CSDAI

Department of Institut Polytechnique de Paris

SCN (Security and digital trust)

SCN

Samovar, Telecom SudParis

Themes: Trust, safety and cybersecurity

The SCN (Sécurité et Confiance Numérique) team conducts research and teaching on cybersecurity topics, including protection, defense and resilience, from software to hardware, as well as networks, data and privacy.

Application domains: The team members have nationally and internationally recognized experience in cybersecurity and privacy, particularly on network protection, distributed systems, communicating objects and peer-to-peer applications, as well as on the use of AI for cyberdefense (such as intrusion detection and attack remediation), specification of security policies, and resilience of cyber-physical systems (e.g., industry 4.0 and digital health).

Contact person: Joaquin Garcia-Alfaro

web site: https://scn.telecom-sudparis.eu/

Journal articles

2024

ref_biblio
Nathanaël Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des télécommunications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04383612/file/article.pdf BibTex
ref_biblio
Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
Accès au bibtex
BibTex
ref_biblio
Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and resilient 6 G RAN networks: a decentralized approach with zero trust architecture. Journal of Network and Systems Management, 2024, 32 (33), ⟨10.1007/s10922-024-09807-x⟩. ⟨hal-04610740⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04610740/file/ZeroTrust___6G-3.pdf BibTex
ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. A survey on cyber-resilience approaches for cyber-physical systems. ACM Computing Surveys, 2024, 56 (8), pp.1-37. ⟨10.1145/3652953⟩. ⟨hal-04562096⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04562096/file/COSUR.pdf BibTex

2023

ref_biblio
Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04121481/file/articleIEEE_hal.pdf BibTex
ref_biblio
Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04080819/file/sensors-23-04224.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. IEEE Internet of Things Magazine, 2023, 6 (1), pp.46-50. ⟨10.1109/IOTM.001.2200244⟩. ⟨hal-04401093⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401093/file/Non_Fungible_Tokens_A_review.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. Computer, 2023, 56 (7), pp.54-66. ⟨10.1109/MC.2023.3273491⟩. ⟨hal-04400976⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400976/file/main.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys, 2023, 55 (14s), pp.1-40. ⟨10.1145/3588999⟩. ⟨hal-04401069⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401069/file/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf BibTex
ref_biblio
David Pàmies-Estrems, Joaquin Garcia‐alfaro. On the self-adjustment of privacy safeguards for query log streams. Computers & Security, 2023, 134, pp.103450. ⟨10.1016/j.cose.2023.103450⟩. ⟨hal-04189131⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04189131/file/COSE.pdf BibTex
ref_biblio
Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari. Secure attack detection framework for hierarchical 6G-enabled internet of vehicles. IEEE Transactions on Vehicular Technology, 2023, 73 (2), pp.1-11. ⟨10.1109/TVT.2023.3317940⟩. ⟨hal-04227768⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227768/file/_Extension_ICC_2022__FL___SIEM.pdf BibTex
ref_biblio
Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
Accès au bibtex
BibTex
ref_biblio
Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization’s data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04331375/file/TCC-2004.10952.pdf BibTex
ref_biblio
Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04100562/file/SSI-Hindawi-SCN-Auteur2023.pdf BibTex
ref_biblio
Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos. SigML++: supervised log anomaly with probabilistic polynomial approximation. Cryptography, 2023, 7 (4), pp.52. ⟨10.3390/cryptography7040052⟩. ⟨hal-04304189⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04304189/file/MDPI_Article_Template.pdf BibTex

2022

ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro. Cyber-physical defense in the quantum Era. Scientific Reports, 2022, 12, pp.1905. ⟨10.1038/s41598-022-05690-1⟩. ⟨hal-03628438⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628438/file/era.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh. Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on emerging telecommunications technologies, 2022, 33 (3), pp.1-20. ⟨10.1002/ett.3667⟩. ⟨hal-03990998⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990998/file/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__FinalVersion-3-22.pdf BibTex
ref_biblio
Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.727-729. ⟨10.1007/s12243-022-00935-6⟩. ⟨hal-04164335⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164335/file/s12243-022-00935-6.pdf BibTex
ref_biblio
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, et al.. Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.789-812. ⟨10.1007/s12243-022-00926-7⟩. ⟨hal-03965590⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03965590/file/s12243-022-00926-7.pdf BibTex
ref_biblio
Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03787447/file/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf BibTex
ref_biblio
Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227764/file/SPOT_IEEEAccess.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03793163/file/JNCA2022_PIMA.pdf BibTex
ref_biblio
Mariana Segovia, Joaquin Garcia‐alfaro. Design, modeling and implementation of digital twins. Sensors, 2022, 22 (14), pp.5396-5426. ⟨10.3390/s22145396⟩. ⟨hal-03843008⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843008/file/sensors-22-05396-preprint.pdf BibTex
ref_biblio
Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991044/file/Final_version.pdf BibTex

2021

ref_biblio
Mikaël Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. Security and communication networks, 2021, 2021, pp.1 - 19. ⟨10.1155/2021/5512075⟩. ⟨hal-03991134⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991134/file/5512075.pdf BibTex
ref_biblio
Michel Barbeau, Erwan Beurier, Joaquin Garcia‐alfaro, Randy Kuang, Marc-Oliver Pahl, et al.. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?. Digitale Welt, 2021, 5 (1), pp.34-39. ⟨10.1007/s42354-021-0402-0⟩. ⟨hal-03628446v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628446/file/preprint.pdf BibTex
ref_biblio
Michel Barbeau, Frederic Cuppens, Nora Cuppens, Romain Dagnas, Joaquin Garcia‐alfaro. Resilience estimation of Cyber-Physical Systems via quantitative metrics. IEEE Access, 2021, 9, pp.46462-46475. ⟨10.1109/ACCESS.2021.3066108⟩. ⟨hal-03626725⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03626725/file/Resilience_Estimation.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Fillipe Santos. GPS-free, error tolerant path planning for swarms of micro aerial vehicles with quality amplification ‡. Sensors, 2021, 21 (14), pp.4731:1-4731:16. ⟨10.3390/s21144731⟩. ⟨hal-03628455⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628455/file/pre-print-sensors2021.pdf BibTex
ref_biblio
Edgar Galván, Joaquin Garcia‐alfaro, Vicenç Torra, Guillermo Navarro-Arribas. Agents in a privacy-preserving world. Transactions on Data Privacy, 2021, 14 (1), pp.53-63. ⟨hal-04337700⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04337700/file/preprint.pdf BibTex
ref_biblio
Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
Accès au bibtex
BibTex
ref_biblio
Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, et al.. Framework, tools and good practices for cybersecurity curricula. IEEE Access, 2021, 9, pp.94723-94747. ⟨10.1109/ACCESS.2021.3093952⟩. ⟨hal-03997196⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997196/file/Framework_Tools_and_Good_Practices_for_Cybersecurity_Curricula.pdf BibTex

2020

ref_biblio
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi. PROUD: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 2020, 111, pp.899-918. ⟨10.1016/j.future.2019.11.012⟩. ⟨hal-03990965⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990965/file/_IEEE_TCC_FGCS_SI_Securely_Outsourcing_Constant_size_Threshold_Attribute_Based_SignCryption_for_Cloud_Assisted_IoT_Applications.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990990/file/InsPABAC%2520%25288%2529.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Giovanni Russello. CUPS: secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update. Security and Privacy , 2020, 3 (4), pp.1-24. ⟨10.1002/spy2.85⟩. ⟨hal-03991066⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991066/file/CUPS.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990971/file/_JNCA____Survey_PETS.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991089/file/fbloc-03-00017.pdf BibTex
ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia‐alfaro. Switched-based resilient control of cyber-physical systems. IEEE Access, 2020, 8 (3), pp.212194 - 212208. ⟨10.1109/ACCESS.2020.3039879⟩. ⟨hal-03113904⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03113904/file/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf BibTex
ref_biblio
Jean-Paul Yaacoub, Ola Salman, Hassan N Noura, Nesrine Kaaniche, Ali Chehab, et al.. Cyber-physical systems security: limitations, issues and future trends. Microprocessors and Microsystems: Embedded Hardware Design , 2020, 77, pp.103201. ⟨10.1016/j.micpro.2020.103201⟩. ⟨hal-03990927⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990927/file/1-s2.0-S0141933120303689-main.pdf BibTex

2019

ref_biblio
Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia‐alfaro, Jamil Kassem, Evangelos Kranakis. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications. Transactions on emerging telecommunications technologies, 2019, 30 (12), ⟨10.1002/ett.3712⟩. ⟨hal-02390285⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 14, pp.14979-14993. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-03991234⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991234/file/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf BibTex

Conference papers

2025

ref_biblio
Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. Towards privacy-preserving and fairness-aware federated learning framework. Privacy Enhancing Technologies (PETs), Jul 2025, Washinghton, DC, United States. pp.845-865, ⟨10.56553/popets-2025-0044⟩. ⟨hal-04782394⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04782394/file/popets-2025-0044.pdf BibTex
ref_biblio
Alessandro Palma, Nikolaos Papadakis, Georgios Bouloukakis, Joaquin Garcia-Alfaro, Mattia Sospetti, et al.. SHIELD : assessing security-by-design in federated data spaces using attack graphs. The 40th ACM/SIGAPP Symposium On Applied Computing ( SAC), Mar 2025, Catania, Italy. ⟨10.1145/3672608.3707797⟩. ⟨hal-04832442v2⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-04832442/file/SAC25_SHIELD.pdf BibTex

2024

ref_biblio
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Optimal UAV-trajectory design in a dynamic environment using NOMA and deep reinforcement learning. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.277-282, ⟨10.1109/CCECE59415.2024.10667252⟩. ⟨hal-04762084⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762084/file/1571000942-final.pdf BibTex
ref_biblio
Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: a model for accurate predictions with inherent fairness evaluation. 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI), Oct 2024, Santiago de Compostela, SPAIN, Spain. ⟨10.3233/FAIA240592⟩. ⟨hal-04745438⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04745438/file/FairCognizer__ECAI_2024_-2.pdf BibTex
ref_biblio
Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. The 19th International Conference on Availability, Reliability and Security (ARES), Jul 2024, Vienna, Austria. pp.1-13, ⟨10.1145/3664476.3664500⟩. ⟨hal-04669287⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04669287/file/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf BibTex
ref_biblio
Romain Dagnas, Michel Barbeau, Joaquin Garcia‐alfaro, Reda Yaich. Resilience assessment of multi-layered cyber-physical systems. IFIP Networking 2024 - IOCRCI, Jun 2024, Thessaloniki, Greece. ⟨hal-04559568v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04559568/file/Resilience_Assessment_of_Multi_Layered_Cyber_Physical_Systems___VF.pdf BibTex
ref_biblio
Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. 2024 IEEE 14th annual computing and communication workshop and conference (CCWC), Jan 2024, Las vegas, NV (US), United States. ⟨10.1109/CCWC60891.2024.10427731⟩. ⟨hal-04402381⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04402381/file/Version%20Auteur%20IEEE%20CCWC%202024.pdf BibTex
ref_biblio
Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in copyright management applications : the blockchain perspective. Barolli, L. (eds) Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.169-182, ⟨10.1007/978-3-031-57942-4_18⟩. ⟨hal-04690838⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04690838/file/main.pdf BibTex
ref_biblio
Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739413/file/main.pdf BibTex
ref_biblio
Badis Hammi, Tristan Billot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.314-325, ⟨10.1007/978-3-031-57916-5_27⟩. ⟨hal-04580467⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04580467/file/hammi.24.aina.pdf BibTex
ref_biblio
Seyni Kane, Anis Bkakria. A privacy-preserving graph encryption scheme based on oblivious RAM. 38th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Jul 2024, San Jose, United States. pp.101-108, ⟨10.1007/978-3-031-65172-4_7⟩. ⟨hal-04588553⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04588553/file/Privacy_Preserving_GES____DBSEC%20%284%29.pdf BibTex
ref_biblio
Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Venkata Srinivas Kothapalli. Location optimization for tethered aerial base station serving mmWave high altitude UAVs. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.271-276, ⟨10.1109/CCECE59415.2024.10667117⟩. ⟨hal-04762101⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762101/file/1571012068-final.pdf BibTex
ref_biblio
Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. TBS joint optimization to serve mmWave high altitude UAVs: a counterfactual MAB approach. 13th International Conference on Communications, Circuits and Systems (ICCCAS), May 2024, Xiamen, France. pp.424-429, ⟨10.1109/ICCCAS62034.2024.10652678⟩. ⟨hal-04762130⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762130/file/ICCCAS.pdf BibTex
ref_biblio
Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024), Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. ⟨hal-04739382⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739382/file/Main.pdf BibTex
ref_biblio
Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel. DDoS mitigation while preserving QoS: a deep reinforcement learning-based approach. 2024 IEEE : 10th International Conference on Network Softwarization (NetSoft), Jun 2024, Saint Louis, MO, United States. pp.369-374, ⟨10.1109/NetSoft60951.2024.10588889⟩. ⟨hal-04659906⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04659906/file/1571016591%20paper-2.pdf BibTex
ref_biblio
Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphael Troncy. X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), ACM, Jul 2024, Singapore, Singapore. pp.35-48, ⟨10.1145/3634737.3637654⟩. ⟨hal-04446027⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04446027/file/publi-7588.pdf BibTex
ref_biblio
Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. XAI-driven adversarial attacks on network intrusion detectors. European Interdisciplinary Cybersecurity Conference (EICC), Jun 2024, Xanthi, Greece. pp.65-73, ⟨10.1145/3655693.3655714⟩. ⟨hal-04660625⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04660625/file/eicc2024-18.pdf BibTex
ref_biblio
Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645794/file/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf BibTex
ref_biblio
Hugo Teixeira de Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, et al.. A model-based approach for assessing the security of cyber-physical systems. The 19th International Conference on Availability, Reliability and Security (ARES) (2024), Jul 2024, Vienne, Austria. pp.1-10, ⟨10.1145/3664476.3670470⟩. ⟨hal-04669279⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04669279/file/A_Model-based_Approach_for_Assessing_the_Security_of_Cyber-Physical_Systems.pdf BibTex
ref_biblio
Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩. ⟨hal-04695972⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04695972/file/MealyVerifier.pdf BibTex
ref_biblio
Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID/session token abuse on openID connect. 21st International Conference on Security and Cryptography (SECRYPT 2024), Jul 2024, Dijon, France. pp.674-679, ⟨10.5220/0012757900003767⟩. ⟨hal-04719043⟩
Accès au bibtex
BibTex

2023

ref_biblio
Marwan Abbas-Escribano, Hervé Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400399/file/3600160.3604993.pdf BibTex
ref_biblio
Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. 18th International Conference on Risks and Security of Internet and Systems ( CRiSIS), Dec 2023, Rabat (MOROCCO), Morocco. pp.185-199, ⟨10.1007/978-3-031-61231-2_12⟩. ⟨hal-04609669⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04609669/file/crisis-2023--content.pdf BibTex
ref_biblio
Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier, Olivier Levillain, et al.. Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3. ⟨hal-04165396⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165396/file/paper.pdf BibTex
ref_biblio
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, ⟨10.1145/3576915.3624027⟩. ⟨hal-04325353⟩
Accès au bibtex
BibTex
ref_biblio
Iain Burge, Michel Barbeau, Joaquin Garcia‐alfaro. Quantum algorithms for shapley value calculation. 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep 2023, Bellevue, United States. pp.1-9, ⟨10.1109/QCE57702.2023.00024⟩. ⟨hal-04386997⟩
Accès au bibtex
BibTex
ref_biblio
Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), LIFO, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164470⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164470/file/Survey_on_intrusion_detection_systems_in_5G_.pdf BibTex
ref_biblio
Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. 2023 IFIP Networking Conference (IFIP Networking), Jun 2023, Barcelone, Spain. ⟨10.23919/IFIPNetworking57963.2023.10186355⟩. ⟨hal-04083180⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04083180/file/Exploring_the_Quantitative_Resilience_Analysis_of_Cyber_Physical_Systems.pdf BibTex
ref_biblio
Mario Fernández-Tárraga, Alejandro David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. VIII National Conference on Cybersecurity Research (JNIC), Universidad de la Rioja, Jun 2023, Vigo, España. pp.469--476. ⟨hal-04198177⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04198177/file/preprint_jnic-B.pdf BibTex
ref_biblio
Joaquin Garcia‐alfaro, Sandrine Bayle. Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS). Colloque IMT 2023 : « Sécurité et Résilience », Apr 2023, Palaiseau, France. ⟨hal-04098069⟩
Accès au bibtex
BibTex
ref_biblio
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Towards understanding alerts raised by unsupervised network intrusion detection systems. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ), Oct 2023, Hong Kong China, France. pp.135-150, ⟨10.1145/3607199.3607247⟩. ⟨hal-04172470⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04172470/file/2023-Lanvin_et_al-Towards_Understanding_Alerts_raised_by_Unsupervised_Network_Intrusion_Detection_Systems-preprint.pdf BibTex
ref_biblio
Pablo Martínez-Sanchez, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. 2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444. ⟨hal-04198175⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04198175/file/preprint_jnic-A.pdf BibTex
ref_biblio
Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Automated enrichment of logical attack graphs via formal ontologies. ICT Systems Security and Privacy Protection (SEC), Jun 2023, Poznan, Poland. pp.59-72, ⟨10.1007/978-3-031-56326-3_5⟩. ⟨hal-04563448⟩
Accès au bibtex
https://arxiv.org/pdf/2202.04016 BibTex

2022

ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04055085/file/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf BibTex
ref_biblio
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA. 2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩. ⟨hal-04006345⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04006345/file/preprint-latincom.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Christian Lübben, Marc-Oliver Pahl, Wüstrich Lars. Resilience via blackbox self-piloting plants. ECW 2022: European Cyber Week, Pôle d’Excellence Cyber, Nov 2022, Rennes, France. pp.35-46. ⟨hal-04006320⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04006320/file/preprint-cessar2022.pdf BibTex
ref_biblio
Alexandre Dey, Eric Totel, Benjamin Costé. DAEMON: dynamic auto-encoders for contextualised anomaly detection applied to security monitoring. 37th IFIP TC 11 International Conference, SEC 2022,, Jun 2022, Copenhagen, Denmark. ⟨10.1007/978-3-031-06975-8_4⟩. ⟨hal-04181626⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04181626/file/main.pdf BibTex
ref_biblio
Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez-Granadillo. Efficient hybrid model for intrusion detection systems. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.694-700, ⟨10.5220/0011328300003283⟩. ⟨hal-04137867⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04137867/file/Secrypt2022.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997364/file/2022-SECRYPT_SEVIL-Masmoudi.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227767/file/Springer_SPOT_.pdf BibTex
ref_biblio
Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R Cavalli. Digital twin for IoT environments : a testing and simulation tool. 15th International Conference on the Quality of Information and Communications Technology(QUATIC) ·, University of Castilla-La Mancha, Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04039592⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04039592/file/QUATIC_2022%20%283%29.pdf BibTex
ref_biblio
Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar. Towards a systematic and automatic use of state machine inference to uncover security flaws and fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997060/file/document.pdf BibTex
ref_biblio
Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. IEEE International Conference on Communications(ICC ), May 2022, Seoul, South Korea. pp.5238-5243, ⟨10.1109/ICC45855.2022.9838338⟩. ⟨hal-04069291⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04069291/file/ICC_New%20version.pdf BibTex
ref_biblio
Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. Switched-based control testbed to assure cyber-physical resilience by design. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩. ⟨hal-03843016⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843016/file/secrypt2022a-preprint.pdf BibTex
ref_biblio
S. Seng, Joaquin Garcia‐alfaro, Y. Laarouci. Implementation of a stateful network protocol intrusion detection systems. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩. ⟨hal-03843013⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843013/file/secrypt2022b-preprint.pdf BibTex

2021

ref_biblio
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Tao Wan. Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks. MEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking, Sep 2021, Athens, Greece. pp.479-484, ⟨10.1109/MeditCom49071.2021.9647674⟩. ⟨hal-03628454⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628454/file/pre-print-meditcom2021.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Risky zone avoidance strategies for drones. CCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering, Sep 2021, Online, France. pp.1-6, ⟨10.1109/CCECE53047.2021.9569172⟩. ⟨hal-03628452⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628452/file/preprint-ccece2021.pdf BibTex
ref_biblio
Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and performance to the internet of things through usage control and blockchains. 16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2021, Virtual, Luxembourg. pp.57-72, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03754051/file/article.pdf BibTex
ref_biblio
Olivier Levillain, Sébastien Naud, Aina Toky Rasoamanana. Work-in-Progress: towards a platform to compare binary parser generators. IEEE Security and Privacy Workshops, SPW (LangSec), May 2021, San Jose, United States. ⟨hal-04001619⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04001619/file/document.pdf BibTex
ref_biblio
Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. The 14th International Symposium on Foundations and Practice of Security ( FPS), Dec 2021, Paris, France. pp.208-217, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03997389⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997389/file/2022-FPS-IAM-SSI-Nghmouchi.pdf BibTex
ref_biblio
Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
Accès au bibtex
https://arxiv.org/pdf/2109.11340 BibTex
ref_biblio
Mustafizur R. Shahid, Hervé Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨10.1109/ICMLA52953.2021.00256⟩. ⟨hal-03430826⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03430826/file/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf BibTex

2020

ref_biblio
Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02910407/file/paper.pdf BibTex
ref_biblio
Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991100/file/_SAC2020_DADS_Priv_Preserv_Search.pdf BibTex
ref_biblio
Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991163/file/SECRYPT2020_ProvSGX.pdf BibTex
ref_biblio
Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991153/file/id_matching.pdf BibTex
ref_biblio
Neetu Sharma, Rajeev Anand-Sahu, Vishal Saraswat, Joaquin Garcia‐alfaro. Anonymous proof-of-asset transactions using designated blind signatures. FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩. ⟨hal-03125748⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03125748/file/2009.13978.pdf BibTex

2019

ref_biblio
Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2019, Tangier, Morocco. pp.1582-1587, ⟨10.1109/IWCMC.2019.8766478⟩. ⟨hal-04331571⟩
Accès au bibtex
BibTex
ref_biblio
Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche. Authledger: a novel Blockchain-based domain name authentication scheme. 5th International Conference on Information Systems Security and Privacy(ICISSP), Feb 2019, Prague, Czech Republic. pp.345-352, ⟨10.5220/0007366803450352⟩. ⟨hal-03991038⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991038/file/AuthLedger__A_Novel_Blockchain_based_Domain_Name_Authentication_Scheme_Original.pdf BibTex
ref_biblio
Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03754082/file/RESSI-final.pdf BibTex

2018

ref_biblio
Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello. Coop-DAAB: cooperative attribute based data aggregation for internet of things applications. On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018,, Oct 2018, Valetta,, Malta. pp.498-515, ⟨10.1007/978-3-030-02610-3_28⟩. ⟨hal-03991056⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991056/file/Coop_DAAB__Cooperative_Attribute_Based_Data_Aggregation_for_Internet_of_Things_Applications.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Giovanni Russello. Lightweight attribute-based encryption supporting access policy update for cloud assited IoT. Secrypt 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.135-146, ⟨10.5220/0006854603010312⟩. ⟨hal-03991119⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991119/file/_SECRYPT_2018_PU_ABE__Lightweight_Attribute_Based_Encryption_Supporting_Access_Policy_Update_for_Cloud_Assitsed_IoT.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03754087/file/2018-ieeecloud-bdua-blockchain.pdf BibTex
ref_biblio
Nesrine Kaaniche, Jung Eunjin, Ashish Gehani. Efficiently validating aggregated IoT data integrity. 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Mar 2018, Bamberg, Germany. pp.17897073, ⟨10.1109/BigDataService.2018.00046⟩. ⟨hal-03991079⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991079/file/BDS-2018.Homomorphic.pdf BibTex
ref_biblio
Nesrine Kaaniche, Sana Belguith, Giovanni Russello. EMA-LAB: efficient multi authorisation level attribute based access control. International Conference on Network and System Security (NSS), Aug 2018, Hong Kong, China. pp.187-201, ⟨10.1007/978-3-030-02744-5_14⟩. ⟨hal-03991168⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991168/file/ema-lab-efficient2.pdf BibTex
ref_biblio
Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03754091/file/2018-ieeecloud-aggregatecp-abe.pdf BibTex
ref_biblio
Mostafa Rizk, Tarek Naser Al-Deen, Hassan Diab, Abdel-Mehsen Ahmad, Zouhair El-Bazzal. Proposition of online UAV-based pollutant detector and tracker for narrow-basin rivers: a case study on Litani River. ICCA 2018: 3rd International Conference on Computer and Applications, Aug 2018, Beirut, Lebanon. pp.189-195, ⟨10.1109/COMAPP.2018.8460374⟩. ⟨hal-03472152⟩
Accès au bibtex
BibTex

2017

ref_biblio
Gustavo Gonzalez-Granadillo, José Rubio-Hernán, Joaquin Garcia‐alfaro. Towards a security event data taxonomy. International Conference on Risks and Security of Internet and Systems (CRISIS), Sep 2017, Dinard, France. pp.29-45, ⟨10.1007/978-3-319-76687-4_3⟩. ⟨hal-04308618⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01649980/file/3071064.3071068.pdf BibTex

2016

ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. Proc. 2e atelier sur la Sécurité dans les Clouds, Feb 2016, paris, France. ⟨hal-03991200⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991200/file/kaaniche-paper.pdf BibTex

2015

ref_biblio
Florian Maury, Jean-Rene Reinhard, Olivier Levillain, Henri Gilbert. Format Oracles on OpenPGP. The Cryptographer's Track at the RSA (CT-RSA), Apr 2015, San Francisco, United States. pp.220-236, ⟨10.1007/978-3-319-16715-2_12⟩. ⟨hal-01154822⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01154822/file/document.pdf BibTex

Book sections

2024

ref_biblio
Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Methodological resilience assessment of smart cyber infrastructures. Security and Privacy in Smart Environments. Lecture Notes in Computer Science, 2024, 978-3-031-66707-7. ⟨hal-04656303⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04656303/file/Springer_Book_Chapter__Methodological_Assessment_of_Cyber_Resilience__ISX_.pdf BibTex

2022

ref_biblio
Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
Accès au bibtex
BibTex
ref_biblio
Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. Emerging Trends in Cybersecurity Applications, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. ⟨10.1007/978-3-031-09640-2_16⟩. ⟨hal-03958379⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03958379/file/preprint-bcs2022.pdf BibTex

2021

ref_biblio
Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. ⟨hal-04331489⟩
Accès au bibtex
BibTex

Other publications

2024

ref_biblio
Eva Poptcheva, Bram Vanderborght, Miguel Colom, Rūta Binkytė, Oana Balalau, et al.. Alvolution - al and digital technologies in the European Union. 2024. ⟨hal-04645463⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645463/file/AIvolution%20Conclusions%20%284%29.pdf BibTex

2023

ref_biblio
Matthews Jose, Rémi Badonnel, Thibault Cholez, Hervé Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 2023. ⟨hal-04165397⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165397/file/REWIRE_RESSI_application.pdf BibTex

Books

2023

ref_biblio
Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas, Nicola Dragoni (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer International Publishing, 13619, 2023, Lecture Notes in Computer Science, 978-3-031-25734-6. ⟨10.1007/978-3-031-25734-6⟩. ⟨hal-04006291⟩
Accès au bibtex
BibTex

2022

ref_biblio
Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia‐alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
Accès au bibtex
BibTex

Poster communications

2023

ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil, Thomas Silverston. Evaluation Framework for ML-based IDS. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164441⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164441/file/Evaluation_Framework_for_ML_based_IDS.pdf BibTex

2022

ref_biblio
Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. Recherche d'indicateurs de compromission dans des journaux DNS chiffrés. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2022, Chambon-sur-Lac, France. RESSI 2022: Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information. ⟨hal-03997075⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997075/file/slides.pdf BibTex
ref_biblio
Gregory Blanc, Thomas Silverston, Sébastien Tixeuil. GRIFIN: cognitive and programmable security for resilient next-generation networks. RESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. ⟨hal-04165398⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165398/file/RESSI_2022_GRIFIN_1.pdf BibTex

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Hervé Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En Ligne, France. ⟨hal-04165399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165399/file/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf BibTex
ref_biblio
Gregory Blanc. VARIoT: vulnerability and attack repository for IoT. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En ligne, France. ⟨hal-04165400⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165400/file/Poster_VARIoT_RESSI2020.pdf BibTex

Proceedings

2024

ref_biblio
Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Foundations and Practice of Security, 14551, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57536-5. ⟨10.1007/978-3-031-57537-2⟩. ⟨hal-04601607⟩
Accès au bibtex
BibTex
ref_biblio
Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Foundations and Practice of Security, 14552, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57539-6. ⟨10.1007/978-3-031-57540-2⟩. ⟨hal-04734288⟩
Accès au bibtex
BibTex

2023

ref_biblio
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: proceedings of the 2023 Workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM, 2023, 979-8-4007-0265-5. ⟨10.1145/3605772⟩. ⟨hal-04325343⟩
Accès au bibtex
BibTex
ref_biblio
Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro. Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers. 15th International Symposium, FPS, Lecture Notes in Computer Science, 13877, Springer Nature Switzerland, pp.1-471, 2023, Lecture Notes in Computer Science (LNCS), 978-3-031-30121-6. ⟨10.1007/978-3-031-30122-3⟩. ⟨hal-04180387⟩
Accès au bibtex
BibTex

2022

ref_biblio
David Megias, Roberto Di Pietro, Joaquin Garcia‐alfaro. EICC 2022: european interdisciplinary cybersecurity conference. ACM; ACM, 2022, ⟨10.1145/3528580⟩. ⟨hal-04006360⟩
Accès au bibtex
BibTex

2019

ref_biblio
Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquin Garcia-Alfaro. Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papers. ESORICS 2018 international workshops (ISSA 2018) and (CSITS 2018), Lecture Notes in Computer Science, LNCS 11552, Springer International Publishing, pp.1--173, 2019, Security and Cryptology, LNCS, 978-3-030-16873-5. ⟨10.1007/978-3-030-16874-2⟩. ⟨hal-02086531⟩
Accès au bibtex
BibTex

2018

ref_biblio
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al.. Information and Communications Security. 11149, Springer International Publishing, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-01950-1⟩. ⟨hal-04187775⟩
Accès au bibtex
BibTex

Reports

2023

ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia‐alfaro. Cyber-resilience approaches for cyber-physical systems. Télécom SudParis (Institut Mines-Télécom). 2023. ⟨hal-04495662⟩
Accès au bibtex
https://arxiv.org/pdf/2302.05402 BibTex

Theses

2024

ref_biblio
Marwan Abbas Escribano. Modélisation de systèmes de leurres complexes. Sciences de l'information et de la communication. Institut Polytechnique de Paris, 2024. Français. ⟨NNT : 2024IPPAS009⟩. ⟨tel-04586272⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-04586272/file/127310_ABBAS_ESCRIBANO_2024_archivage_final.pdf BibTex

2023

ref_biblio
Aina Toky Rasoamanana. Derivation and Analysis of Cryptographic Protocol Implementation. Computer science. Institut Polytechnique de Paris, 2023. English. ⟨NNT : 2023IPPAS005⟩. ⟨tel-04251390⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-04251390/file/116389_RASOAMANANA_2023_archivage_definitif.pdf BibTex

Preprints, Working Papers, ...

2024

ref_biblio
Claudio Bellei, Hussain Alattas, Nesrine Kaaniche. Label-GCN: an effective method for adding label propagation to graph convolutional networks. 2024. ⟨hal-03991083⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991083/file/2104.02153.pdf BibTex
ref_biblio
Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'écosystème technique relatifs aux identités numériques - Écosystème élargi à la fourniture d'attributs, de justificatifs, de signatures électroniques et de portefeuilles d'identité numérique, working paper. 2024. ⟨halshs-04430701⟩
Accès au texte intégral et bibtex
https://shs.hal.science/halshs-04430701/file/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf BibTex