨hal-00802365⟩
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Preventing data leakage in service orchestration. IAS 2011, Dec 2011, Malacca, Malaysia. 6 p., ⟨10.1109/ISIAS.2011.6122806⟩. ⟨hal-00657796⟩
  • Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags. IECON 2011: 37th Annual Conference of the IEEE Industrial Electronics Society, Nov 2011, Melbourne, Australia. pp.3820 - 3825, ⟨10.1109/IECON.2011.6119932⟩. ⟨hal-00725612⟩
  • Andrei Vlad Sambra, Maryline Laurent. MyProfile - Privacy Aware Decentralized Identity on the Web. 1st International Conference on Secure networking and Applications (ICSNA), Oct 2011, Paris, France. ⟨hal-00745416⟩
  • Daniel Palomares, Maryline Laurent. Mechanisms to Ensure Continuity of Service for IPsec/IKEv2 Based Communications. ICSNA-2011: International Conference on Secure Networking and Applications ,24-25 October, Paris, France, Oct 2011, Paris, France. pp.1. ⟨hal-00863428⟩
  • Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
  • Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
  • Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent. A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.249--253, ⟨10.1109/ICNSS.2011.6060009⟩. ⟨hal-00745353⟩
  • Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar. An ontology-based model for SIEM environments. ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩. ⟨hal-00728521⟩
  • Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
  • Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
  • Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, et al.. From SSIR to CIDre: a New Security Research Group in Rennes. 1st SysSec Workshop, Jul 2011, Amsterdam, Netherlands. ⟨hal-00656940⟩
  • Claire Sondès Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
  • Romaric Ludinard, Loic Le Hennaff, Eric Totel. RRABIDS, un système de détection d'intrusion pour les applications Ruby on Rails. SSTIC 2011, Jun 2011, Rennes, France. 11 p. ⟨hal-00657814⟩
  • Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel. Detecting illegal system calls using a data-oriented detection model. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩. ⟨hal-00657971⟩
  • Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
  • Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Hervé Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
  • Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
  • Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
  • Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
  • Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress. FPS 2011: 4th Canada-France MITACS Workshop on Foundations & Practice of Security, May 2011, Paris, France. pp.242-252. ⟨hal-00668166⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Mitigation of flooding disruption attacks in hierarchical OLSR networks. CNSR 2011: 9th Annual Communication Networks and Services Research Conference, May 2011, Ottawa, Canada. pp.167-174, ⟨10.1109/CNSR.2011.32⟩. ⟨hal-00623195⟩
  • Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011 : IEEE Wireless Communications and Networking Conference, Mar 2011, Cancun, Mexico. pp.784 - 789, ⟨10.1109/WCNC.2011.5779232⟩. ⟨hal-01304157⟩
  • Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
  • Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
  • Laurent Gomez, Mehdi Khalfaoui, Elie El-Khoury, Cedric Ulmer, Jean-Pierre Deutsch, et al.. RESCUEIT : sécuRisation dE la Chaîne logiStique orientée serviCe depUis le mondE des objets jusqu'à l'univers InformaTique. WISG '11 : Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2011, Troyes, France. ⟨hal-00727624⟩
  • Pascal Urien, Marc Pasquet, Christophe Kiennert. A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards. CTS, 2011, United States. pp.476 - 483, ⟨10.1109/CTS.2011.5928726⟩. ⟨hal-00673667⟩
  • Pascal Urien, Estelle Marie, Christophe Kiennert. A New Convergent Identity System Based on EAP-TLS Smart Cards. SAR-SSI, 2011, France. pp.1-6. ⟨hal-00673666⟩
  • Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, Pékin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
  • Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
  • Daniel Migault, Cédric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
  • Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Mitigation of topology control traffic attacks in OLSR networks. 5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Oct 2010, Montréal, Canada. pp.1-8, ⟨10.1109/CRISIS.2010.5764920⟩. ⟨hal-00623629⟩
  • Joaquin Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda. MIRAGE: a management tool for the analysis and deployment of network security policies. 3rd SETOP International Workshop on Autonomous and Spontaneous Security (Co-located with ESORICS 2010), Sep 2010, Athens, Greece. pp.203-215, ⟨10.1007/978-3-642-19348-4_15⟩. ⟨hal-00623634⟩
  • Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
  • Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. A service dependency model for cost-sensitive intrusion response. ESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩. ⟨hal-01164601⟩
  • Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. Ex-SDF: an extended service dependency framework for intrusion impact assessment. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩. ⟨hal-00565624⟩
  • Hervé Debar, Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens. Service dependencies in information systems security. MMM-ACNS 2010 : 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, Sep 2010, Saint Petersburg, Russia. pp.1 - 20, ⟨10.1007/978-3-642-14706-7_1⟩. ⟨hal-01164740⟩
  • Claire Sondès Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, Pékin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
  • Joaquin Garcia Alfaro, Jordi Herrera Joancomarti, Joan Melia Segui. A multiple-polynomial LFSR based pseudorandom number generator design for EPC gen2 systems. Mitacs Workshop on Network Security & Cryptography, Jun 2010, Toronto, Canada. ⟨hal-00527573⟩
  • Kheira Bekara, Maryline Laurent. La vie privée dans les environnements fédérés. Atelier protection de la vie privée 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
  • Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens. Sécuriser les communications dans les systèmes de surveillance médicale - Protocoles appliqués aux étiquettes à faible coût. INFORSID 2010 : XXIIIe congrès INFORSID, May 2010, Marseille, France. ⟨hal-00565842⟩
  • Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens. Protocoles d'échange de clés pour des systèmes de surveillance à base de radio-étiquettes. 5th Conference on Network Architectures and Information Systems, May 2010, Rocquebrune Cap-Martin, France. ⟨hal-00609294⟩
  • Tony Cheneau, Maryline Laurent. Étude des solutions de proxy Neighbor Discovery sécurisées et proposition basée sur la Signature Agility. 5ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
  • Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel. Generation et evaluation de mecanismes de detection d'intrusion au niveau applicatif. SARSSI 2010, May 2010, Menton, France. pp.NC. ⟨hal-00536661⟩
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Protection des données utilisateurs dans une orchestration de Web-Services. SARSSI 2010, May 2010, Menton, France. pp.NC. ⟨hal-00536660⟩
  • Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens. Securing the communications of home health care systems based on RFID Sensor networks. Conference on Communications Networks and Services Research, May 2010, Montréal, Canada. ⟨hal-00484511⟩
  • Yannick Carlinet, Ludovic Mé, Yvon Gourhant, Hervé Debar. Evaluation of P4P based on real traffic measurement. 5th International Conference on Internet Monitoring and Protection, May 2010, Barcelona, Spain. pp.NC. ⟨hal-00534571⟩
  • Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Caching P2P traffic: what are the benefits for an ISP?. 9th International Conference on Networks - ICN 2010, Apr 2010, Menuires, France. pp.NC. ⟨hal-00534574⟩
  • Grégoire Jacob, Eric Filiol, Hervé Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
  • Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro, Laurent Toutain. Model-driven security policy deployment: property oriented approach. ESSos 2010 : second International symposium on Engineering Secure Software and Systems, Feb 2010, Pise, Italy. pp.123-139, ⟨10.1007/978-3-642-11747-3_10⟩. ⟨hal-00540842⟩
  • Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags. FC 2010 Workshops and 14th Financial Cryptograpy and Data Security International Conference, Jan 2010, Ténénérife, Spain. pp.34-56. ⟨hal-00527593⟩
  • Pascal Urien, Estelle Marie, Christophe Kiennert. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards. ICDT, 2010, Greece. pp.22-27, ⟨10.1109/ICDT.2010.12⟩. ⟨hal-00673665⟩
  • Sergio Castillo-Perez, Joaquin Garcia Alfaro. Spyware-based menaces against web applications. International Conference on Intelligent Networking and Collaborative Systems, Nov 2009, Barcelone, Spain. pp.409-412, ⟨10.1109/INCOS.2009.31⟩. ⟨hal-00527605⟩
  • Olivier Sarrouy, Eric Totel, Bernard Jouga. Application data consistency checking for anomaly based intrusion detection. The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Nov 2009, Lyon, France. pp.NC. ⟨hal-00424584⟩
  • Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro. A secured delegation of remote services on IPv6 home networks. The 4th International Conference on Risks and Security of Internet and Systems, Oct 2009, Toulouse, France. ⟨hal-02369611⟩
  • Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel. SIDAN: a tool dedicated to Software Instrumentation for Detecting Attacks on Non-control-data. 4th International Conference on Risks and Security of Internet and Systems (CRISIS'2009), Oct 2009, Toulouse, France. pp.NC. ⟨hal-00424574⟩
  • Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Security threat mitigation trends in low-cost RFID systems. DPM-SETOP 2009 : 4th International Workshop on Data Privacy Management and Second International Workshop on Autonomous and Spontaneous Security, Sep 2009, Saint Malo, France. pp.193-207. ⟨hal-00540876⟩
  • Olivier Sarrouy, Eric Totel, Bernard Jouga. Building an application data behavior model for intrusion detection. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Jul 2009, Montreal, Canada. pp. 299-306. ⟨hal-00441423⟩
  • Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka. A service dependency modeling framework for policy-based response enforcement. DIMVA 09 : 6th international conference on Detection of Intrusions, Malware and Vulnerability Assessment, Jul 2009, Como, Italy. pp.176-195. ⟨hal-00433302v2⟩
  • Olivier Sarrouy, Eric Totel, Bernard Jouga. Un modèle de comportement fondé sur les données pour la détection d'intrusion dans les applications. 4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI 2009), Jun 2009, Luchon, France. pp.NC. ⟨hal-00424582⟩
  • Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Amélioration des performances des adresses CGA et du protocole SEND : étude comparée de RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4ème Conférence sur la sécurité des architectures réseaux et des systèmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
  • Claire Sondès Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
  • Joaquin Garcia‐alfaro, M. Barbeau, E. Kranakis. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. 2009 Seventh Annual Communication Networks and Services Research Conference (CNSR), May 2009, Moncton, Canada. pp.86-93, ⟨10.1109/CNSR.2009.23⟩. ⟨hal-03628765⟩
  • Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
  • Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. 24th IFIP TC-11 International Information Security Conference (IFIPsec2009), May 2009, Pafos, Cyprus. pp.164-175, ⟨10.1007/978-3-642-01244-0_15⟩. ⟨hal-03628762⟩
  • Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Evaluation of Two Privacy-Preserving Protocols for the DNS. 2009 Sixth International Conference on Information Technology: New Generations, Apr 2009, Las Vegas, United States. pp.411-416, ⟨10.1109/ITNG.2009.195⟩. ⟨hal-03628760⟩
  • Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Mar 2009, Sydney, Australia. pp.251 - 261, ⟨10.1145/1533057.1533092⟩. ⟨hal-02369624⟩
  • Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. the 4th International Symposium, Mar 2009, Sydney, France. pp.251, ⟨10.1145/1533057.1533092⟩. ⟨hal-03628758⟩
  • Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
  • Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
  • Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Anonymous Resolution of DNS Queries. International Workshop on Information Security (IS'08), International OTM Conference, Nov 2008, Monterrey, Mexico. pp.987-1000, ⟨10.1007/978-3-540-88873-4_5⟩. ⟨hal-03628757⟩
  • Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
  • Claire Sondès Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
  • Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Evaluation of Anonymized ONS Queries. Workshop on Security of Autonomous and Spontaneous Networks (SETOP 2008), Oct 2008, Loctudy, France. ⟨hal-03628755⟩
  • Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saidane. Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. IFIP SEC 2008, Sep 2008, Milan, Italy. 15 p. ⟨hal-00353005⟩
  • Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
  • Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Analysis of Computer Virus Infection Risk Factors based on Customer Network Usage. 2nd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Aug 2008, Cap Estérel, France. ⟨hal-00353009⟩
  • Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
  • Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
  • Joaquin Garcia‐alfaro, M. Jaeger, G. Muhl, I. Barrera, J. Borrell. Distributed Exchange of Alerts for the Detection of Coordinated Attacks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR '08), May 2008, Halifax, Canada. pp.96-103, ⟨10.1109/CNSR.2008.70⟩. ⟨hal-03628753⟩
  • Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Analysis of Threats to the Security of EPC Networks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR), May 2008, Halifax, Canada. pp.67-74, ⟨10.1109/CNSR.2008.69⟩. ⟨hal-03628754⟩
  • Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Security Threats on EPC Based RFID Systems. 2008 Fifth International Conference on Information Technology: New Generations (ITNG), Apr 2008, Las Vegas, United States. pp.1242-1244, ⟨10.1109/ITNG.2008.206⟩. ⟨hal-03628751⟩
  • Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
  • Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
  • Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de sécurité dans un réseau mesh multi sauts. GRES 2007 : 8ème Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des réseaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
  • Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. 2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007), Nov 2007, Vilamoura, Portugal. pp.1770-1784, ⟨10.1007/978-3-540-76843-2_45⟩. ⟨hal-03628749⟩
  • Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
  • Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. IFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security, Oct 2007, Malaga, Spain. pp.287-298, ⟨10.1007/978-3-540-89173-4_24⟩. ⟨hal-03628748⟩
  • Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro, Laurent Toutain. Reliable process for security policy deployment. SECRYPT 2007 : international conference on security and cryptography, Jul 2007, Barcelone, Spain. ⟨hal-02368751⟩
  • Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia‐alfaro, Laurent Toutain. Reliable Process for Security Policy Deployment. International Conference on Security and Cryptography, Jul 2007, Barcelona, France. pp.5-15, ⟨10.5220/0002119200050015⟩. ⟨hal-03628747⟩
  • Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
  • Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saidane. Détection d'intrusions et diagnostic d'anomalies dans un système diversifié par comparaison de graphes de flux d'informations. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. ⟨hal-00268620⟩
  • Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Claire Sondès Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
  • Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP 2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
  • Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
  • Joaquin Garcia‐alfaro, Frederic Cuppens, Nora Cuppens-Boulahia. Aggregating and Deploying Network Access Control Policies. The Second International Conference on Availability, Reliability and Security (ARES'07), Apr 2007, Vienna, France. pp.532-542, ⟨10.1109/ARES.2007.34⟩. ⟨hal-03628743⟩
  • Frédéric Majorczyk, Eric Totel, Ludovic Mé. Experiments on COTS Diversity as an Intrusion Detection and Tolerance Mechanism. Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS), Mar 2007, Lisbon, Portugal. ⟨hal-00268683⟩
  • Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saidane, et al.. A dependable intrusion detection architecture based on agreement services. Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p. ⟨hal-00269302⟩
  • Omar Cheikhrouhou, Maher Ben Jemaa, Maryline Laurent. Nouvelle méthode d'authentification EAP-EHash. CFIP 2006/ Colloque Francophone sur l'Ingénierie des Protocoles, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. ⟨inria-00111911⟩
  • Joaquin Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Analysis of policy anomalies on distributed network security setups. ESORICS 2006 : 11th European Symposium on Research in Computer Security, Sep 2006, Hamburg, Germany. pp.496-511. ⟨hal-00540450⟩
  • Joaquin Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards filtering and alerting rule rewriting on single-component policies. Proceedings of the 25th International Conference, SAFECOMP 2006, Jun 2006, Gdansk, Poland. pp.182-194. ⟨hal-00540448⟩
  • Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection of Network Security Component Misconfiguration by Rewriting and Correlation. 5th Conference on Security and Network Architectures (SAR-SSI2006), Jun 2006, Seignose, France. ⟨hal-03628721⟩
  • Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Seguier. Time series modeling for IDS alert management. ACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113. ⟨hal-00143467⟩
  • Julien Bournelle, Guillaume Valadon, David Binet, Saber Zrelli, Maryline Laurent-Maknavicius, et al.. AAA considerations within several NEMO deployment scenarios. WONEMO 2006, Jan 2006, Sendai, Japan. ⟨hal-01351674⟩
  • Y. Thomas, Benjamin Morin, Hervé Debar. Improving security management through passive network observation. First International Conference on Availability, Reliability and Security (ARES), 2006, France. ⟨hal-00269297⟩
  • Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro. Misconfiguration Management of Network Security Components. 7th International Symposium on System and Information Security (SSI 2005), Nov 2005, Sao Paolo, Brazil. ⟨hal-03628705⟩
  • Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection and Removal of Firewall Misconfiguration. 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 ), Nov 2005, Phoenix, United States. ⟨hal-03628708⟩
  • Joaquin Garcia‐alfaro, S. Castillo, G. Navarro, J. Borrell. Mechanisms for attack protection on a prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.137-140, ⟨10.1109/CCST.2005.1594872⟩. ⟨hal-03628695⟩
  • Joaquin Garcia‐alfaro, J. Borrell, M.A. Jaeger, G. Muhl. An alert communication infrastructure for a decentralized attack prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.234-237, ⟨10.1109/CCST.2005.1594878⟩. ⟨hal-03628691⟩
  • G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro, S. Robles. Secure agent-based management for pervasive environments. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.133-136, ⟨10.1109/CCST.2005.1594864⟩. ⟨hal-03628681⟩
  • Frédéric Majorczyk, Eric Totel, Ludovic Mé. COTS diversity based intrusion detection and application to web servers. 8th international Symposium on the Recent Advances in Intrusion Detection, Sep 2005, Seattle, United States. 18 p. ⟨hal-00356396⟩
  • Frédéric Majorczyk, Eric Totel, Ludovic Mé. Détection d'intrusions par diversification de COTS. 4ème conférence "Security and Network Architectures" (SAR), Jun 2005, France. 12 p. ⟨hal-00354844⟩
  • Joaquin Garcia‐alfaro, F. Cuppens, F. Autrel, J. Castella-Roca, J. Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-03628680⟩
  • Joaquin Garcia Alfaro, Frédéric Cuppens, Fabien Autrel, Jordi Castella-Roca, Joan Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. ITCC 2005 : IEEE international conference on information technology , Apr 2005, Las Vegas, United States. pp.500 - 505, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-00540862⟩
  • J. Castella-Roca, G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro. Digital chips for an on-line casino. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, ⟨10.1109/ITCC.2005.130⟩. ⟨hal-03628687⟩
  • Joaquin Garcia Alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, et al.. Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. ICICS 2004: 6th International Conference on Informa- tion and Communications Security, Oct 2004, Malaga, Spain. pp.223 - 235, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-00540841⟩
  • Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p. ⟨hal-00356403⟩
  • Eric Totel, Bernard Vivinis, Ludovic Mé. A Language Driven Intrusion Detection System for Events and Alerts Correlation. 19th IFIP International Information Security Conference, Aug 2004, Toulouse, France. 16 p. ⟨hal-00356409⟩
  • Ahmed Bouabdallah, Maryline Laurent. Formal validation of an ATM security context negociation protocol. Proceedings of the International symposium on software and systems (I3S), Feb 2001, Constantine, Algeria. pp.25 - 33. ⟨hal-02341318⟩
  • Olivier Paul, Maryline Laurent, Sylvain Gombault. A full bandwidth ATM firewall. ESORICS'2000 : 6th european symposium on research in computer security, Toulouse, octobre, Oct 2000, Toulouse, France. pp.206 - 221. ⟨hal-02142128⟩
  • Olivier Paul, Maryline Laurent, Sylvain Gombault. An asynchronous distributed access control architecture for IP over ATM networks. ACSAC 1999 : 15th Annual Computer Security Applications Conference, Dec 1999, Phoenix, United States. ⟨10.1109/CSAC.1999.816015⟩. ⟨hal-01840923⟩
  • Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, et al.. Secure communications in ATM networks. ACSAC'99, proceedings of the 15th annual computer security applications conference, Dec 1999, Phoenix, United States. pp.84 - 93, ⟨10.1109/CSAC.1999.816016⟩. ⟨hal-02341313⟩

Ouvrages

  • Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas, Nicola Dragoni (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer International Publishing, 13619, 2023, Lecture Notes in Computer Science, 978-3-031-25734-6. ⟨10.1007/978-3-031-25734-6⟩. ⟨hal-04006291⟩
  • Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia‐alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
  • Joaquin Garcia‐alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2021 international workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, revised selected papers. Springer, 13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS), 978-3-030-93943-4. ⟨10.1007/978-3-030-93944-1⟩. ⟨hal-03628440⟩
  • Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part I. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
  • Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, José Francisco Ruiz, et al.. Cybersecurity research analysis report for Europe and Japan: cybersecurity and privacy dialogue between Europe and Japan. Springer, 75, pp.172, 2021, Studies in Big Data, 978-3-030-62311-1. ⟨10.1007/978-3-030-62312-8⟩. ⟨hal-03124036⟩
  • Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part II. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
  • Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
  • Nora Cuppens-Bouhlahia, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro (Dir.). Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers. Springer, 10694, pp.269, 2018, Lecture Notes in Computer Science, Lecture Notes in Computer Science (vol. 10694), 978-3-319-76686-7. ⟨hal-01865019⟩
  • Ali Miri, Xiaodai Dong, Masoud Ardakani, Joaquin Garcia-Alfaro (Dir.). 29th biennial symposium on communications : Toronto, Ontario, Canada, June 6-7, 2018. IEEE Computer Society, pp.128, 2018, Biennial Symposium on Communications proceedings, Biennial Symposium on Communications proceedings, 978-1-5386-5735-5. ⟨hal-02014409⟩
  • David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al. (Dir.). Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Springer, pp.818, 2018, Lecture Notes in Computer Science, Security and Cryptology, 11149, Lecture Notes in Computer Science, Security and Cryptology, 11149, 978-3-030-01949-5. ⟨hal-01987497⟩
  • Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios (Dir.). Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, proceedings. Springer, pp.442, 2018, Lecture Notes in Computer Science book series (LNCS, volume 11025), Lecture Notes in Computer Science book series (LNCS, volume 11025), 978-3-030-00304-3. ⟨hal-02014097⟩
  • Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc (Dir.). Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Springer, pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5. ⟨hal-01864973⟩
  • Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Bouhlahia, Nadia Tawbi, Joaquin Garcia-Alfaro (Dir.). Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Springer, 10128, pp.361, 2017, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-51965-4. ⟨hal-01449657⟩
  • Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent (Dir.). Security, and privacy in emerging wireless networks : security and communication networks journal. Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal. ⟨hal-01682207⟩
  • Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomarti (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Springer, 10436, pp.446, 2017, Lecture Notes in Computer Science, 978-3-319-67815-3. ⟨10.1007/978-3-319-67816-0⟩. ⟨hal-01740241⟩
  • Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro (Dir.). Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5. ⟨hal-01450264⟩
  • Didier El Baz, Julien Bourgeois, Bruno Defude, Zhangbing Zhou, Guangjie Han, et al. (Dir.). ATC 2016 : 13th Annual International Conference on Advanced and Trusted Computing. IEEE Computer Society, pp.1242, 2016, 978-1-5090-2770-5. ⟨hal-01449669⟩
  • Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Dir.). Data privacy management, and security assurance : 10th international workshop, DPM 2015, and 4th international workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers. Springer International Publishing, 9481, pp.291, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-29882-5. ⟨hal-01333425⟩
  • Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (Dir.). Foundations and practice of security : 8th international symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers. Springer International Publishing, 9482, pp.323, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-30302-4. ⟨hal-01333422⟩
  • Maryline Laurent, Samia Bouzefrane (Dir.). Digital Identity Management. Iste, 2015. ⟨hal-01126495⟩
  • Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, et al. (Dir.). Data privacy management, autonomous spontaneous security, and security assurance : 9th international workshop, DPM 2014, 7th international workshop, SETOP 2014, and 3rd international workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014 : revised selected papers. Springer international publishing, 8872, pp.343, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-17015-2. ⟨hal-01263419⟩
  • Frédéric Cuppens, Joaquin Garcia Alfaro, A. Nur Zincir Heywood, Philip W. L. Fong (Dir.). FPS 2014 : 7th International Symposium on Foundations and Practice of Security : revised selected papers. 8930, pp.375, 2015, LNCS (Lecture Notes in Computer Science), 978-3-319-17039-8. ⟨hal-01162133⟩
  • Herbert Bos, Fabian Monrose, Gregory Blanc (Dir.). Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings. Springer, 9404, pp.638, 2015, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-26361-8. ⟨hal-01453167⟩
  • Ali Ghorbani, Vicenç Torra, Huseyin Hisil, Ali Miri, Ahmet Koltuksuz, et al. (Dir.). 2015 Thirteenth annual conference on privacy, security and trust. IEEE, pp.200, 2015, 978-1-4673-7828-4. ⟨hal-01332268⟩
  • Maryline Laurent, Samia Bouzefrane. La gestion des identités numériques. ISTE. pp.340, 2014, à paraître. ⟨hal-01126448⟩
  • Maryline Laurent, Sara Foresti, Heng Xu (Dir.). Privacy-aware electronic society. Springer, 2014, Annals of Telecommunication, Volume 69, Issue 1-2, Annals of Telecommunication, Volume 69, Issue 1-2, 0003-4347. ⟨hal-01261315⟩
  • Joaquin Garcia-Alfaro, Gürkan Gür (Dir.). Proceedings 2014 : International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science, 165, pp.58, 2014. ⟨hal-01740931⟩
  • Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood (Dir.). Foundations and practice of security : 6th international symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, revised selected papers. Springer, 8352, pp.444, 2014, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-05302-8. ⟨hal-01264784⟩
  • Joaquin Garcia Alfaro, Georgios V. Lioudakis, Nora Cuppens-Bouhlahia, Simon N. Foley, William M. Fitzgerald (Dir.). Data Privacy Management and Autonomous Spontaneous Security : DPM 2013 : 8th International Workshop, SETOP 2013 : 6th International Workshop, Ehgam, UK, September 12-13, 2013 - Revised Selected Papers. Springer, 8247, pp.400, 2014, LNCS - Lecture Notes in Computer Science, 978-3-642-54567-2. ⟨hal-01174201⟩
  • Ali Miri, Urs Hengartner, Huang Nen-Fu, Audun Josang, Joaquin Garcia-Alfaro (Dir.). 2014 Twelfth annual conference on privacy, security and trust. IEEE, pp.426, 2014, 978-1-4799-3503-1. ⟨hal-01264786⟩
  • Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri, Nadia Tawbi (Dir.). Foundations and practice of security. Springer, 2013, 978-3-642-37118-9. ⟨hal-00846997⟩
  • Joaquin Garcia Alfaro, Frédéric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri, Nadia Tawbi (Dir.). FPS 2012 : 5th International Symposium on Foundations and Practice of Security. Springer, 7743, pp.381, 2013, LNCS (Lecture Notes in Computer Science), 978-3-642-37118-9. ⟨hal-01162190⟩
  • Jordi Castella-Roca, Josep Domingo-Ferrer, Joaquin Garcia-Alfaro, Ali Ghorbani, Christian Damsgaard Jensen, et al. (Dir.). 2013 Eleventh annual conference on privacy, security and trust. IEEE, pp.390, 2013, 978-1-4673-5839-2. ⟨hal-01264789⟩
  • Joaquin Garcia Alfaro, Pascal Lafourcade (Dir.). Foundations and practice of security : 4th Canada-France MITACS workshop, FPS 2011, (Paris, May 12-13 2011). Springer Science, Business Media, 6888, pp.253, 2012, Lecture Notes in Computer Science, 978-3-642-27901-0. ⟨hal-00724727⟩
  • Joaquin Garcia Alfaro, Guillermo Navarro, Nora Cuppens-Boulahia, Sabrina de Capitani Di Vimercati (Dir.). Data Privacy Management and Autonomous Spontaneus Security : DPM 2011 : 6th International Workshop and SETOP 2011 : 4th International Workshop, Leuven, September 15-16, Revised Selected Papers. Springer, 7122, pp.319, 2012, LNCS - Lecture Notes in Computer Science, LNCS - Lecture Notes in Computer Science, 978-3-642-28878-4. ⟨hal-01164894⟩
  • Nora Cuppens-Bouhlahia, Frédéric Cuppens, Joaquin Garcia Alfaro. Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings. Springer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩. ⟨hal-01164720⟩
  • Nora Cuppens-Bouhlahia, Philip Fong, Joaquin Garcia Alfaro, Stephen Marsh, Jan-Philipp Steghöfer (Dir.). PST 2012 : tenth Annual International Conference on Privacy, Security and Trust Privacy, Security and Trust, Paris, July 16-18. IEEE, pp.262, 2012, 978-1-4673-2323-9. ⟨hal-01164792⟩
  • Joaquin Garcia Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Bouhlahia, Yves Roudier (Dir.). Data Privacy Management and Autonomous Spontaneous Security : DPM 2009 : 4th International Workshop and SETOP 2009 : second International Workshop, St. Malo, France, September 24-25, 2009 - Revised Selected Papers. Springer, 5939, pp.265, 2010, LNCS (Lecture Notes in Computer Science), 978-3-642-11206-5. ⟨hal-01164774⟩
  • Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. ⟨hal-01370514⟩
  • Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. ⟨hal-01370512⟩
  • Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
  • Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01329422⟩
  • Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, Série Réseaux et Télécoms IC2, Série Réseaux et Télécoms 978-2-7462-1697-6. ⟨hal-01328159⟩
  • Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 2, Technologies du marché. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1698-3. ⟨hal-01328157⟩

Chapitres d'ouvrage

  • Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Methodological resilience assessment of smart cyber infrastructures. Security and Privacy in Smart Environments, 2024. ⟨hal-04656303⟩
  • Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
  • Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. Emerging Trends in Cybersecurity Applications, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. ⟨10.1007/978-3-031-09640-2_16⟩. ⟨hal-03958379⟩
  • Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. ⟨hal-04331489⟩
  • Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩. ⟨hal-02393547⟩
  • Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
  • Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
  • Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : l’impact des labels sur la gestion des données personnelles. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
  • Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
  • Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-Télécom, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
  • Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
  • Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Les identités numériques. La gestion des identités numériques, ISTE Edition, pp.19 - 90, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263060⟩
  • Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
  • Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
  • Maryline Laurent, Claire Levallois-Barth. Gestion de la vie privée et protection des données à caractère personnel. La gestion des identités numériques, ISTE Edition, pp.179 - 236, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263062⟩
  • Christophe Kiennert, Samia Bouzefrane, P. Thoniel. Systèmes d?authentification. ISTE. La gestion des identités numériques, pp.340, 2014, à paraître. ⟨hal-01126446⟩
  • Christophe Kiennert, Samia Bouzefrane, Amira Benkara Mostefa. L?identité numérique dans le Cloud Computing. ISTE. La gestion des identités numériques, pp.340, 2014, à paraître. ⟨hal-01126447⟩
  • Aymen Boudguiga, Maryline Laurent, Mohamed Hamdi. Fundamentals of identity-based cryptography. Practical cryptography : algorithms and implementations using C++, CRC Press, pp.225 - 250, 2014, 978-1-4822-2889-2. ⟨10.1201/b17707-13⟩. ⟨hal-01255480⟩
  • Aymen Boudguiga, Maryline Laurent. Authentication in wireless mesh networks. Security for multihop wireless networks , CRC Press, pp.419 - 446, 2014, 978-1-466-57803-6. ⟨10.1201/b16754-20⟩. ⟨hal-01260916⟩
  • Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Security and privacy concerns about the RFID layer of EPC Gen2 networks. Advanced research in data privacy, 567, Springer international publishing, pp.303 - 324, 2014, Studies in Computational Intelligence 978-3-319-09884-5. ⟨10.1007/978-3-319-09885-2_17⟩. ⟨hal-01264797⟩
  • Emmanuel Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Maryline Laurent. Analyzing Internet DNS(SEC) traffic with R for resolving platform optimization. Data Mining Applications with R, Elsevier; Academic Press, pp.435 - 456, 2014, 978-0-12-411511-8. ⟨10.1016/B978-0-12-411511-8.00016-5⟩. ⟨hal-01263426⟩
  • Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Security issues in link state routing protocols for MANETs. Advances in network analysis and its applications network security and cryptography, Springer, pp.117-148, 2013, Mathematics in Industry, 978-3-642-30903-8. ⟨10.1007/978-3-642-30904-5_6⟩. ⟨hal-00949321⟩
  • Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Handling security threats to the RFID system of EPC networks. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, Taylor & Francis Group, pp.45-64, 2010. ⟨hal-00623632⟩
  • Houssem Jarraya, Maryline Laurent. Sécurité des réseaux P2P. Evolution des technologies pair-à-pair : optimisation, sécurité et application, Hermès science; Lavoisier, pp.135 - 154, 2010, IC2 : Traité réseaux et télécoms, 978-2-7462-2579-4. ⟨hal-01355245⟩
  • Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
  • Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
  • Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
  • José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
  • Maryline Laurent, Hakima Chaouchi, Olivier Paul. Mécanismes de sécurité fondamentaux. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1697-6. ⟨hal-01328102⟩
  • Chakib Bekara, Maryline Laurent. Gestion de clés dans les réseaux de capteurs. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328150⟩
  • José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Sécurité dans les réseaux de capteurs sans fil. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328149⟩
  • Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux mobiles IP. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328154⟩
  • Joaquin Garcia‐alfaro, F. Cuppens, N. Cuppens-Boulahia. Management of Exceptions on Access Control Policies. New Approaches for Security, Privacy and Trust in Complex Environments, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, ⟨10.1007/978-0-387-72367-9_9⟩. ⟨hal-03628745⟩
  • Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. Protection of Components Based on a Smart-Card Enhanced Security Module. Critical Information Infrastructures Security, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, ⟨10.1007/11962977_11⟩. ⟨hal-03628730⟩
  • Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security Components. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, ⟨10.1007/11915034_65⟩. ⟨hal-03628734⟩
  • Joaquin Garcia‐alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Computer Safety, Reliability, and Security, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, ⟨10.1007/11875567_14⟩. ⟨hal-03628725⟩
  • G. Navarro, J. Peñalver, J.A. Ortega-Ruiz, J. Ametller, Joaquin Garcia‐alfaro, et al.. Amapola: a simple infrastructure for ubiquitous computing. Roch Glitho; Ahmed Karmouch; Samuel Pierre. Intelligence in Communication Systems, 190, Springer-Verlag, pp.77-86, 2005, IFIP — The International Federation for Information Processing book series (IFIPAICT), ⟨10.1007/0-387-32015-6_8⟩. ⟨hal-03628697⟩
  • Joaquin Garcia‐alfaro, Michael Jaeger, Gero Mühl, Joan Borrell. Decoupling Components of an Attack Prevention System Using Publish/Subscribe. Intelligence in Communication Systems, Springer-Verlag, pp.87-97, 2005, ⟨10.1007/0-387-32015-6_9⟩. ⟨hal-03628700⟩
  • Joaquin Garcia‐alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, et al.. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. Information and Communications Security, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-03628684⟩
  • Olivier Paul, Maryline Laurent, Sylvain Gombault. A Full Bandwidth ATM Firewall. Computer Security - ESORICS 2000, 1895, Springer Berlin Heidelberg, pp.206-221, 2000, Lecture Notes in Computer Science, ⟨10.1007/10722599_13⟩. ⟨hal-03643184⟩
  • Olivier Paul, Maryline Laurent. Improving Packet Filters Management through Automatic and Dynamic Schemes. Information Security for Global Information Infrastructures, 47, Springer US, pp.331-340, 2000, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-0-387-35515-3_34⟩. ⟨hal-03643182⟩
  • Olivier Paul, Maryline Laurent. An Alternative Access Control Architecture for IP Over ATM Networks. Secure Information Networks, Springer US, pp.36-50, 1999, ⟨10.1007/978-0-387-35568-9_3⟩. ⟨hal-03643187⟩