CSDAI

Department of Institut Polytechnique de Paris

Group r3s

r3s (networks, Systems, Services, Security)

Samovar, Telecom SudParis

Themes: digital trust; next generation digital infrastructure

The group works on network and services architectures, security of networks and systems

Contact person: Badii Jouaber, https://badiijouaber.wp.imtbs-tsp.eu/

Web site: https://samovar.telecom-sudparis.eu/spip.php?rubrique129

Journal articles

2023

ref_biblio
Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04080819/file/sensors-23-04224.pdf BibTex
ref_biblio
Zhenjiao Liu, Zhikui Chen, Yue Li, Liang Zhao, Tao Yang, et al.. IMC-NLT: Incomplete multi-view clustering by NMF and low-rank tensor. Expert Systems with Applications, 2023, 221, pp.119742. ⟨10.1016/j.eswa.2023.119742⟩. ⟨hal-04006481⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04006481/file/author%20file.pdf BibTex
ref_biblio
Wenhao Shao, Yanyan Wei, Praboda Rajapaksha, Dun Li, Zhigang Luo, et al.. Low-latency dimensional expansion and anomaly detection empowered secure IoT network. IEEE Transactions on Network and Service Management, 2023, 20 (3), ⟨10.1109/TNSM.2023.3246798⟩. ⟨hal-04005539⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04005539/file/FINAL%20VERSION%20%281%29.pdf BibTex
ref_biblio
Wenhao Shao, Ruliang Xiao, Praboda Rajapaksha, Mengzhu Wang, Zhigang Luo, et al.. Video anomaly detection with NTCN-ML: A novel TCN for multi-instance learning. Pattern Recognition, 2023, 143, pp.109765. ⟨10.1016/j.patcog.2023.109765⟩. ⟨hal-04131687⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04131687/file/PR-D-23-00012_clean_version.pdf BibTex
ref_biblio
Wenhao Shao, Praboda Rajapaksha, Yanyan Wei, Dun Li, Noel Crespi, et al.. COVAD: Content-oriented video anomaly detection using a self-attention based deep learning model. Virtual Reality & Intelligent Hardware, 2023, 5 (1), pp.24-41. ⟨10.1016/j.vrih.2022.06.001⟩. ⟨hal-04029569⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04029569/file/vrih0523.pdf BibTex

2022

ref_biblio
Ghulam Abro, Saiful Azrin B. M. Zulkifli, Rana Javed Masood, Vijanth Sagayan Asirvadam, Anis Laouiti. Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats. Drones, 2022, 6 (10), pp.284. ⟨10.3390/drones6100284⟩. ⟨hal-03968417⟩
Accès au bibtex
BibTex
ref_biblio
Bahram Alinia, Mohammad Hajiesmaili, Zachary J Lee, Noel Crespi, Enrique Mallada. Online EV scheduling algorithms for adaptive charging networks with global peak constraints. IEEE Transactions on Sustainable Computing, In press, pp.1-12. ⟨10.1109/TSUSC.2020.2979854⟩. ⟨hal-02472860⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02472860/file/Bahram.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Research trends in collaborative drones. Sensors, 2022, 22 (9), pp.3321:1-3321:17. ⟨10.3390/s22093321⟩. ⟨hal-03654021⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03654021/file/sensors-drone-survey.pdf BibTex
ref_biblio
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui, et al.. BTrust: a new blockchain-based trust management protocol for resource sharing. Journal of Network and Systems Management, 2022, 30 (4), pp.64. ⟨10.1007/s10922-022-09674-4⟩. ⟨hal-04003868⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04003868/file/BTRUST_springerRIVISED-1.pdf BibTex
ref_biblio
Sophie Dramé-Maigné, Hervé Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
Accès au bibtex
BibTex
ref_biblio
Aicha Dridi, Hossam Afifi, Hassine Moungla, Jordi Badosa. A novel deep reinforcement approach for IIoT microgrid energy management systems. IEEE Transactions on Green Communications and Networking, 2022, 6 (1), pp.148-159. ⟨10.1109/TGCN.2021.3112043⟩. ⟨hal-03414391⟩
Accès au bibtex
BibTex
ref_biblio
Maxime Elkael, Massinissa Ait Aba, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber. Monkey business: reinforcement learning meets neighborhood search for virtual network embedding.. Computer Networks, 2022, 216 (109204), ⟨10.1016/j.comnet.2022.109204⟩. ⟨hal-03876945⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03876945/file/2202.13706.pdf BibTex
ref_biblio
Hassan Fawaz, Julien Lesca, Pham Tran Anh Quang, Jeremie Leguay, Djamal Zeghlache, et al.. Graph convolutional reinforcement learning for collaborative queuing agents. IEEE Transactions on Network and Service Management, 2022, pp.1-9. ⟨10.1109/TNSM.2022.3226605⟩. ⟨hal-03973095⟩
Accès au bibtex
https://arxiv.org/pdf/2205.12009 BibTex
ref_biblio
Fariba Ghaffari, Komal Gilani, Emmanuel Bertin, Noel Crespi. Identity and access management using distributed ledger technology: a survey. International Journal of Network Management, 2022, 32 (2), pp.e2180. ⟨10.1002/nem.2180⟩. ⟨hal-03315497⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03315497/file/Identity%20and%20access%20management%20%282%29.pdf BibTex
ref_biblio
Rémy Grünblatt, Isabelle Guérin-Lassous, Olivier Simonin. A distributed antenna orientation solution for optimizing communications in a fleet of UAVs. Computer Communications, 2022, 181, pp.102-115. ⟨10.1016/j.comcom.2021.09.020⟩. ⟨hal-03400498⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03400498/file/Papier_ComCom_2021.pdf BibTex
ref_biblio
Hatem Ibn-Khedher, Mohammed Laroui, Hassine Moungla, Hossam Afifi, Emad Abd-Elrahman. Next-generation edge computing assisted autonomous driving based artificial intelligence algorithms. IEEE Access, 2022, 10 (1), pp.53987-54001. ⟨10.1109/ACCESS.2022.3174548⟩. ⟨hal-03867413⟩
Accès au bibtex
BibTex
ref_biblio
Saleem Iqbal, Hira Maryam, Kashif Naseer Qureshi, Ibrahim Tariq Javed, Noel Crespi. Automised flow rule formation by using machine learning in software defined networks based edge computing. Egyptian Informatics Journal, 2022, 23 (1), pp.149-157. ⟨10.1016/j.eij.2021.10.001⟩. ⟨hal-03559491⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03787447/file/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf BibTex
ref_biblio
Houda Jmila, Mohamed Ibn Khedher. Adversarial machine learning for network intrusion detection: a comparative study. Computer Networks, 2022, 214, pp.109073:1-109073:14. ⟨10.1016/j.comnet.2022.109073⟩. ⟨hal-03726213⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03726213/file/Adversarial%20Machine%20Learning%20for%20Network%20intrusion%20Detection%20A.pdf BibTex
ref_biblio
Dun Li, Dezhi Han, Noel Crespi, Roberto Minerva, Kuan-Ching Li. A blockchain-based secure storage and access control scheme for supply chain finance. Journal of Supercomputing, 2022, 79 (1), pp.109-138. ⟨10.1007/s11227-022-04655-5⟩. ⟨hal-04029559⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04029559/file/A_Blockchain_based_Secure_Storage_and_Access_Control_Scheme_for_Supply_Chain_Finance%20%282%29.pdf BibTex
ref_biblio
Roberto Minerva, Faraz Malik Awan, Noel Crespi. Exploiting digital twin as enablers for synthetic sensing. IEEE Internet Computing, 2022, 26 (05), ⟨10.1109/MIC.2021.3051674⟩. ⟨hal-03100719⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03100719/file/Short%20DT%20And%20Sysnthetic%20sensing%20v1.0.pdf BibTex
ref_biblio
Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Cross-lingual few-shot hate speech and offensive language detection using meta learning. IEEE Access, 2022, 10, pp.14880-14896. ⟨10.1109/ACCESS.2022.3147588⟩. ⟨hal-03559484⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03559484/file/Cross-Lingual_Few-Shot_Hate_Speech_and_Offensive_Language_Detection_Using_Meta_Learning.pdf BibTex
ref_biblio
Nattakorn Promwongsa, Amin Ebrahimzadeh, Roch Glitho, Noel Crespi. Joint VNF placement and scheduling for latency-sensitive services. IEEE Transactions on Network Science and Engineering, 2022, 9 (4), pp.2432-2449. ⟨10.1109/TNSE.2022.3163927⟩. ⟨hal-04003873⟩
Accès au bibtex
BibTex
ref_biblio
Kashif Naseer Qureshi, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, et al.. A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the Internet of vehicles. Applied Sciences, 2022, 12 (1), pp.476:1 - 476:19. ⟨10.3390/app12010476⟩. ⟨hal-03559485⟩
Accès au bibtex
BibTex
ref_biblio
Sara Rabhi, Frédéric Blanchard, Alpha Mamadou Diallo, Djamal Zeghlache, Céline Lukas, et al.. Temporal deep learning framework for retinopathy prediction in patients with type 1 diabetes. Artificial Intelligence in Medicine, 2022, 133 (C), pp.102408. ⟨10.1016/j.artmed.2022.102408⟩. ⟨hal-03889323⟩
Accès au bibtex
BibTex
ref_biblio
Yasir Saleem, Pablo Sotres, Samuel Fricker, Carmen Lopez de La Torre, Noel Crespi, et al.. IoTRec: the IoT Recommender for smart parking system. IEEE Transactions on Emerging Topics in Computing, 2022, 10 (1), pp.280-296. ⟨10.1109/TETC.2020.3014722⟩. ⟨hal-02963833⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02963833/file/IoTRec%2520The%2520IoT%2520Recommender%2520for%2520Smart%2520Parking%2520System%2520to%2520the%2520repository.pdf BibTex
ref_biblio
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali, et al.. A comparative study of web application security parameters: current trends and future directions. Applied Sciences, 2022, 12 (8), pp.4077:1-4077:23. ⟨10.3390/app12084077⟩. ⟨hal-03656365⟩
Accès au bibtex
BibTex

2021

ref_biblio
Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Joaquin Garcia‐alfaro, et al.. DECA: a Dynamic Energy cost and Carbon emission-efficient Application placement method for Edge Clouds. IEEE Access, 2021, 9, pp.70192-70213. ⟨10.1109/ACCESS.2021.3075973⟩. ⟨hal-03208423v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03208423/file/IEEEAccessDECA.pdf BibTex
ref_biblio
Hugo Alatrista-Salas, Vincent Gauthier, Miguel Nunez-Del-Prado, Monique Becker. Impact of natural disasters on consumer behavior: case of the 2017 El Niño phenomenon in Peru. PLoS ONE, 2021, 16 (1), pp.e0244409:1-e0244409:23. ⟨10.1371/journal.pone.0244409⟩. ⟨hal-03141616⟩
Accès au bibtex
BibTex
ref_biblio
Faraz Malik Awan, Roberto Minerva, Noel Crespi. Using noise pollution data for traffic prediction in smart cities: experiments based on LSTM recurrent neural networks. IEEE Sensors Journal, 2021, 21 (18), pp.20722-20729. ⟨10.1109/JSEN.2021.3100324⟩. ⟨hal-03311498⟩
Accès au bibtex
BibTex
ref_biblio
Aicha Dridi, Chérifa Boucetta, Seif Eddine Hammami, Hossam Afifi, Hassine Moungla. STAD: Spatio-Temporal Anomaly Detection mechanism for mobile network management. IEEE Transactions on Network and Service Management, 2021, 18 (1), pp.894-906. ⟨10.1109/TNSM.2020.3048131⟩. ⟨hal-03135739⟩
Accès au bibtex
BibTex
ref_biblio
Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle. Towards more secure EMV purchase transactions. Annals of Telecommunications - annales des télécommunications, 2021, 76 (3-4), pp.203-222. ⟨10.1007/s12243-020-00784-1⟩. ⟨hal-03981012⟩
Accès au bibtex
BibTex
ref_biblio
Fariba Ghaffari, Emmanuel Bertin, Noel Crespi, Shanay Behrad, Julien Hatin. A novel access control method via smart contracts for internet-based service provisioning. IEEE Access, 2021, 9, pp.81253-81273. ⟨10.1109/ACCESS.2021.3085831⟩. ⟨hal-03245473⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03245473/file/access.pdf BibTex
ref_biblio
Ibrahim Tariq Javed, Fares Alharbi, Tiziana Margaria, Noel Crespi, Kashif Naseer Qureshi. PETchain: a blockchain-based privacy enhancing technology. IEEE Access, 2021, 9, pp.41129-41143. ⟨10.1109/ACCESS.2021.3064896⟩. ⟨hal-03174749⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Fares Alharbi, Tiziana Margaria, Noel Crespi. Detecting nuisance calls over internet telephony using caller reputation. Electronics, 2021, 10 (3), pp.353:1-353:20. ⟨10.3390/electronics10030353⟩. ⟨hal-03126516⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Gregory Blanc. Towards security-aware 5G slice embedding. Computers and Security, 2021, 100, pp.102075:1-102075:18. ⟨10.1016/j.cose.2020.102075⟩. ⟨hal-03123977⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03123977/file/S0167404820303485.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
Accès au bibtex
BibTex
ref_biblio
Ines Khoufi, Anis Laouiti, Cedric Adjih, Mohamed Hadded. UAVs trajectory optimization for data pick up and delivery with time window. Drones, 2021, 5 (2), pp.27:1-27:22. ⟨10.3390/drones5020027⟩. ⟨hal-03591073⟩
Accès au bibtex
BibTex
ref_biblio
Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
Accès au bibtex
BibTex
ref_biblio
Mohammed Laroui, Boubakr Nour, Hassine Moungla, Moussa Ali Cherif, Hossam Afifi, et al.. Edge and fog computing for IoT: a survey on current research activities & future directions. Computer Communications, 2021, 180, pp.210-231. ⟨10.1016/j.comcom.2021.09.003⟩. ⟨hal-03414397⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03414397/file/S0140366421003327.pdf BibTex
ref_biblio
Yan Liu, Bin Guo, Daqing Zhang, Djamal Zeghlache, Jingmin Chen, et al.. MetaStore: a task-adaptative meta-learning model for optimal store placement with multi-city knowledge transfer. ACM Transactions on Intelligent Systems and Technology, 2021, 12 (3), pp.28:1-28:23. ⟨10.1145/3447271⟩. ⟨hal-03363389⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03363389/file/3447271.pdf BibTex
ref_biblio
Yan Liu, Bin Guo, Daqing Zhang, Djamal Zeghlache, Jingmin Chen, et al.. Knowledge transfer with weighted adversarial network for cold-start store site recommendation. ACM Transactions on Knowledge Discovery from Data (TKDD), 2021, 15 (3), 47, pp 1-27. ⟨10.1145/3442203⟩. ⟨hal-03363394⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03363394/file/3442203.pdf BibTex
ref_biblio
Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
Accès au bibtex
BibTex
ref_biblio
Paul Marillonnet, Maryline Laurent, Mikaël Ates, Maryline Laurent. Personal information self-management: A survey of technologies supporting administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
Accès au bibtex
https://arxiv.org/pdf/2109.12968 BibTex
ref_biblio
Roberto Minerva, Noel Crespi. Digital twins: properties, software frameworks, and application scenarios. IT Professional, 2021, 23 (1), pp.51 - 55. ⟨10.1109/mitp.2020.2982896⟩. ⟨hal-03210180⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03210180/file/MITP2982896.pdf BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. BERT, XLNet or RoBERTa: the best transfer learning model to detect clickbaits. IEEE Access, 2021, 9, pp.154704-154716. ⟨10.1109/ACCESS.2021.3128742⟩. ⟨hal-03559488⟩
Accès au bibtex
BibTex
ref_biblio
Adel Mounir Said, Ahmed Kamal, Hossam Afifi. An intelligent parking sharing system for green and smart cities based IoT. Computer Communications, 2021, 172, pp.10-18. ⟨10.1016/j.comcom.2021.02.017⟩. ⟨hal-03196973⟩
Accès au bibtex
BibTex
ref_biblio
Yasir Saleem, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva. Parking recommender system privacy preservation through anonymization and differential privacy. Engineering Reports, 2021, 3 (2), pp.e12297:1-e12297:30. ⟨10.1002/eng2.12297⟩. ⟨hal-02963830⟩
Accès au bibtex
BibTex
ref_biblio
Abdallah Sobehy, Éric Renault, Paul Mühlethaler. Generalization aspect of accurate machine learning models for CSI-based localization. Annals of Telecommunications - annales des télécommunications, 2021, 77 (5-6), pp.345-357. ⟨10.1007/s12243-021-00853-z⟩. ⟨hal-04497040⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Fares Alharbi, Badr Bellaj, Tiziana Margaria, Noel Crespi, et al.. Health-ID: a blockchain-based decentralized identity management for remote healthcare. Healthcare, 2021, 9 (6), pp.712:1 - 712:21. ⟨10.3390/healthcare9060712⟩. ⟨hal-03263748⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03263748/file/healthcare-cameraready.pdf BibTex
ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. Dataset of coronavirus content from Instagram with an exploratory analysis. IEEE Access, 2021, 9, pp.157192-157202. ⟨10.1109/ACCESS.2021.3126552⟩. ⟨hal-03559489⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03559489/file/Dataset_of_Coronavirus_Content_From_Instagram_With_an_Exploratory_Analysis.pdf BibTex

2020

ref_biblio
Faraz Malik Awan, Yasir Saleem, Roberto Minerva, Noel Crespi. A comparative analysis of machine/deep learning models for parking space availability prediction. Sensors, 2020, 20 (1), ⟨10.3390/s20010322⟩. ⟨hal-02429337⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02429337/file/sensors-20-00322.pdf BibTex
ref_biblio
Faraz Malik Awan, Roberto Minerva, Noel Crespi. Improving road traffic forecasting using air pollution and atmospheric data: experiments based on LSTM recurrent neural networks. Sensors, 2020, 20 (13), pp.3749:1-3749:21. ⟨10.3390/s20133749⟩. ⟨hal-02963835⟩
Accès au bibtex
BibTex
ref_biblio
Shanay Behrad, Emmanuel Bertin, Stéphane Tuffin, Noel Crespi. A new scalable authentication and access control mechanism for 5G-based IoT. Future Generation Computer Systems, 2020, 108, pp.46-61. ⟨10.1016/j.future.2020.02.014⟩. ⟨hal-02472852⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02472852/file/Shanay.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990990/file/InsPABAC%2520%25288%2529.pdf BibTex
ref_biblio
Lyes Bouali, Selma Khebbache, Samia Bouzefrane, Mehammed Daoui. A recommendation approach using forwarding graph to analyze mapping algorithms for Virtual Network Functions. Recent Advances in Computer Science and Communications, 2020, 13 (6), pp.1325 - 1337. ⟨10.2174/2213275912666190618114014⟩. ⟨hal-02162031⟩
Accès au bibtex
BibTex
ref_biblio
Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02921464/file/SNPP%20R1%20Final.pdf BibTex
ref_biblio
François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. Computers and Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02387073/file/COSE-D-19-00632R1-preprint.pdf BibTex
ref_biblio
Quyet Cao Huu, Giyyarpuram Madhusudan, Reza Farahbakhsh, Noel Crespi. Policy-based usage control for a trustworthy data sharing platform in smart cities. Future Generation Computer Systems, 2020, 107, pp.998-1010. ⟨10.1016/j.future.2017.05.039⟩. ⟨hal-01823631⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia‐alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs. Journal of information security and applications, 2020, 54, pp.102562:1-102562:14. ⟨10.1016/j.jisa.2020.102562⟩. ⟨hal-03125762⟩
Accès au bibtex
BibTex
ref_biblio
Matti Hamalainen, Lorenzo Mucchi, Marc Girod-Genet, Tuomas Paso, John Farserotu, et al.. ETSI SmartBAN architecture: the global vision for Smart Body Area Networks. IEEE Access, 2020, 8, pp.150611-150625. ⟨10.1109/ACCESS.2020.3016705⟩. ⟨hal-02937314⟩
Accès au bibtex
BibTex
ref_biblio
Hicham Hossayni, Imran Khan, Mohammad Aazam, Amin Taleghani-Isfahani, Noel Crespi. SemKoRe: improving machine maintenance in industrial IoT with semantic knowledge graphs. Applied Sciences, 2020, 10 (18), pp.6325:1-6325:19. ⟨10.3390/app10186325⟩. ⟨hal-02963831⟩
Accès au bibtex
BibTex
ref_biblio
Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache. Dynamic VNF Forwarding graph extension algorithms. IEEE Transactions on Network and Service Management, 2020, 17 (3), pp.1389-1402. ⟨10.1109/TNSM.2020.2990815⟩. ⟨hal-03119385⟩
Accès au bibtex
BibTex
ref_biblio
Mohamed Ibn Khedher, Houda Jmila, Mounim El Yacoubi. Automatic processing of Historical Arabic Documents: a comprehensive survey. Pattern Recognition, 2020, 100, pp.107144-1:107144-17. ⟨10.1016/j.patcog.2019.107144⟩. ⟨hal-02481354⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02481354/file/S0031320319304455.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990971/file/_JNCA____Survey_PETS.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991089/file/fbloc-03-00017.pdf BibTex
ref_biblio
Jia Liu, Mingchu Li, Yuanfang Chen, Sardar Islam, Noel Crespi. Variational channel estimation with tempering: an artificial intelligence algorithm for wireless intelligent networks. Sensors, 2020, 20 (20), pp.5939:1-5939:19. ⟨10.3390/s20205939⟩. ⟨hal-03126509⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03126509/file/Variational_Channel_Estimation_with_Tempering_An_A.pdf BibTex
ref_biblio
Roberto Minerva, Gyu Myoung Lee, Noel Crespi. Digital twin in the IoT context: a survey on technical features, scenarios, and architectural models. Proceedings of the IEEE, 2020, 108 (10), pp.1785-1824. ⟨10.1109/JPROC.2020.2998530⟩. ⟨hal-02963834⟩
Accès au bibtex
BibTex
ref_biblio
Soheila Molaei, Reza Farahbakhsh, Mostafa Salehi, Noel Crespi. Identifying influential nodes in heterogeneous networks. Expert Systems with Applications, 2020, 160, pp.113580:1-113580:12. ⟨10.1016/j.eswa.2020.113580⟩. ⟨hal-02963837⟩
Accès au bibtex
BibTex
ref_biblio
João Moreira, Luís Ferreira Pires, Marten van Sinderen, Laura Daniele, Marc Girod-Genet. SAREF4health: towards IoT standard-based ontology-driven cardiac e-health systems. Applied Ontology, 2020, 15 (3), pp.385-410. ⟨10.3233/AO-200232⟩. ⟨hal-02937316⟩
Accès au bibtex
BibTex
ref_biblio
Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Hate speech detection and racial bias mitigation in social media based on BERT model. PLoS ONE, 2020, 15 (8), pp.e0237861:1-e0237861:26. ⟨10.1371/journal.pone.0237861⟩. ⟨hal-02963832⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02963832/file/2cd0f420e40ae23682d3a4417cc81f32.pdf BibTex
ref_biblio
Boubakr Nour, Hatem Ibn Khedher, Hassine Moungla, Hossam Afifi, Fan Li, et al.. Internet of things mobility over information-centric/named-data networking. IEEE Internet Computing, 2020, 24 (1), pp.14-24. ⟨10.1109/MIC.2019.2963187⟩. ⟨hal-02460687⟩
Accès au bibtex
BibTex
ref_biblio
David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia‐alfaro. A real-time query log protection method for web search engines. IEEE Access, 2020, 8, pp.87393-87413. ⟨10.1109/ACCESS.2020.2992012⟩. ⟨hal-03125769⟩
Accès au bibtex
BibTex
ref_biblio
Nattakorn Promwongsa, Mohammad Abu-Lebdeh, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, et al.. Ensuring reliability and low cost when using a parallel VNF processing approach to embed delay-constrained slices. IEEE Transactions on Network and Service Management, 2020, 17 (4), pp.2226 - 2241. ⟨10.1109/TNSM.2020.3029108⟩. ⟨hal-02963829⟩
Accès au bibtex
BibTex

2019

ref_biblio
Aziza Ben Mosbah, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal. Enhancing Device-to-Device direct discovery based on predicted user density patterns. Computer Networks, 2019, 151, pp.245 - 259. ⟨10.1016/j.comnet.2019.01.015⟩. ⟨hal-02055714⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02055714/file/S1389128619300933.pdf BibTex
ref_biblio
Yuanfang Chen, Mohsen Guizani, Yan Zhang, Lei Wang, Noel Crespi, et al.. When traffic flow prediction and wireless big data analytics meet. IEEE Network, 2019, 33 (3), pp.161 - 167. ⟨10.1109/MNET.2018.1800134⟩. ⟨hal-01998637⟩
Accès au bibtex
BibTex
ref_biblio
Hwei-Ming Chung, Wen-Tai Li, Chau Yuen, Chao-Kai Wen, Noel Crespi. Electric vehicle charge scheduling mechanism to maximize cost efficiency and user convenience. IEEE Transactions on Smart Grid, 2019, 10 (3), pp.3020 - 3030. ⟨10.1109/TSG.2018.2817067⟩. ⟨hal-01998549⟩
Accès au bibtex
BibTex
ref_biblio
Rebecca Copeland, Michael Copeland, Shohreh Ahvar, Noel Crespi, Oyunchimeg Shagdar, et al.. Automotive virtual edge communicator (AVEC) with vehicular inter-agent service orchestration and resourcing (ViSOR). Annals of Telecommunications - annales des télécommunications, 2019, 74 (9-10), pp.655-662. ⟨10.1007/s12243-019-00719-5⟩. ⟨hal-02363336⟩
Accès au bibtex
BibTex
ref_biblio
Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. Misbehavior detection and efficient revocation within VANET. Journal of information security and applications, 2019, 46, pp.193-209. ⟨10.1016/j.jisa.2019.03.001⟩. ⟨hal-02448040⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02448040/file/S2214212618305337.pdf BibTex
ref_biblio
Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. Trust model for secure group leader-based communications in VANET. Wireless Networks, 2019, 25 (8), pp.4639 - 4661. ⟨10.1007/s11276-018-1756-6⟩. ⟨hal-01994844⟩
Accès au bibtex
BibTex
ref_biblio
Ghazaleh Khodabandelou, Vincent Gauthier, Marco Fiore, Mounim El Yacoubi. Estimation of static and dynamic urban populations with mobile network metadata. IEEE Transactions on Mobile Computing, 2019, 18 (9), pp.2034-2047. ⟨10.1109/TMC.2018.2871156⟩. ⟨hal-02286129⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02286129/file/TMC-2017-11-0717-main.pdf BibTex
ref_biblio
Ines Khoufi, Anis Laouiti, Cédric Adjih. A survey of recent extended variants of the traveling salesman and vehicle routing problems for Unmanned Aerial Vehicles. Drones, 2019, 3 (3), pp.66:1-30. ⟨10.3390/drones3030066⟩. ⟨hal-02431644⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The influence of conception paradigms on data protection in e-learning platforms: a case study. IEEE Access, 2019, 7, pp.64110-64119. ⟨10.1109/ACCESS.2019.2915275⟩. ⟨hal-02281231⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02281231/file/08708177.pdf BibTex
ref_biblio
Christophe Kiennert, Pierre-Marie Bajan, Hervé Debar. Evaluating security products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
Accès au bibtex
BibTex
ref_biblio
Wenbin Liu, Yongjian Yang, En Wang, Leye Wang, Djamal Zeghlache, et al.. Multi-dimensional urban sensing in sparse mobile crowdsensing. IEEE Access, 2019, 7, pp.82066-82079. ⟨10.1109/ACCESS.2019.2924184⟩. ⟨hal-02321016⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02321016/file/5-Multi-Dimensional%20Urban%20Sensing.pdf BibTex
ref_biblio
Wenbin Liu, Leye Wang, En Wang, Yongjian Yang, Djamal Zeghlache, et al.. Reinforcement learning-based cell selection in sparse mobile crowdsensing. Computer Networks, 2019, 161, pp.102-114. ⟨10.1016/j.comnet.2019.06.010⟩. ⟨hal-02321018⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02321018/file/6-Reinforcement%20Learning-based%20Cell%20Selection%20in%20Sparse%20Mobile%20Crowdsensing.%20Computer%20Networks.pdf BibTex
ref_biblio
Meysam Masoudi, Mohammad Galal Khafagy, Alberto Conte, Ali El-Amine, Brian Francoise, et al.. Green mobile networks for 5G and beyond. IEEE Access, 2019, 7, pp.107270-107299. ⟨10.1109/ACCESS.2019.2932777⟩. ⟨hal-03107206⟩
Accès au bibtex
BibTex
ref_biblio
Amir Mohammadinejad, Reza Farahbakhsh, Noel Crespi. Consensus opinion model in online social networks based on influential users. IEEE Access, 2019, 7, pp.28436 - 28451. ⟨10.1109/ACCESS.2019.2894954⟩. ⟨hal-02015221⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02015221/file/Consensus_Opinion_Model_in_Online_Social_Networks_Based_on_Influential_Users.pdf BibTex
ref_biblio
Sebti Mouelhi, Mohamed-Emine Laarouchi, Daniela Cancila, Hakima Chaouchi. Predictive formal analysis of resilience in cyber-physical systems. IEEE Access, 2019, 7, pp.33741 - 33758. ⟨10.1109/ACCESS.2019.2903153⟩. ⟨hal-02077005⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02077005/file/access_par_cps.pdf BibTex
ref_biblio
Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, et al.. An empirical approach to phishing countermeasures through smart glasses and validation agents. IEEE Access, 2019, 7, pp.130758-130771. ⟨10.1109/access.2019.2940669⟩. ⟨hal-02438600⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438600/file/08830416.pdf BibTex
ref_biblio
Rogier Noldus, Noel Crespi. Global communications newsletter : ICIN 2018: Innovation in Clouds, Internet and Networks. IEEE Communications Magazine, 2019, 57 (1), pp.2 - 4. ⟨10.1109/MCOM.2019.8613265⟩. ⟨hal-02015832⟩
Accès au bibtex
BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Scrutinizing news media cooperation in Facebook and Twitter. IEEE Access, 2019, pp.1-14. ⟨10.1109/ACCESS.2019.2902491⟩. ⟨hal-02363341⟩
Accès au bibtex
BibTex
ref_biblio
Yasir Saleem, Noel Crespi, Mubashir Husain Rehmani, Rebecca Copeland. Internet of things-aided smart grid: technologies, architectures, applications, prototypes, and future research directions. IEEE Access, 2019, 7, pp.62962-63003. ⟨10.1109/ACCESS.2019.2913984⟩. ⟨hal-02339293⟩
Accès au bibtex
https://arxiv.org/pdf/1704.08977 BibTex
ref_biblio
Abdallah Sobehy, Eric Renault, Paul Mühlethaler. Position certainty propagation: a localization service for Ad-Hoc Networks. Computers, 2019, 8 (1), pp.Article 6. ⟨10.3390/computers8010006⟩. ⟨hal-02178389⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02178389/file/computers-396455-proof.pdf BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. Online and batch algorithms for VNFs placement and chaining. Computer Networks, 2019, 158, pp.98-113. ⟨10.1016/j.comnet.2019.01.041⟩. ⟨hal-02355987⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02355987/file/S1389128618302548.pdf BibTex

2018

ref_biblio
Abdel-Mehsen Ahmad, Jamil Kassem, Michel Barbeau, Evangelos Kranakis, Steven Porretta, et al.. Doppler effect in the acoustic ultra low frequency band for wireless underwater networks. Mobile Networks and Applications, 2018, 23 (5), pp.1282 - 1292. ⟨10.1007/s11036-018-1036-9⟩. ⟨hal-02013724⟩
Accès au bibtex
BibTex
ref_biblio
Xavier Baró‐solé, Ana E. Guerrero‐roldan, Josep Prieto‐blázquez, Anna Rozeva, Orlin Marinov, et al.. Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experience. Internet technology letters, 2018, 1 (4), pp.e56-1 - e56-6. ⟨10.1002/itl2.56⟩. ⟨hal-02013504⟩
Accès au bibtex
BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01773931/file/2018-JCN-PHOABE-Sana-Nesrine.pdf BibTex
ref_biblio
Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leila Azouz Saidane. Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network. International Journal of Space-Based and Situated Computing, 2018, 8 (3), pp.169 - 178. ⟨10.1504/IJSSC.2018.097294⟩. ⟨hal-01994662⟩
Accès au bibtex
BibTex
ref_biblio
Holger Butscheidt, Joan Triay, Stefan Arntzen, Igor Faynberg, Bruno Chatras, et al.. Standards news. IEEE Communications Standards Magazine, 2018, 2 (2), pp.10 - 18. ⟨hal-01875376⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Thomas Bourgeau. Internet of Things: building the new digital society. IoT, 2018, 1 (1), pp.1 - 4. ⟨10.3390/iot1010001⟩. ⟨hal-01993717⟩
Accès au bibtex
BibTex
ref_biblio
Mouhamad Dieye, Shohreh Ahvar, Jagruti Sahoo, Ehsan Ahvar, Roch Glitho, et al.. CPVNF: Cost-Efficient Proactive VNF placement and chaining for value-added services in content delivery networks. IEEE Transactions on Network and Service Management, 2018, 15 (2), pp.774 - 786. ⟨10.1109/TNSM.2018.2815986⟩. ⟨hal-01879110⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01879110/file/TNSMdeye1803.06025.pdf BibTex
ref_biblio
Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security (third edition). Computers and Electrical Engineering, 2018, 71, pp.1040 - 1042. ⟨10.1016/j.compeleceng.2018.10.008⟩. ⟨hal-02013479⟩
Accès au bibtex
BibTex
ref_biblio
Nicolas Gensollen, Vincent Gauthier, Monique Becker, Michel Marot. Stability and performance of coalitions of prosumers through diversification in the smart grid. IEEE Transactions on Smart Grid, 2018, 9 (2), pp.963 - 970. ⟨10.1109/TSG.2016.2572302⟩. ⟨hal-01729373⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01729373/file/Stability%20and%20Performance%20of%20Coalitions%20of%20Prosumers%20Through%20Diversification%20in%20the%20Smart%20Grid.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Hypergraph-driven mitigation of cyber-attacks. Internet technology letters, 2018, 1 (3), pp.e38-1 - e38-6. ⟨10.1002/itl2.38⟩. ⟨hal-02013488⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Using an event data taxonomy to represent the impact of cyber events as geometrical instances. IEEE Access, 2018, 6, pp.8810 - 8828. ⟨10.1109/ACCESS.2017.2740402⟩. ⟨hal-01729364⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01729364/file/18686.pdf BibTex
ref_biblio
Mohamed Hadded, Anis Laouiti. A study on priority-based centralized TDMA slot scheduling algorithm for Vehicular Ad hoc NETworks. International journal of digital information and wireless communications (IJDIWC), 2018, 8 (2), pp.124 - 128. ⟨10.17781/P002418⟩. ⟨hal-01811257⟩
Accès au bibtex
BibTex
ref_biblio
Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. Trust model for group leader selection in VANET. International journal of digital information and wireless communications (IJDIWC), 2018, 8 (2), pp.139 - 143. ⟨10.17781/P002421⟩. ⟨hal-01811243⟩
Accès au bibtex
BibTex
ref_biblio
Sonia Ikken, Eric Renault, Abdelkamel Tari, M. Tahar Kechadi. Exact and heuristical data workflow placement algorithms for big data computing in cloud datacenters. Scalable Computing : Practice and Experience, 2018, 19 (3), pp.223 - 244. ⟨10.12694/scpe.v19i3.1365⟩. ⟨hal-01997451⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Kiennert, Ismail Ziad, Hervé Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
Accès au bibtex
BibTex
ref_biblio
Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, et al.. CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 2018, 19 (7), pp.2204 - 2220. ⟨10.1109/TITS.2017.2777990⟩. ⟨hal-01846911⟩
Accès au bibtex
BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
Accès au bibtex
BibTex
ref_biblio
Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on emerging telecommunications technologies, 2018, 29 (7), pp.e3209-1 - e3209-17. ⟨10.1002/ett.3209⟩. ⟨hal-01823618⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01823618/file/18687.pdf BibTex
ref_biblio
Jose Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro. Cyber‐physical architecture assisted by programmable networking. Internet technology letters, 2018, 1 (4), pp.e44-1 - e44-8. ⟨10.1002/itl2.44⟩. ⟨hal-01869475⟩
Accès au bibtex
BibTex
ref_biblio
Lei Shu, Mithun Mukherjee, Michael Pecht, Noel Crespi, Son Han. Challenges and research issues of data management in IoT for large-scale petrochemical plants. IEEE Systems Journal, 2018, 12 (3), pp.2509 - 2523. ⟨10.1109/JSYST.2017.2700268⟩. ⟨hal-01681454⟩
Accès au bibtex
BibTex
ref_biblio
Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Viet Hai Ha, Xuan Huyen Do. Time-stamp incremental checkpointing and its application for an optimization of execution model to improve performance of CAPE. Informatica, 2018, 42 (3), pp.301 - 311. ⟨10.31449/inf.v42i3.2244⟩. ⟨hal-01997459⟩
Accès au bibtex
BibTex

2017

ref_biblio
Mayla Alimam, Emmanuel Bertin, Noel Crespi. ITIL perspective on enterprise social media. International Journal of Information Management, 2017, 37 (4), pp.317 - 326. ⟨10.1016/j.ijinfomgt.2017.03.005⟩. ⟨hal-01638376⟩
Accès au bibtex
BibTex
ref_biblio
Bahram Alinia, Mohammad Hajiesmaili, Ahmad Khonsari, Noel Crespi. Maximum-quality tree construction for deadline-constrained aggregation in WSNs. Sensors, 2017, 17 (12), pp.3930 - 3943. ⟨10.1109/JSEN.2017.2701552⟩. ⟨hal-01816340⟩
Accès au bibtex
BibTex
ref_biblio
Mohammad Rida Bahloul, Mohd Zuki Yusoff, Abdel-Haleem Abdel-Aty, Mohamad Naufal Mohamad Saad, Anis Laouiti. Efficient and reliable modulation classification for MIMO systems. Arabian Journal for Science and Engineering, 2017, 42 (12), pp.5201 - 5209. ⟨10.1007/s13369-017-2730-9⟩. ⟨hal-01643275⟩
Accès au bibtex
BibTex
ref_biblio
Yuanfang Chen, Noel Crespi, Antonio M. Ortiz, Lei Shu. Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Information Sciences, 2017, 379, pp.82 - 93. ⟨10.1016/j.ins.2016.07.075⟩. ⟨hal-01419516⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2017, 59, pp.73 - 75. ⟨10.1016/j.compeleceng.2017.05.027⟩. ⟨hal-02013472⟩
Accès au bibtex
BibTex
ref_biblio
Giovanni Giambene, van Anh Le, Thomas Bourgeau, Hakima Chaouchi. Iterative multi-level soft frequency reuse with load balancing for heterogeneous LTE-A systems. IEEE Transactions on Wireless Communications, 2017, 16 (2), pp.924 - 938. ⟨10.1109/TWC.2016.2634536⟩. ⟨hal-01646347⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01453253/file/preprint_JCSS_2016.pdf BibTex
ref_biblio
Makhlouf Hadji, Djamal Zeghlache. Mathematical programming approach for revenue maximization in cloud federations. IEEE Transactions on Cloud Computing, 2017, 5 (1), pp.99 - 111. ⟨10.1109/TCC.2015.2402674⟩. ⟨hal-01462096⟩
Accès au bibtex
BibTex
ref_biblio
Son Han, Noel Crespi. Semantic service provisioning for smart objects: integrating IoT applications into the web. Future Generation Computer Systems, 2017, 76, pp.180 - 197. ⟨10.1016/j.future.2016.12.037⟩. ⟨hal-01586736⟩
Accès au bibtex
BibTex
ref_biblio
Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. VANET Security Challenges and Solutions: A Survey. Vehicular Communications, 2017, 7, pp.7-20. ⟨10.1016/j.vehcom.2017.01.002⟩. ⟨hal-01532780⟩
Accès au texte intégral et bibtex
https://hal.sorbonne-universite.fr/hal-01532780/file/jour_HH.pdf BibTex
ref_biblio
Fatma Hrizi, Anis Laouiti. Scalable and adaptive overlay for efficient forwarding in volunteer clouds. International Journal of Space-Based and Situated Computing, 2017, 7 (4), pp.217 - 228. ⟨10.1504/IJSSC.2017.089884⟩. ⟨hal-01729389⟩
Accès au bibtex
BibTex
ref_biblio
Dina Hussein Ali, Son N. Han, Gyu Myoung Lee, Noel Crespi, Emmanuel Bertin. Towards a dynamic discovery of smart services in the social internet of things. Computers and Electrical Engineering, 2017, 58, pp.429 - 443. ⟨10.1016/j.compeleceng.2016.12.008⟩. ⟨hal-01820961⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Emad Abd-Elrahman, Ahmed E.Kamal, Hossam Afifi. OPAC: an optimal placement algorithm for virtual CDN. Computer Networks, 2017, 120, pp.12 - 27. ⟨10.1016/j.comnet.2017.04.009⟩. ⟨hal-01740216⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. TrustCall: a trust computation model for web conversational services. IEEE Access, 2017, 5, pp.24376 - 24388. ⟨10.1109/ACCESS.2017.2764955⟩. ⟨hal-01661101⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
Accès au bibtex
BibTex
ref_biblio
Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. Virtualized network functions chaining and routing algorithms. Computer Networks, 2017, 114, pp.95 - 110. ⟨10.1016/j.comnet.2017.01.008⟩. ⟨hal-01471730⟩
Accès au bibtex
BibTex
ref_biblio
Ines Khoufi, Pascale Minet, Anis Laouiti, Saoucene Mahfoudh. Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges. International journal of autonomous and adaptive communications systems, 2017, 10 (4), pp.341-390. ⟨10.1504/IJAACS.2017.10009671⟩. ⟨hal-01095749⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-01095749/file/Survey.pdf BibTex
ref_biblio
Maryline Laurent. Pare-feu: le couteau suisse de la sécurité informatique. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
Accès au bibtex
BibTex
ref_biblio
Marouen Mechtri, Makhlouf Hadji, Djamal Zeghlache. Exact and heuristic resource mapping algorithms for distributed and hybrid clouds. IEEE Transactions on Cloud Computing, 2017, 5 (4), pp.681 - 696. ⟨10.1109/TCC.2015.2427192⟩. ⟨hal-01462097⟩
Accès au bibtex
BibTex
ref_biblio
Marouen Mechtri, Chaima Ghribi, Oussama Soualah, Djamal Zeghlache. NFV orchestration framework addressing SFC challenges. IEEE Communications Magazine, 2017, 55 (6), pp.16 - 23. ⟨10.1109/MCOM.2017.1601055⟩. ⟨hal-01629431⟩
Accès au bibtex
BibTex
ref_biblio
Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
Accès au bibtex
BibTex
ref_biblio
Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
Accès au bibtex
BibTex
ref_biblio
Ayesha Naeem, Rehmani Mubashir Husain, Yasir Saleem, Imran Rashid, Noel Crespi. Network coding in cognitive radio networks : a comprehensive survey. Communications Surveys and Tutorials, IEEE Communications Society, 2017, 19 (3), pp.1945 - 1973. ⟨10.1109/COMST.2017.2661861⟩. ⟨hal-01634173⟩
Accès au bibtex
BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Eftihia Nathanail, Noel Crespi. iTrip, a framework to enhance urban mobility by leveraging various data sources. Transportation Research Procedia, 2017, 24, pp.113 - 122. ⟨10.1016/j.trpro.2017.05.076⟩. ⟨hal-01711101⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01711101/file/1-s2.0-S2352146517303575-main.pdf BibTex
ref_biblio
Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security, 2017, 2017, pp.8-1 - 8-25. ⟨10.1186/s13635-017-0060-9⟩. ⟨hal-01701167⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01701167/file/18688.pdf BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
Accès au bibtex
BibTex
ref_biblio
Jose Manuel Sanchez Vilchez, Imen Grida Ben Yahia, Chidung Lac, Noel Crespi. Self-modeling based diagnosis of network services over programmable networks. International Journal of Network Management, 2017, 27 (2), pp.1 - 18. ⟨10.1002/nem.1964⟩. ⟨hal-01660651⟩
Accès au bibtex
BibTex
ref_biblio
Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh, Noel Crespi. NetSpam: a network-based spam detection framework for reviews in online social media. IEEE Transactions on Information Forensics and Security, 2017, 12 (7), pp.1585 - 1595. ⟨10.1109/TIFS.2017.2675361⟩. ⟨hal-01660695⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01660695/file/1703.03609.pdf BibTex
ref_biblio
Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, Meng Yao. Secure localization in the presence of colluders in WSNs. Sensors, 2017, 17 (8), pp.1892-1 - 1892-15. ⟨10.3390/s17081892⟩. ⟨hal-01701140⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01701140/file/18688.pdf BibTex
ref_biblio
Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des télécommunications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
Accès au bibtex
BibTex
ref_biblio
José Ignacio Tamayo Segarra, Bilal Al Jammal, Hakima Chaouchi. New IoT proximity service based heterogeneous RFID readers collision control. PSU research review, 2017, 1 (2), pp.127 - 149. ⟨10.1108/PRR-03-2017-0019⟩. ⟨hal-01646371⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Rebecca Copeland, Noel Crespi, Marc Emmelmann, Andreea Ancuta Corici, et al.. Cross-domain identity and discovery framework for web calling services. Annals of Telecommunications - annales des télécommunications, 2017, 72 (7-8), pp.459 - 468. ⟨10.1007/s12243-017-0587-2⟩. ⟨hal-01596116⟩
Accès au bibtex
BibTex

2016

ref_biblio
Ehsan Ahvar, Gyu Myoung Lee, Son Han, Noel Crespi, Imran Khan. Sensor network-based and user-friendly user location discovery for future smart homes. Sensors, 2016, 16 (7), pp.969-1 - 969-17. ⟨10.3390/s16070969⟩. ⟨hal-01419541⟩
Accès au bibtex
BibTex
ref_biblio
Fereshteh Asgari, Alexis Sultan, Haoyi Xiong, Vincent Gauthier, Mounim El Yacoubi. CT-Mapper: mapping sparse multimodal cellular trajectories using a multilayer transportation network. Computer Communications, 2016, 95, pp.69 - 81. ⟨10.1016/j.comcom.2016.04.014⟩. ⟨hal-01412950⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01412950/file/CTMapper.pdf BibTex
ref_biblio
Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Channel selection using a multiple radio model. Journal of Network and Computer Applications (JNCA), 2016, 64 (C), pp.113 - 123. ⟨10.1016/j.jnca.2016.01.021⟩. ⟨hal-01332350⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332350/file/preprint-jnca2016.pdf BibTex
ref_biblio
Asma Berriri, Natalia Kushik, Djamal Zeghlache. On using finite state models for optimizing and testing SDN controller components. Izvestiâ vysših učebnyh zavedenij. Fizika, 2016, 59 (8/2), pp.5 - 7. ⟨hal-01453257⟩
Accès au bibtex
BibTex
ref_biblio
Yuanfang Chen, Gyu Myoung Lee, Lei Shu, Noel Crespi. Industrial Internet of Things-based collaborative sensing intelligence: framework and research challenges. Sensors, 2016, 16 (215), pp.1 - 19. ⟨10.3390/s16020215⟩. ⟨hal-01275200⟩
Accès au bibtex
BibTex
ref_biblio
Reza Farahbakhsh, Angel Cuevas Rumin, Noel Crespi. Characterization of cross-posting activity for professional users across Facebook, Twitter and Google+. Social Network Analysis and Mining, 2016, 6 (1, article 33), ⟨10.1007/s13278-016-0336-y⟩. ⟨hal-01466243⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01466243/file/Characterization_SNAAM_2016_ps.pdf BibTex
ref_biblio
Xiao Han, Leye Wang, Reza Farahbakhsh, Angel Cuevas Rumin, Rubén Cuevas Rumin, et al.. CSD: a multi-user similarity metric for community recommendation in online social networks. Expert Systems with Applications, 2016, 53, pp.14 - 26. ⟨10.1016/j.eswa.2016.01.003⟩. ⟨hal-01263772⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01263772/file/CSD_ESWA_2016_ps.pdf BibTex
ref_biblio
Pinar Kirci, Hakima Chaouchi. Recursive and ad hoc routing based localization in wireless sensor networks. Computer Standards and Interfaces, 2016, 44, pp.258 - 263. ⟨10.1016/j.csi.2015.09.006⟩. ⟨hal-01272062⟩
Accès au bibtex
BibTex
ref_biblio
Antonio Manzalini, Noel Crespi. An edge operating system enabling anything-as-a-service. IEEE Communications Magazine, 2016, 54 (3), pp.62 - 67. ⟨10.1109/MCOM.2016.7432173⟩. ⟨hal-01331989⟩
Accès au bibtex
BibTex
ref_biblio
Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A scalable algorithm for the placement of service function chains. IEEE Transactions on Network and Service Management, 2016, 13 (3), pp.533 - 546. ⟨10.1109/TNSM.2016.2598068⟩. ⟨hal-01355234⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01355234/file/TNSM2598068-Eigen-official-1.pdf BibTex
ref_biblio
Warren Montgomery, Noel Crespi, Emmanuel Bertin. ICIN 2016 : innovations in clouds, internet, and networks. IEEE Communications Magazine, 2016, 54 (8), pp.8 - 8. ⟨10.1109/MCOM.2016.7537168⟩. ⟨hal-01445618⟩
Accès au bibtex
BibTex
ref_biblio
Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Hala Salloum. Semantic Smart Home System: OntoSmart to monitor and Assist habitant. International Journal of Computers and Communications, 2016, 10 (16), pp.78 - 86. ⟨hal-01323094⟩
Accès au bibtex
BibTex
ref_biblio
Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan. Semantic techniques for IoT data and service management: ONTOSMART system. International journal of wireless & mobile networks (IJWMN), 2016, 8 (4), pp.43 - 63. ⟨10.5121/ijwmn.2016.8403⟩. ⟨hal-01360124⟩
Accès au bibtex
BibTex
ref_biblio
Duy-Huy Nguyen, Hang Nguyen, Éric Renault. WE-MQS: A new LTE Downlink Scheduling Scheme for Voice Services based on User Perception. International Journal of Computer Applications, 2016, 142 (10), pp.28-36. ⟨10.5120/ijca2016909948⟩. ⟨hal-01319434⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01319434/file/nguyen-2016-ijca-909948.pdf BibTex
ref_biblio
Duy-Huy Nguyen, Hang Nguyen, Éric Renault. Predicting VoLTE Quality using Random Neural Network. International Journal of Applied Information Systems, 2016, 11 (3), pp.1-5. ⟨10.5120/ijais2016451587⟩. ⟨hal-01354061⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01354061/file/nguyen-2016-ijais-451587.pdf BibTex
ref_biblio
Adel Mounir Said, Michel Marot, Ashraf William Ibrahim, Hossam Afifi. Modeling interactive real-time applications in VANETs with performance evaluation. Computer Networks, 2016, 104, pp.66 - 78. ⟨10.1016/j.comnet.2016.04.021⟩. ⟨hal-01370160⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Hela Sfar, Joaquin Garcia-Alfaro. Reputation trust mechanism under the organizational-based access control model. Security and communication networks, 2016, 9 (18), pp.5295 - 5310. ⟨10.1002/sec.1698⟩. ⟨hal-01453259⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01453259/file/preprint_scm_2016.pdf BibTex
ref_biblio
Leye Wang, Daqing Zhang, Yasha Wang, Chao Chen, Xiao Han, et al.. Sparse mobile crowdsensing: challenges and opportunities. IEEE Communications Magazine, 2016, 54 (7), pp.161 - 167. ⟨10.1109/MCOM.2016.7509395⟩. ⟨hal-01346728⟩
Accès au bibtex
BibTex
ref_biblio
Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier, et al.. iCrowd: near-optimal task allocation for Piggyback Crowdsensing. IEEE Transactions on Mobile Computing, 2016, 15 (8), pp.2010 - 2022. ⟨10.1109/TMC.2015.2483505⟩. ⟨hal-01347999⟩
Accès au bibtex
BibTex

2015

ref_biblio
Joaquin Garcia-Alfaro, Francesco Longo, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2015, 47, pp.255 - 257. ⟨10.1016/j.compeleceng.2015.11.016⟩. ⟨hal-01332012⟩
Accès au bibtex
BibTex
ref_biblio
Jagadish Ghimire, Mehdi Mani, Noel Crespi, Teerapat Sanguankotchakorn. Delay and capacity analysis of structured P2P overlay for lookup service. Telecommunication Systems, 2015, 58 (1), pp.33 - 54. ⟨10.1007/s11235-014-9872-9⟩. ⟨hal-01285388⟩
Accès au bibtex
BibTex
ref_biblio
Xiao Han, Leye Wang, Noel Crespi, Soochang Park, Angel Cuevas Rumin. Alike people, alike interests? Inferring interest similarity in online social networks. Decision Support Systems, 2015, 69, pp.92 - 106. ⟨10.1016/j.dss.2014.11.008⟩. ⟨hal-01285379⟩
Accès au bibtex
BibTex
ref_biblio
Ngoc Son Han, Soochang Park, Gyu Myoung Lee, Noel Crespi. Extending the Devices Profile for Web Services (DPWS) standard using a REST proxy. IEEE Internet Computing, 2015, 19 (1), pp.10 - 17. ⟨10.1109/MIC.2014.44⟩. ⟨hal-01255144v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01255144/file/IC.DPWS.Proxy.Son.pdf BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Djamal Zeghlache. Exact multi-objective virtual network embedding in cloud environments. The Computer Journal, 2015, 58 (3), pp.403 - 415. ⟨10.1093/comjnl/bxu154⟩. ⟨hal-01281067⟩
Accès au bibtex
BibTex
ref_biblio
Dina Hussein Ali, Son Han, Gyu Myoung Lee, Noel Crespi. Social cloud-based cognitive reasoning for task-oriented recommendation. IEEE Cloud Computing, 2015, 2 (6), pp.10 - 19. ⟨10.1109/MCC.2015.117⟩. ⟨hal-01331993⟩
Accès au bibtex
BibTex
ref_biblio
Tien Anh Le, Hang Nguyen, Manh Cuong Nguyen. Application-Network Cross Layer Multi-variable Cost Function for Application Layer Multicast of Multimedia Delivery over Convergent Networks. Wireless Networks, 2015, 21 (8), pp.2677-2692. ⟨10.1007/s11276-015-0940-1⟩. ⟨hal-01271802⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01271802/file/WINE-D-14-00032.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Teresa Olivares, Fernando Royo, Noel Crespi, Luis Orozco Barbosa. Smart cross-layer protocol integration for efficient wireless communications. IJAHUC - International Journal of Ad Hoc and Ubiquitous Computing, 2015, 20 (3), pp.148 - 158. ⟨10.1504/IJAHUC.2015.073173⟩. ⟨hal-01344739⟩
Accès au bibtex
BibTex
ref_biblio
Mauro Sergio Pereira Fonseca, Anelise Munaretto, Christian Mendes, Hakima Chaouchi. A resource management framework for 802.11 wireless access networks. Wireless Networks, 2015, 21 (6), pp.1891 - 1898. ⟨10.1007/s11276-015-0893-4⟩. ⟨hal-01272105⟩
Accès au bibtex
BibTex
ref_biblio
Nisha Rani, Shiju Sathyadevan, Eric Renault, Viet Hai Ha. Comparison of checkpointed aided parallel execution against MapReduce. International Journal of Applied Engineering Research, 2015, 10 (11), pp.27513 - 27524. ⟨hal-01452289⟩
Accès au bibtex
BibTex
ref_biblio
Wendong Xiao, Apostolia Papapostolou, Hakima Chaouchi, Ming Wei. Self-organizing map for fingerprinting-based cooperative localization in dynamic indoor environments. Unmanned systems, 2015, 3 (3), pp.171 - 183. ⟨10.1142/S2301385015500119⟩. ⟨hal-01272356⟩
Accès au bibtex
BibTex

2014

ref_biblio
Maria Victoria Beltran Martinez, Emmanuel Bertin, Noel Crespi. User identity for WebRTC services: a matter of trust. IEEE Internet Computing, 2014, 18 (6), pp.18 - 25. ⟨10.1109/MIC.2014.128⟩. ⟨hal-01275214⟩
Accès au bibtex
BibTex
ref_biblio
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
Accès au bibtex
BibTex
ref_biblio
Yuanfang Chen, Lei Shu, Antonio Ortiz, Noel Crespi, Lin Lv. Locating in crowdsourcing-based dataSpace: wireless indoor localization without special devices. Mobile Networks and Applications, 2014, 19 (4), pp.534-542. ⟨10.1007/s11036-014-0517-8⟩. ⟨hal-02284568⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02284568/file/finalSubmitVersion_CR.pdf BibTex
ref_biblio
Yang Dingqi, Daqing Zhang, Zhiyong Yu, Zhiwen Yu, Djamal Zeghlache. SESAME: mining user digital footprints for fine-grained preference-aware social media search. ACM Transactions on Internet Technology, 2014, 14 (4), ⟨10.1145/2677209⟩. ⟨hal-01273645⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
Accès au bibtex
BibTex
ref_biblio
Xiao Han, Angel Cuevas Rumin, Noel Crespi, Rubén Cuevas Rumin, Xiaodi Huang. On exploiting social relationship and personal background for content discovery in P2P networks. Future Generation Computer Systems, 2014, 40, pp.17 - 29. ⟨10.1016/j.future.2014.06.007⟩. ⟨hal-01275204⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01275204/file/On%20Exploiting%20Social%20Relationship%20and%20Personal%20Background%20for%20Content%20Discovery%20in%20P2P%20Networks.pdf BibTex
ref_biblio
Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. On the similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on emerging telecommunications technologies, 2014, 25 (2), pp.151 - 154. ⟨10.1002/ett.2600⟩. ⟨hal-01286097⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Dina Hussein, Soochang Park, Son N.Han, Noel Crespi. The cluster between Internet of Things and social networks: review and research challenges. IEEE Internet of Things Journal, 2014, 1 (3), pp.206-215. ⟨10.1109/JIOT.2014.2318835⟩. ⟨hal-02284567⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02284567/file/IEEE-IoT-Journal-Camera-Ready.pdf BibTex
ref_biblio
Meriem Zerkouk, Paulo Armando Cavalcante Aguilar, Abdallah M'Hamed, Jérôme Boudy, Belhadri Messabih. Behavior and capability based access control model for personalized TeleHealthCare assistance. Mobile Networks and Applications, 2014, 19 (3), pp.392 - 403. ⟨10.1007/s11036-014-0516-9⟩. ⟨hal-01263236⟩
Accès au bibtex
BibTex

2013

ref_biblio
Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. Journal of Network and Computer Applications (JNCA), 2013, 36 (2), pp.744 - 755. ⟨10.1016/j.jnca.2012.12.013⟩. ⟨hal-00846121⟩
Accès au bibtex
BibTex
ref_biblio
Angel Cuevas Rumin, Manuel Uruena Pascual, Rubén Cuevas Rumin, Noel Crespi. Reduced overhead for intra-cluster and inter-cluster sensor-to-actor communications in IEEE 802.15.4 networks. IJAHUC - International Journal of Ad Hoc and Ubiquitous Computing, 2013, 14 (4), pp.215 - 225. ⟨10.1504/IJAHUC.2013.058502⟩. ⟨hal-01285950⟩
Accès au bibtex
BibTex
ref_biblio
Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Marechal. Context aware quality of experience for audio-visual service groups. IEEE Communications Letters, 2013, 8 (2), pp.9 - 11. ⟨hal-01299249⟩
Accès au bibtex
BibTex
ref_biblio
Inès Fakhfakh, Hongguang Zhang, Marc Girod-Genet. A P2P platform for collaborative aggregated multimedia sharing. Communications and Network, 2013, 5 (3C), pp.529 - 543. ⟨10.4236/cn.2013.53B2097⟩. ⟨hal-01269726⟩
Accès au bibtex
BibTex
ref_biblio
Reza Farahbakhsh, Noel Crespi, Angel Cuevas Rumin, Rubén Cuevas Rumin, Roberto Gonzalez Sanchez. Understanding the evolution of multimedia content in the Internet through BitTorrent glasses. IEEE Network, 2013, 27 (6), pp.80 - 88. ⟨10.1109/MNET.2013.6678931⟩. ⟨hal-01286029⟩
Accès au bibtex
https://arxiv.org/pdf/1705.00548 BibTex
ref_biblio
Khalil Ur Rehman Laghari, Tiago H. Falk, Mansoor Hyder, Michael Haun, Christian Hoene, et al.. An investigation into the relationship between perceived quality-of-experience and virtual acoustic environments : the case of 3D audio telephony. Journal of Universal Computer Science, 2013, 19 (12), pp.1718 - 1735. ⟨10.3217/jucs-019-12-1718⟩. ⟨hal-01279195⟩
Accès au bibtex
BibTex

2012

ref_biblio
Ahmed Soua, Walid Ben-Ameur, Hossam Afifi. Enhancing Broadcast Vehicular Communications Using Beamforming Technique. International Workshop on Vehicular Communications and Networking (VECON), 2012, pp.565. ⟨hal-00761075⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00761075/file/p565-soua.pdf BibTex
ref_biblio
Syue-Ju Syue, Chin-Liang Wang, Teck Aguilar, Vincent Gauthier, Hossam Afifi. Cooperative geographic routing with radio coverage extension for SER-constrained wireless relay networks. IEEE Journal on Selected Areas in Communications, 2012, 30 (2), pp.271 - 279. ⟨10.1109/JSAC.2012.120205⟩. ⟨hal-01306762⟩
Accès au bibtex
BibTex

2011

ref_biblio
Pierre Abi-Char, Bachar El Hassan, Abdallah M'Hamed. An enhanced authenticated key agreement protocol with a neural network-based model for joining-phase in mobile environments. International journal of engineering and industries (IJEI), 2011, 2 (2), pp.103 - 112. ⟨10.4156/ijei.vol2.issue2.11⟩. ⟨hal-01464417⟩
Accès au bibtex
BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Walid Ben-Ameur, Djamal Zeghlache. Virtual network provisioning across multiple substrate networks. Computer Networks, 2011, 55 (4), pp.1011 - 1023. ⟨10.1016/j.comnet.2010.12.011⟩. ⟨hal-01354751⟩
Accès au bibtex
BibTex

2010

ref_biblio
Tara Ali Yahiya, Hakima Chaouchi. Fractional frequency reuse for hierarchical resource allocation in mobile WiMAX networks. EURASIP Journal on Wireless Communications and Networking, 2010, 2010, pp.1 - 7. ⟨10.1155/2010/363065⟩. ⟨hal-01306148⟩
Accès au bibtex
BibTex
ref_biblio
Ebtisam Amar, Selma Boumerdassi, Eric Renault. Hierarchical location service with prediction in mobile ad-hoc networks. International Journal of Computer Networks & Communications , 2010, 2 (2), pp.59 - 72. ⟨hal-01356188⟩
Accès au bibtex
BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. Sécurité dans les réseaux 802.11. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2010, TE7377. ⟨hal-01355251⟩
Accès au bibtex
BibTex
ref_biblio
Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers and Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00496002/file/article.pdf BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers and Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Badii Jouaber, Djamal Zeghlache. Topology control and routing in large scale wireless sensor networks. Wireless Sensor Network, 2010, 2 (8), pp.584 - 598. ⟨10.4236/wsn.2010.28070⟩. ⟨hal-01355079⟩
Accès au bibtex
BibTex

2009

ref_biblio
Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00472911/file/383517.pdf BibTex
ref_biblio
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00506549/file/Annales-EAP-EHASH-oct2009.pdf BibTex
ref_biblio
Noel Crespi. Converging web 2.0 with telecommunications. eStrategies projects, 2009, 10, pp.108 - 109. ⟨hal-01357437⟩
Accès au bibtex
BibTex
ref_biblio
Khalil Ur Rehman Laghari, Imen Grida Ben Yahia, Noel Crespi. Analysis of telecommunication management technologies. MASAUM journal of reviews and surveys (MJRS), 2009, 1 (2), pp.152 - 166. ⟨hal-00434496⟩
Accès au bibtex
BibTex

2008

ref_biblio
Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 14. ⟨hal-01355033⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Making the most of mobile service architecture. eStrategies projects, 2008. ⟨hal-00435111⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, N. Boulahia-Cuppens, F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 2008, 7 (2), pp.103-122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-03628752⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi. Des réseaux ad hoc économiquement viables. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 11. ⟨hal-01355035⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent. Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent. Sécurité des systèmes P2P de sauvegarde distribuée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 16. ⟨hal-01355031⟩
Accès au bibtex
BibTex
ref_biblio
Wajdi Louati, Ines Louati-Houidi, M. Kharrat, Djamal Zeghlache, Hormuzd M. Khosravi. Dynamic service deployment in a distributed heterogeneous cluster based router (DHCR). Cluster Computing, 2008, 11 (4), pp.355 - 372. ⟨10.1007/s10586-008-0056-9⟩. ⟨hal-01372423⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Mani, Noel Crespi. How IMS enables converged services for cable and 3G technologies : a survey. EURASIP Journal on Wireless Communications and Networking, 2008, 8 (3), pp.1 - 14. ⟨10.1155/2008/589623⟩. ⟨hal-00435065⟩
Accès au bibtex
BibTex

2007

ref_biblio
Maryline Laurent. Les architectures de fédération d'identité et la garantie de notre vie privée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2007, 9. ⟨hal-01355037⟩
Accès au bibtex
BibTex

2006

ref_biblio
Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquin Garcia‐alfaro, Sylvain Gombault, et al.. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197-217. ⟨10.1007/BF03219974⟩. ⟨hal-03646855⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03646855/file/annales06-JGA.pdf BibTex

2005

ref_biblio
Joaquin Garcia‐alfaro, Sergio Castillo, Guillermo Navarro-Arribas, Joan Borrell. ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System. International Journal of Computer Science and Network Security, 2005, 5 (11), pp.87-94. ⟨hal-03628711⟩
Accès au bibtex
BibTex

2003

ref_biblio
Maryline Laurent. Protocole IPsec. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2003, TE7545. ⟨hal-01331303⟩
Accès au bibtex
BibTex

Conference papers

2023

ref_biblio
Amirhesam Badeanlou, Andrea Araldo, Marco Diana, Vincent Gauthier. Equity Scores for Public Transit Lines from Open-Data and Accessibility Measures. Transportation Research Board (TRB) 102nd Annual Meeting, TRB, Jan 2023, Washington, United States. ⟨hal-03803816⟩
Accès au bibtex
https://arxiv.org/pdf/2210.00128 BibTex
ref_biblio
Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. User profile and mobile number portability for beyond 5G: blockchain-based solution. 26th Conference on Innovation in Clouds, Internet and Networks (ICIN), Mar 2023, Paris, France. ⟨10.1109/ICIN56760.2023.10073486⟩. ⟨hal-04003862⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04003862/file/ICIN.pdf BibTex
ref_biblio
Amir Reza Jafari, Reza Farahbakhsh, Mostafa Salehi, Noel Crespi. Language-Agnostic Method for Sentiment Analysis of Twitter. 4th International Conference on Data Analytics & Management (ICDAM-2023), Jun 2023, London, United Kingdom. ⟨10.1007/978-981-99-6547-2_46⟩. ⟨hal-04143558v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04143558/file/Amir_Language_Agnostic_Sentiment_Analysis_in_Social_Media__team_Version__.pdf BibTex
ref_biblio
Khouloud Mnassri, Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Hate speech and offensive language detection using an emotion-aware shared encoder. IEEE International Conference on Communications (ICC), May 2023, Roma, Italy, France. ⟨10.1109/ICC45041.2023.10279690⟩. ⟨hal-04003849⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04003849/file/2302.08777%20%281%29.pdf BibTex
ref_biblio
Sara Ranjbaran, Amir Reza Jafari, Noel Crespi. Socially aware multi-resource trading for IoT applications in smart cities using auction theory. Conference on Cloud and Internet of Things (CIoT), Mar 2023, Lisbon (Portugal), Portugal. ⟨10.1109/CIoT57267.2023.10084895⟩. ⟨hal-04012323⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04012323/file/m73445-ranjbaran%20final%20%283%29.pdf BibTex

2022

ref_biblio
Andrea Araldo, André Depalma, Souhila Arib, Vincent Gauthier, Romain Sere, et al.. Pooling for first and last mile: integrating carpooling and transit. hEART 2022: 10th symposium of the European Association for Research in Transportation, Jun 2022, Leuven, Belgium. ⟨hal-03698443⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03698443/file/heart_conference.pdf BibTex
ref_biblio
Nischal Aryal, Fariba Ghaffari, Saeid Rezaei, Emmanuel Bertin, Noel Crespi. Private cellular network deployment: comparison of openAirInterface with magma core. 2022 18th International Conference on Network and Service Management (CNSM), Oct 2022, Thessaloniki, Greece. pp.364-366, ⟨10.23919/CNSM55787.2022.9964713⟩. ⟨hal-03959478⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03959478/file/CNSM2022.pdf BibTex
ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04055085/file/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf BibTex
ref_biblio
Fetia Bannour, Stefania Dumbrava, Alex Danduran--Lembezat. GOX: towards a scalable graph database-driven SDN controller. 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), Politecnico di Milano, Jun 2022, Milan, Italy. pp.278-280, ⟨10.1109/NetSoft54395.2022.9844075⟩. ⟨hal-03801233⟩
Accès au bibtex
BibTex
ref_biblio
Fetia Bannour, Stefania Dumbrava, Damien Lu. A flexible GraphQL northbound API for intent-based SDN applications. 2022 IEEE/IFIP Network Operations and Management Symposium(NOMS), Apr 2022, Budapest, Hungary. pp.1-5, ⟨10.1109/NOMS54207.2022.9789785⟩. ⟨hal-03801341⟩
Accès au bibtex
BibTex
ref_biblio
Sandrine Bayle, Joaquin Garcia‐alfaro. Plateforme de sécurisation des villes: le projet européen IMPETUS. Colloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France. ⟨emse-03624167⟩
Accès au bibtex
BibTex
ref_biblio
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. Untangling the overlap between Blockchain and DLTs. SAI 2022: Computing Conference, Jul 2022, London (online), United Kingdom. pp.483-505, ⟨10.1007/978-3-031-10467-1_30⟩. ⟨hal-03609510⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03609510/file/SAI_Paper_Format_Latex_Conference.pdf BibTex
ref_biblio
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. SOK: a comprehensive survey on distributed ledger technologies. ICBC 2022 : IEEE International Conference on Blockchain and Cryptocurrency, May 2022, Shanghai, China. pp.1-16, ⟨10.1109/ICBC54727.2022.9805533⟩. ⟨hal-03609651⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03609651/file/ICBC_CONF_2022.pdf BibTex
ref_biblio
Najoua Benalaya, Cedric Adjih, Anis Laouiti, Ichrak Amdouni, Leila Saidane. UAV search path planning for livestock monitoring. 2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN), Nov 2022, Rome, Italy. pp.1-6, ⟨10.23919/PEMWN56085.2022.9963839⟩. ⟨hal-03935450⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-03935450/file/Uav_search_path_planning_for_livestock_monitoring.pdf BibTex
ref_biblio
Antoine Bernard, Mohammed Laroui, Michel Marot, Sandoche Balakrichenan, Hassine Moungla, et al.. Prefetching of mobile devices information: a DNS perspective. ICC2022: IEEE International Conference on Communications, IEEE, May 2022, Seoul, South Korea. pp.1-7, ⟨10.1109/ICC45855.2022.9838564⟩. ⟨hal-03431410v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03431410/file/Prefetching___Conf___Camera_Ready.pdf BibTex
ref_biblio
Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. Blockchain-based user profile and mobile number portability for beyond 5G mobile communication networks. 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Sep 2022, Paris, France. pp.75-78, ⟨10.1109/BRAINS55737.2022.9908596⟩. ⟨hal-03959391⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03959391/file/BRAINS.pdf BibTex
ref_biblio
Komal Gilani, Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. Self-sovereign identity management framework using smart contracts. NOMS 2022: IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-7, ⟨10.1109/NOMS54207.2022.9789831⟩. ⟨hal-03563470⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03563470/file/Self-sovereign%20Identity%20Management%20Framework%20using%20Smart%20Contracts%20%281%29.pdf BibTex
ref_biblio
Jialin Hao, Rola Naja, Djamal Zeghlache. Drone-assisted lane change maneuver using reinforcement learning with dynamic reward function. IEEE 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2022, Thessaloniki, Greece. pp.314-320, ⟨10.1109/WiMob55322.2022.9941534⟩. ⟨hal-03887747⟩
Accès au bibtex
BibTex
ref_biblio
Omar Houidi, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, et al.. Constrained deep reinforcement learning for smart load balancing. 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Jan 2022, Las Vegas (Virtual), United States. pp.207-215, ⟨10.1109/CCNC49033.2022.9700657⟩. ⟨hal-03889321⟩
Accès au bibtex
BibTex
ref_biblio
Omar Houidi, Sihem Bakri, Djamal Zeghlache. Multi-agent graph convolutional reinforcement learning for intelligent load balancing. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium(NOMS), Apr 2022, Budapest, Hungary. pp.1-6, ⟨10.1109/NOMS54207.2022.9789872⟩. ⟨hal-03887748⟩
Accès au bibtex
BibTex
ref_biblio
Wei Huang, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber. Dimensioning resources of network slices for energy-performance trade-off. ISCC 2022 : 27th IEEE Symposium on Computers and Communications, Jun 2022, Rhodes Island, Greece. ⟨10.1109/ISCC55528.2022.9912821⟩. ⟨hal-03662552⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03662552/file/2022080596%20%282%29.pdf BibTex
ref_biblio
Khouloud Hwerbi, Najoua Benalaya, Ichrak Amdouni, Anis Laouiti, Cédric Adjih, et al.. A Survey on the opportunities of blockchain and UAVs in agriculture. PEMWN 2022 - The 11th IFIP/IEEE international conference on performance evaluation and modeling in wired and wireless networks, Nov 2022, Rome, Italy. pp.1-6, ⟨10.23919/PEMWN56085.2022.9963871⟩. ⟨hal-03935440⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-03935440/file/Opportunities_on_Blockchain_and_UAV_in_Agriculture__a_Survey.pdf BibTex
ref_biblio
Imen Jerbi, Nour Assy, Mohamed Sellami, Sami Bhiri, Olivier Tirat, et al.. Enabling multi-provider cloud network service bundling. 2022 IEEE International Conference on Web Services (ICWS), Jul 2022, Barcelona, Spain. pp.405-414, ⟨10.1109/ICWS55610.2022.00067⟩. ⟨hal-03782791⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03782791/file/conference_latex_template_10_17_19__3_%20%281%29.pdf BibTex
ref_biblio
Maya Kassis, Massinissa Ait Aba, Hind Castel-Taleb, Maxime Elkael, Andrea Araldo, et al.. Integrated deployment prototype for virtual network orchestration solution. NOMS 2022: IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-3, ⟨10.1109/NOMS54207.2022.9789812⟩. ⟨hal-03695139⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03695139/file/Noms2022_demo_paper.pdf BibTex
ref_biblio
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Detecting APT through graph anomaly detection. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675346⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03675346/file/tmpz65x_ciq_RESSI_2022.pdf BibTex
ref_biblio
Khouloud Mnassri, Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. BERT-based ensemble approaches for hate speech detection. 2022 IEEE Global Communications Conference (GLOBECOM ), Dec 2022, Rio de Janeiro, Brazil. pp.4649-4654, ⟨10.1109/GLOBECOM48099.2022.10001325⟩. ⟨hal-04002300⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04002300/file/2209.06505.pdf BibTex
ref_biblio
Meroua Moussaoui, Nischal Aryal, Emmanuel Bertin, Noel Crespi. Distributed ledger technologies for cellular networks and beyond 5G: a survey. 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Sep 2022, Paris, France. pp.37-44, ⟨10.1109/BRAINS55737.2022.9908598⟩. ⟨hal-04005544⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04005544/file/DLT-camera-ready.pdf BibTex
ref_biblio
Meroua Moussaoui, Emmanuel Bertin, Noel Crespi. Telecom business models for beyond 5G and 6G networks: towards disaggregation?. 2022 1st International Conference on 6G Networking (6GNet), Jul 2022, Paris, France. pp.1-8, ⟨10.1109/6GNet54646.2022.9830514⟩. ⟨hal-04005533⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04005533/file/Camera_ready4-1.pdf BibTex
ref_biblio
Erick Petersen, Jorge Lopez, Natalia Kushik, Claude Poletti, Djamal Zeghlache. On using cellular automata for modeling the evolution of dynamic-link network parameters. 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA), Dec 2022, Boston, United States. pp.297-301, ⟨10.1109/NCA57778.2022.10013557⟩. ⟨hal-03953846⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03953846/file/CellularAutomata_NCA2022-4.pdf BibTex
ref_biblio
Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache. Dynamic link network emulation: a model-based design. 17th International Conference on Evaluation of Novel Approaches to Software Engineering, Apr 2022, Online Streaming, France. pp.536-543, ⟨10.5220/0011091100003176⟩. ⟨hal-03953769⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03953769/file/ENASE2022-3.pdf BibTex
ref_biblio
Huy Tran Quang, Omar Houidi, Javier Errea-Moreno, Dominique Verchère, Djamal Zeghlache. MAGC-RSA: multi-agent graph convolutional reinforcement learning for distributed routing and spectrum assignment in elastic optical networks. 2022 European Conference on Optical Communication (ECOC), Sep 2022, Basel, Switzerland. pp.Mo4B.3. ⟨hal-03973109⟩
Accès au bibtex
BibTex
ref_biblio
Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675359⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03675359/file/tmp13_94k46_HowToEvaluateNetworkTrafficGeneration.pdf BibTex

2021

ref_biblio
Reda Ayassi, Ahmed Triki, Maxime Laye, Esther Le Rouzic, Noel Crespi, et al.. Bayesian optimization-based algorithm to improve the quality of transmission estimation. Advanced Photonics Conference 2021, Jul 2021, Washington DC (virtual), United States. pp.NeF2B.3, ⟨10.1364/NETWORKS.2021.NeF2B.3⟩. ⟨hal-03254064⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03254064/file/APC_Submission_Ayassi_09_05.pdf BibTex
ref_biblio
Sandoche Balakrichenan, Antoine Bernard, Michel Marot, Benoit Ampeau. IoTRoam: design and implementation of an open LoRaWAN roaming architecture. IEEE Global Communications Conference (GLOBECOM), Dec 2021, Madrid, Spain. ⟨hal-03100628v3⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03100628/file/GlobeCommIoTRoam.pdf BibTex
ref_biblio
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. DCEA: a reference model for distributed ledger technologies. ICBC 2021: IEEE International Conference on Blockchain and Cryptocurrency, May 2021, Sydney (online), Australia. pp.1-2, ⟨10.1109/ICBC51069.2021.9461129⟩. ⟨hal-03168829⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03168829/file/ICBC_POSTER.pdf BibTex
ref_biblio
Antoine Bernard, Aicha Dridi, Michel Marot, Hossam Afifi, Sandoche Balakrichenan. Embedding ML algorithms onto LPWAN sensors for compressed communications. PIMRC 2021: 32nd International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2021, Helsinki (virtual), Finland. pp.1539-1545, ⟨10.1109/PIMRC50174.2021.9569714⟩. ⟨hal-03312481⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03312481/file/Embedding_ML_Algorithms_onto_LPWAN_Sensors_for_Compressed_Communications%283%29.pdf BibTex
ref_biblio
Chérifa Boucetta, Boubakr Nour, Albéric Cusin, Hassine Moungla. QoS in IoT networks based on link quality prediction. IEEE International Conference on Communications (ICC), 2021, Montreal (virtual), Canada. pp.1-7, ⟨10.1109/ICC42927.2021.9500396⟩. ⟨hal-03162826⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03162826/file/BoucettaICC2021.pdf BibTex
ref_biblio
Igor Burdonov, Alexandre Kossachev, Nina Yevtushenko, Jorge López, Natalia Kushik, et al.. Preventive model-based verification and repairing for SDN requests. ENASE 2021: 16th International Conference on Evaluation of Novel Approaches to Software Engineering, Apr 2021, Online, France. pp.421-428, ⟨10.5220/0010494504210428⟩. ⟨hal-03549088⟩
Accès au bibtex
https://arxiv.org/pdf/1906.03101 BibTex
ref_biblio
Aicha Dridi, Hossam Afifi, Hassine Moungla, Chérifa Boucetta. Transfer learning for classification and prediction of time series for next generation networks. IEEE International Conference on Communications (ICC), 2021, Montreal (virtual), Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500507⟩. ⟨hal-03323896⟩
Accès au bibtex
BibTex
ref_biblio
Hassan Fawaz, Djamal Zeghlache, Quang Tran Anh Pham, Leguay Jérémie, Medagliani Paolo. Deep reinforcement learning for smart queue management. NETSYS 2021: Conference on Networked Systems 2021, TU Berlin, Sep 2021, Lübeck (online), Germany. pp.1-14, ⟨10.14279/tuj.eceasst.80.1139⟩. ⟨hal-03546621⟩
Accès au bibtex
BibTex
ref_biblio
Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. A novel approach for network resource sharing via blockchain. SIGCOMM 2021: ACM Special Interest Group on Data Communication, Aug 2021, Virtual, Unknown Region. pp.50-52, ⟨10.1145/3472716.3472867⟩. ⟨hal-03277501⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03277501/file/A%20Novel%20Approach%20for%20Network%20Resource%20Sharing%20via%20Blockchain.pdf BibTex
ref_biblio
Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based privacy aware distributed access management framework for industry 4.0. WETICE 2021: IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, Oct 2021, Bayonne (online), France. pp.51-56, ⟨10.1109/WETICE53228.2021.00021⟩. ⟨hal-03591078⟩
Accès au bibtex
BibTex
ref_biblio
Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
Accès au bibtex
https://arxiv.org/pdf/2109.11340 BibTex
ref_biblio
Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Ontology-based attack graph enrichment. TIEMS 2021: 28th International Emergency Management Society annual conference, Dec 2021, Online, France. ⟨hal-03628443⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628443/file/preprint-tiems2021a.pdf BibTex
ref_biblio
Oussama Serhane, Khadidja Yahyaoui, Boubakr Nour, Hassine Moungla. Energy-aware Cache Placement Scheme for IoT-based ICN Networks. ICC 2021: IEEE International Conference on Communications, Jun 2021, Montreal (virtual), Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500341⟩. ⟨hal-03161227⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03161227/file/1570690586.pdf BibTex

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar. Automated saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
Accès au bibtex
BibTex
ref_biblio
Reda Ayassi, Ahmed Triki, M Laye, Noel Crespi, Roberto Minerva, et al.. An overview on machine learning-based solutions to improve lightpath QoT estimation. ICTON 2020: 22nd International Conference on Transparent Optical Networks, Jul 2020, Bari (online), Italy. pp.1-4, ⟨10.1109/ICTON51198.2020.9203755⟩. ⟨hal-03161225⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03161225/file/ICTON_Submission_Ayassi_15_07.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Capacity requirements in networks of quantum repeaters and terminals. QCE 2020: IEEE International Conference on Quantum Computing and Engineering, Oct 2020, Denver (online), United States. pp.148-157, ⟨10.1109/QCE49297.2020.00028⟩. ⟨hal-03125753⟩
Accès au bibtex
BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Geocaching-inspired navigation for micro aerial vehicles with fallible place recognition. ADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless, Oct 2020, Bari (online), Italy. pp.55-70, ⟨10.1007/978-3-030-61746-2_5⟩. ⟨hal-03125760⟩
Accès au bibtex
BibTex
ref_biblio
Michel Barbeau, Frederic Cuppens, Nora Cuppens, Dagnas, Romain, Joaquin Garcia‐alfaro. Metrics to enhance the resilience of cyber-physical systems. TRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Dec 2020, Guangzhou (online), China. pp.1167-1172, ⟨10.1109/TrustCom50675.2020.00156⟩. ⟨hal-03125741⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03125741/file/Metrics_to_Enhance_the_Resilience_of_Cyber-Physical_Systems.pdf BibTex
ref_biblio
Antoine Bernard, Sandoche Balakrichenan, Michel Marot, Benoit Ampeau. DNS-based dynamic context resolution for SCHC. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin (online), Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148910⟩. ⟨hal-03122177⟩
Accès au bibtex
BibTex
ref_biblio
Chérifa Boucetta, Aicha Dridi, Hossam Afifi, Ahmed Kamal, Hassine Moungla. Heuristic optimization algorithms for QoS management in UAV assisted cellular networks. IEEE Global Communications Conference (GLOBECOM), 2020, Taipei, Taiwan. pp.1-6, ⟨10.1109/GLOBECOM42002.2020.9322243⟩. ⟨hal-03135729⟩
Accès au bibtex
BibTex
ref_biblio
François Contat, Grégory Bénassy, Julien Buttin Le Meur, Olivier Levillain. Que faut-il attendre de DNS-over-HTTPS ?. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114209⟩
Accès au bibtex
BibTex
ref_biblio
Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02910407/file/paper.pdf BibTex
ref_biblio
Aida Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
Accès au bibtex
BibTex
ref_biblio
Abou-Bakr Djaker, Bouabdellah Kechar, Hatem Ibn-Khedher, Hassine Moungla, Hossam Afifi. Scalable and cost efficient maximum concurrent flow over IoT using reinforcement learning. IWCMC 2020: 16th International Wireless Communications and Mobile Computing conference, Jun 2020, Limassol (online), Cyprus. pp.539-544, ⟨10.1109/IWCMC48107.2020.9148257⟩. ⟨hal-03119533⟩
Accès au bibtex
BibTex
ref_biblio
Abou-Bakr Djaker, Bouabdellah Kechar, Hossam Afifi, Hassine Moungla. A maximum concurrent flow technique for optimized data routing in IoT architectures. CCNC 2020: 17th annual Consumer Communications & Networking Conference, Jan 2020, Las Vegas, United States. pp.1-2, ⟨10.1109/CCNC46108.2020.9045575⟩. ⟨hal-03119535⟩
Accès au bibtex
BibTex
ref_biblio
Aicha Dridi, Hatem Khedher, Hassine Moungla, Hossam Afifi. An artificial intelligence approach for time series next generation applications. 2020 IEEE International Conference on Communications (ICC 2020), Jun 2020, Dublin (online), Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148931⟩. ⟨hal-03135754⟩
Accès au bibtex
BibTex
ref_biblio
Aicha Dridi, Hassine Moungla, Hossam Afifi, Jordi Badosa, Florence Ossart, et al.. Machine learning application to priority scheduling in smart microgrids. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (online), Cyprus. pp.1695-1700, ⟨10.1109/IWCMC48107.2020.9148096⟩. ⟨hal-03135745⟩
Accès au bibtex
BibTex
ref_biblio
Omair Faraj, David Megias, Abdel-Mehsen Ahmad, Joaquin Garcia‐alfaro. Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. ARES 2020: 15th international conference on Availability, Reliability and Security, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, ⟨10.1145/3407023.3407048⟩. ⟨hal-03125767⟩
Accès au bibtex
BibTex
ref_biblio
Fariba Ghaffari, Emamnuel Bertin, Julien Hatin, Noel Crespi. Authentication and access control based on distributed ledger technology: A survey. BRAINS 2020: 2nd conference on Blockchain Research & Applications for Innovative Networks and Services, Sep 2020, Paris (online), France. pp.79-86, ⟨10.1109/BRAINS49436.2020.9223297⟩. ⟨hal-02963841⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02963841/file/2.pdf BibTex
ref_biblio
Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi. A survey on blockchain-based identity management and decentralized privacy for personal data. BRAIN 2020: 2nd conference on Blockchain Research & Applications for Innovative Networks and Services, Sep 2020, Paris, France. pp.97-101, ⟨10.1109/BRAINS49436.2020.9223312⟩. ⟨hal-02650705⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02650705/file/BRAIN20_270520_Komal.pdf BibTex
ref_biblio
Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache. An enhanced reinforcement learning approach for dynamic placement of virtual network functions. IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications(PIMRC), Aug 2020, London, United Kingdom. ⟨10.1109/PIMRC48278.2020.9217250⟩. ⟨hal-03973124⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991163/file/SECRYPT2020_ProvSGX.pdf BibTex
ref_biblio
Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991100/file/_SAC2020_DADS_Priv_Preserv_Search.pdf BibTex
ref_biblio
Maxime Labonne, Alexis Olivereau, Baptiste Polve, Djamal Zeghlache. Unsupervised protocol-based intrusion detection for real-world networks. ICNC 2020: International Conference on Computing, Networking and Communications, Feb 2020, Big Island, United States. pp.299-303, ⟨10.1109/ICNC47757.2020.9049796⟩. ⟨cea-02555669⟩
Accès au bibtex
BibTex
ref_biblio
Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin. An Event-B based approach for formal modelling and verification of smart contracts. AINA 2020: 34th International Conference on Advanced Information Networking and Applications, Apr 2020, Caserta, Italy. pp.1303-1318, ⟨10.1007/978-3-030-44041-1_111⟩. ⟨hal-02928201⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02928201/file/formal_verification_of_smart_contracts%20%281%29.pdf BibTex
ref_biblio
Mohammed Laroui, Moussa Ali Cherif, Hatem Khedher, Hassine Moungla, Hossam Afifi. Scalable and cost efficient resource allocation algorithms using deep reinforcement learning. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (online), Cyprus. pp.946-951, ⟨10.1109/IWCMC48107.2020.9148286⟩. ⟨hal-03135751⟩
Accès au bibtex
BibTex
ref_biblio
Mohammed Laroui, Hatem Khedher, Hassine Moungla, Hossam Afifi, Ahmed Kamal. Virtual Mobile Edge Computing based on IoT devices resources in smart cities. 2020 IEEE International Conference on Communications (ICC 2020), Jun 2020, Dublin, Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148982⟩. ⟨hal-03114379⟩
Accès au bibtex
BibTex
ref_biblio
Mohammed Laroui, Boubakr Nour, Hassine Moungla, Hossam Afifi, Moussa Ali Cherif. Mobile vehicular edge computing architecture using rideshare taxis as a mobile edge server. CCNC 2020: IEEE 17th Annual Consumer Communications & Networking Conference, Jan 2020, Las Vegas, United States. pp.1-2, ⟨10.1109/CCNC46108.2020.9045741⟩. ⟨hal-03163225⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03163225/file/Poster_CCNC.pdf BibTex
ref_biblio
Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services: an application to demand response protocols. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain. GASP: a Generic Approach to Secure network Protocols. RESSI 2020: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Evry (online), France. ⟨hal-03114203⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain. Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits. CRiSIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris (en ligne), France. pp.87-104, ⟨10.1007/978-3-030-68887-5_5⟩. ⟨hal-03114218⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03114218/file/document.pdf BibTex
ref_biblio
Ingrid Moerman, Djamal Zeghlache, Adnan Shahid, Joao Santos, Luiz Dasilva, et al.. Mandate-driven networking eco-system: a paradigm shift in end-to-end communications. 6G SUMMIT: 2nd 6G wireless summit, Mar 2020, Levi (online), Finland. pp.1-6, ⟨10.1109/6GSUMMIT49458.2020.9083766⟩. ⟨hal-03119386⟩
Accès au bibtex
BibTex
ref_biblio
Naman Negi, Ons Jelassi, Hakima Chaouchi, Stéphan Clémençon. Distributed online Data Anomaly Detection for connected vehicles. ICAIIC 2020: 2nd International Conference on Artificial Intelligence in Information and Communication, Feb 2020, Fukuoka, Japan. pp.494-500, ⟨10.1109/ICAIIC48513.2020.9065280⟩. ⟨hal-03126876⟩
Accès au bibtex
BibTex
ref_biblio
Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. LockDown: balance availability attack against lightning network channels. FC 2020: 24th international conference on Financial Cryptography and Data Security, Feb 2020, Sabah, Malaysia. pp.245-263, ⟨10.1007/978-3-030-51280-4_14⟩. ⟨hal-03125777⟩
Accès au bibtex
BibTex
ref_biblio
Aina Toky Rasoamanana, Olivier Levillain. Wombat : one more Bleichenbacher toolkit. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114212⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩. ⟨hal-03115317⟩
Accès au bibtex
BibTex
ref_biblio
Abdallah Sobehy, Eric Renault, Paul Mühlethaler. CSI-MIMO: K-nearest neighbor applied to indoor localization. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin / Virtual, Ireland. pp.1-6. ⟨hal-02491175⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02491175/file/K_nearest_Neighbour_for_CSI_based_Indoor_Localization_submission_2.pdf BibTex
ref_biblio
Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sarah Akbarzadeh. Split analysis and fronthaul dimensioning in 5G C-RAN to guarantee ultra low latency. CCNC 2020: IEEE 17th Annual Consumer Communications Networking Conference, Jan 2020, Las Vegas, United States. pp.1-4, ⟨10.1109/CCNC46108.2020.9045398⟩. ⟨hal-03116035⟩
Accès au bibtex
BibTex
ref_biblio
Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh. A new lower cost UL split option for ultra-low latency 5G fronthaul. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (virtual), Cyprus. pp.1872-1878, ⟨10.1109/IWCMC48107.2020.9148420⟩. ⟨hal-03116112⟩
Accès au bibtex
BibTex
ref_biblio
Clement Weill, Alexis Olivereau, Djamal Zeghlache. Configuration of the detection function in a distributed IDS using game theory. ICIN 2020: 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris (online), France. pp.210-215, ⟨10.1109/ICIN48450.2020.9059373⟩. ⟨hal-03119389⟩
Accès au bibtex
BibTex
ref_biblio
Koosha Zarei, Damilola Ibosiola, Reza Farahbakhsh, Zafar Gilani, Kiran Garimella, et al.. Characterising and detecting sponsored influencer posts on Instagram. ASONAM 2020: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Dec 2020, The Hague (virtual), Netherlands. pp.327-331, ⟨10.1109/ASONAM49781.2020.9381309⟩. ⟨hal-03044105⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03044105/file/2011.05757.pdf BibTex
ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi. How impersonators exploit Instagram to generate fake engagement?. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin, Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9149431⟩. ⟨hal-02459825⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02459825/file/Koosha.pdf BibTex
ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. Impersonation on social media: a deep neural approach to identify ingenuine content. ASONAM 2020: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Dec 2020, The Hague (virtual), Netherlands. pp.11-15, ⟨10.1109/ASONAM49781.2020.9381437⟩. ⟨hal-02971399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02971399/file/14___Impersonator.pdf BibTex

2019

ref_biblio
Oumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih. An IoT-blockchain architecture based on hyperledger framework for health care monitoring application. NTMS 2019 - 10th IFIP International Conference on New Technologies, Mobility and Security, Jun 2019, Canary islands, Spain. pp.1-5, ⟨10.1109/NTMS.2019.8763849⟩. ⟨hal-02434834⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-02434834/file/NTMS2019%20%281%29.pdf BibTex
ref_biblio
Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02176684/file/Article_ICISSP.pdf BibTex
ref_biblio
Hamza Baqa, Nguyen B Truong, Noel Crespi, Gyu M. Lee, Franck Le Gall. Semantic smart contracts for blockchain-based services in the Internet of Things. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge (MA), United States. pp.1-5, ⟨10.1109/NCA.2019.8935016⟩. ⟨hal-02363549⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363549/file/NCA_2019_Camera-Ready_29_deposited.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Geocaching-inspired resilient path planning for drone swarms. MISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking, Apr 2019, Paris, France. pp.620 - 625, ⟨10.1109/INFCOMW.2019.8845318⟩. ⟨hal-02127604⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02127604/file/preprint-misarn2019.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia-Alfaro. Faking and discriminating the navigation data of a micro aerial vehicle using quantum generative adversarial networks. GLOBECOM 2019: IEEE Global Communications Workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024550⟩. ⟨hal-03125799⟩
Accès au bibtex
BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos. Quality amplification of error prone navigation for swarms of micro aerial vehicles. GLOBECOM 2019: IEEE Global Communications workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024394⟩. ⟨hal-03125798⟩
Accès au bibtex
BibTex
ref_biblio
Shanay Behrad, Stéphane Tuffin, Emmanuel Bertin, Noel Crespi. Network access control for the IoT: a comparison between cellular, Wi-Fi and LoRaWAN. ICIN 2019 : 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2019, Paris, France. pp.195 - 200, ⟨10.1109/ICIN.2019.8685884⟩. ⟨hal-02125286⟩
Accès au bibtex
BibTex
ref_biblio
Shanay Behrad, Emmanuel Bertin, Sephane Tuffin, Noel Crespi. 5G-SSAAC: Slice-Specific Authentication and Access Control in 5G. NETSOFT 2019 : 5th International Conference on Network Softwarization, Jun 2019, Paris, France. pp.281-285, ⟨10.1109/NETSOFT.2019.8806667⟩. ⟨hal-02363468⟩
Accès au bibtex
BibTex
ref_biblio
Chérifa Boucetta, Boubakr Nour, Hassine Moungla, Laaziz Lahlou. An IoT scheduling and interference mitigation scheme in TSCH using latin rectangles. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. ⟨10.1109/GLOBECOM38437.2019.9013482⟩. ⟨hal-02266945⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02266945/file/1570544510.pdf BibTex
ref_biblio
Chérifa Boucetta, Boubakr Nour, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi. Adaptive range-based anomaly detection in drone-assisted cellular networks. IWCMC 2019: 15th International Wireless Communications & Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.1239-1244, ⟨10.1109/IWCMC.2019.8766446⟩. ⟨hal-02196155v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02196155/file/08766446.pdf BibTex
ref_biblio
Chérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal. Optimizing drone deployment for cellular communication coverage during crowded events. Military Communications Conference for the 21st century (MILCOM), 2019, Norfolk, VA, United States. pp.622-627, ⟨10.1109/MILCOM47813.2019.9020748⟩. ⟨hal-02460719⟩
Accès au bibtex
BibTex
ref_biblio
Fabien Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource allocation for secure SDN-based virtual network migration. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-10, ⟨10.1109/nca.2019.8935027⟩. ⟨hal-02438632⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438632/file/NCA_2019___Final_draft%20%281%29.pdf BibTex
ref_biblio
Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. Real-time dynamic security for ProSe in 5G. ICSPIS 2019: 2nd International Conference on Signal Processing and Information Security, Oct 2019, Dubai, United Arab Emirates. pp.1-4, ⟨10.1109/ICSPIS48135.2019.9045904⟩. ⟨hal-03119391⟩
Accès au bibtex
BibTex
ref_biblio
Aicha Dridi, Chérifa Boucetta, Abubakar Yau Alhassan, Hassine Moungla, Hossam Afifi, et al.. Deep learning approaches for electrical vehicular mobility management: invited paper. International Conference on Wireless Networks and Mobile Communications (WINCOM), 2019, Fez, Morocco. pp.1-6, ⟨10.1109/WINCOM47513.2019.8942569⟩. ⟨hal-02460694⟩
Accès au bibtex
BibTex
ref_biblio
Eva Gagliardi, Olivier Levillain. Analysis of QUIC session establishment and its implementations. 13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩. ⟨hal-02468596⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02468596/file/document.pdf BibTex
ref_biblio
Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler. A trust framework for centralized TDMA scheduling mechanism in Vehicular Ad hoc Networks. WTS 2019: Wireless Telecommunications Symposium, Apr 2019, New York, United States. ⟨10.4018/IJITN.2020100106⟩. ⟨hal-02454384⟩
Accès au bibtex
BibTex
ref_biblio
Seif Eddine Hammami, Hossam Afifi, Hassine Moungla, Ahmed E. Kamel. Drone-assisted cellular networks: a multi-agent reinforcement learning approach. ICC 2019: 53rd International Conference on Communications, May 2019, Shanghai, China. pp.1-6, ⟨10.1109/ICC.2019.8762079⟩. ⟨hal-02101394⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02101394/file/Drone_assisted_cellular_network__A_Multi_Agent_Reinforcement_Learning_Approach%20%2815%29.pdf BibTex
ref_biblio
Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. A trusted group-based revocation process for Intelligent Transportation System. ICDEc 2019: 4th International Conference on Digital Economy. Emerging Technologies and Business Innovation, Apr 2019, Beyrouth, Lebanon. pp.133-146, ⟨10.1007/978-3-030-30874-2_10⟩. ⟨hal-02454367⟩
Accès au bibtex
BibTex
ref_biblio
Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. ASIACCS 2019: 14th ASIA Conference on Computer and Communications Security, Jul 2019, Auckland, New Zealand. pp.602-612, ⟨10.1145/3321705.3329812⟩. ⟨hal-02390275⟩
Accès au bibtex
BibTex
ref_biblio
Fatma Hrizi, Anis Laouiti. A RINA-based security architecture for vehicular networks. IWVSC 2019: 3rd International Workshop on Vehicular Adhoc Networks for Smart Cities, Nov 2019, Paris, France. pp.87-97, ⟨10.1007/978-981-15-3750-9_7⟩. ⟨hal-02454401⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Gregory Blanc. Designing security-aware service requests for NFV-enabled networks. ICCCN 2019: 28th International Conference on Computer Communication and Networks, Jul 2019, Valencia, Spain. pp.1-9, ⟨10.1109/icccn.2019.8847058⟩. ⟨hal-02438649⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438649/file/Designing_a_security_aware_service_request_in_NVF_enabled_networks_20190510.pdf BibTex
ref_biblio
Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim El Yacoubi. Siamese network based feature learning for improved intrusion detection. ICONIP 2019: International Conference on Neural Information Processing, Dec 2019, Sydney, Australia. pp.377-389, ⟨10.1007/978-3-030-36708-4_31⟩. ⟨hal-02421070⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. LQCC: a Link Quality-based Congestion Control scheme in named data networks. WCNC 2019: IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. pp.1-6, ⟨10.1109/WCNC.2019.8885909⟩. ⟨hal-02100494⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02100494/file/Hakima2019LQCC.pdf BibTex
ref_biblio
Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. A QoS-aware cache replacement policy for Vehicular Named Data Networks. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013461⟩. ⟨hal-02266946⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02266946/file/1570545830.pdf BibTex
ref_biblio
Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. A Name-to-Hash Encoding scheme for vehicular named data networks. IWCMC 2019: International Wireless Communications and Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.603-608, ⟨10.1109/IWCMC.2019.8766564⟩. ⟨hal-02100495v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02100495/file/Hakima19NHE.pdf BibTex
ref_biblio
Maxime Labonne, Alexis Olivereau, Baptiste Polve, Djamal Zeghlache. A cascade-structured meta-specialists approach for neural network-based intrusion detection. CCNC 2019: 16th Annual Consumer Communications & Networking Conference, Jan 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CCNC.2019.8651856⟩. ⟨hal-02425973⟩
Accès au bibtex
BibTex
ref_biblio
Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. DRMF: a Distributed Resource Management Framework for industry 4.0 environments. NCA 2019: 18th IEEE International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-9, ⟨10.1109/NCA.2019.8935019⟩. ⟨hal-02434766⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02434766/file/08935019.pdf BibTex
ref_biblio
Asma Lahbib, Khalifa Toumi, Anis Laouiti, Alexandre Laube, Steven Martin. Blockchain based trust management mechanism for IoT. WCNC 2019: IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. pp.1-8, ⟨10.1109/WCNC.2019.8885994⟩. ⟨hal-02454372⟩
Accès au bibtex
BibTex
ref_biblio
Mohammed Laroui, Aicha Dridi, Hossam Afifi, Hassine Moungla, Michel Marot, et al.. Energy management for electric vehicles in smart cities: a deep learning approach. IWCMC 2019: International Wireless Communications & Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.2080-2085, ⟨10.1109/IWCMC.2019.8766580⟩. ⟨hal-02101524⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02101524/file/Energy_Management_For_Electric_Vehicles_in_Smart_Cities__A_Deep_Learning_Approach.pdf BibTex
ref_biblio
Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02147191/file/1-s2.0-S1877050919304995-main.pdf BibTex
ref_biblio
Ruben Milocco, Pascale Minet, Eric Renault, Selma Boumerdassi. Cost reduction bounds of proactive management based on request prediction. HPCS 2019: 17th International Conference on High Performance Computing & Simulation, Jul 2019, Dublin, Ireland. pp.864-871, ⟨10.1109/HPCS48598.2019.9188199⟩. ⟨hal-02432652⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02432652/file/HAL_HPCS2019.pdf BibTex
ref_biblio
Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. A BERT-based transfer learning approach for hate speech detection in online social media. Complex Networks 2019: 8th International Conference on Complex Networks and their Applications, Dec 2019, Lisbonne, Portugal. pp.928-940, ⟨10.1007/978-3-030-36687-2_77⟩. ⟨hal-02344806⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02344806/file/Complex_Network%20A%20BERT-Based%20Transfer.pdf BibTex
ref_biblio
Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Content similarity analysis of written comments under posts in social media. SNAMS 2019: 6th International Conference on Social Networks Analysis, Management and Security, Oct 2019, Grenade, Spain. pp.158-165, ⟨10.1109/SNAMS.2019.8931726⟩. ⟨hal-02363538⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363538/file/RC_SNAMS2019_37.pdf BibTex
ref_biblio
Charbel Nicolas, Abdel-Mehsen Ahmad, Jose Rubio-Hernan, Gilbert Habib. Hybrid duty cycle algorithm for industrial WSNs using machine learning. SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, Dec 2019, Trivandrum, India. pp.1-15, ⟨10.1007/978-981-15-4301-2_1⟩. ⟨hal-02962613⟩
Accès au bibtex
BibTex
ref_biblio
Boubakr Nour, Fan Li, Hakima Khelifi, Hassine Moungla, Adlen Ksentini. Coexistence of ICN and IP networks: an NFV as a service approach. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013881⟩. ⟨hal-02266947⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02266947/file/1570545825.pdf BibTex
ref_biblio
Olivier Paul, Grégory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03754082/file/RESSI-final.pdf BibTex
ref_biblio
Quan Pham Van, Huy Tran Quang, Dominique Verchere, Patricia Layec, Thieu Huu-Trung, et al.. Demonstration of container-based microservices SDN control platform for open optical networks. OFC 2019: Optical Fiber Communications Conference and Exhibition, Mar 2019, San Diego, United States. pp.1-3, ⟨10.1364/OFC.2019.M3Z.5⟩. ⟨hal-02446058⟩
Accès au bibtex
BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Roberto Minerva. Film factory losses: is BitTorrent a major responsible?. SNAMS 2019: 6th International Conference on Social Networks Analysis, Management and Security, Oct 2019, Grenade, Spain. pp.181-188, ⟨10.1109/SNAMS.2019.8931858⟩. ⟨hal-02363514⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363514/file/RC_SNAMS2019_40.pdf BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Uncovering flaming events on news media in social media. IPCCC 2019: 38th International Performance Computing and Communications Conference, Oct 2019, Londres, United Kingdom. pp.1-9, ⟨10.1109/IPCCC47392.2019.8958759⟩. ⟨hal-02363443⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363443/file/1909.07181%20%281%29.pdf BibTex
ref_biblio
Aina Toky Rasoamanana, Olivier Levillain. Wombat: one more Bleichenbacher attack toolkit. GreHack 2019, Nov 2019, Grenoble, France. ⟨hal-02468592⟩
Accès au bibtex
BibTex
ref_biblio
José Reyes, Jorge Lopez, Djamal Zeghlache. Identifying running data-paths in software defined networking driven data-planes. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-8, ⟨10.1109/NCA.2019.8935031⟩. ⟨hal-02425970⟩
Accès au bibtex
BibTex
ref_biblio
José Reyes, Jorge Lopez, Natalia Kushik, Djamal Zeghlache. On the assessment and debugging of QoE in SDN: work in progress. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-3, ⟨10.1109/NCA.2019.8935029⟩. ⟨hal-02448781⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
Accès au bibtex
BibTex
ref_biblio
Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438733/file/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf BibTex
ref_biblio
Abdallah Sobehy, Eric Renault, Paul Mühlethaler. CSI based indoor localization using Ensemble Neural Networks. MLN 2019 : 2nd IFIP International Conference on Machine Learning for Networking, Dec 2019, Paris, France. pp.367-378, ⟨10.1007/978-3-030-45778-5_25⟩. ⟨hal-02334588⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02334588/file/v1_%20CSI_based_Indoor_localization_using_Ensemble_Neural_Networks.pdf BibTex
ref_biblio
Abdallah Sobehy, Eric Renault, Paul Mühlethaler. NDR: Noise and Dimensionality Reduction of CSI for indoor positioning using deep learning. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013195⟩. ⟨hal-02314929⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02314929/file/GlobeCom_copy_right_NDR.pdf BibTex
ref_biblio
Vicenç Torra, Joaquin Garcia-Alfaro. Towards an adaptive defuzzification: using numerical Choquet integral. MDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence, Sep 2019, Milan, Italy. pp.113-125, ⟨10.1007/978-3-030-26773-5_11⟩. ⟨hal-02393562⟩
Accès au bibtex
BibTex
ref_biblio
Quan Pham Van, Dominique Verchere, Huy Tran-Quang, Djamal Zeghlache. Container-based microservices SDN control plane for open disaggregated optical networks. ICTON 2019: 21st International Conference on Transparent Optical Networks, Jul 2019, Angers, France. pp.Sa.A3.1:1-4, ⟨10.1109/ICTON.2019.8840430⟩. ⟨hal-02425137⟩
Accès au bibtex
BibTex
ref_biblio
Evgenii Vinarskii, Jorge Lopez, Natalia Kushik, Nina Yevtushenko, Djamal Zeghlache. A model checking based approach for detecting SDN races. ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩. ⟨hal-02448964⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02448964/file/482770_1_En_12_Chapter.pdf BibTex
ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi. Deep dive on politician impersonating accounts in social media. ISCC 2019: 24th Symposium on Computers and Communications, Jun 2019, Barcelona, Spain. pp.1-6, ⟨10.1109/ISCC47284.2019.8969645⟩. ⟨hal-02363455⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363455/file/1570531858.pdf BibTex
ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi. Typification of impersonated accounts on Instagram. IPCCC 2019: 38th International Performance Computing and Communications Conference, Oct 2019, Londres, United Kingdom. pp.1-7, ⟨10.1109/IPCCC47392.2019.8958763⟩. ⟨hal-02363432⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02363432/file/1570567769.pdf BibTex

2018

ref_biblio
Amar Abane, Mehammed Daoui, Paul Mühlethaler, Hossam Afifi. A down-to-earth integration of Named Data Networking in the real-world IoT. FiCloudW 2018 : 6th International Conference on Future Internet of Things and Cloud Workshops, Aug 2018, Barcelona, Spain. pp.243-249, ⟨10.1109/W-FiCloud.2018.00046⟩. ⟨hal-02333719⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02333719/file/integrating_NDN_IoT_camera_ready.pdf BibTex
ref_biblio
Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassem, Evangelos Kranakis, et al.. Low frequency mobile communications in underwater networks. ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.239 - 251, ⟨10.1007/978-3-030-00247-3_22⟩. ⟨hal-02013548⟩
Accès au bibtex
BibTex
ref_biblio
Shohreh Ahvar, Mohammad Mirzaei, Jeremie Leguay, Ehsan Ahvar, Ahmed Medhat, et al.. SET: a Simple and Effective Technique to improve cost efficiency of VNF placement and chaining algorithms for network service provisioning. NetSoft 2018: 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.293-297, ⟨10.1109/NETSOFT.2018.8459908⟩. ⟨hal-01879107⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01879107/file/HAL%20SET%20Netsoft_201829.pdf BibTex
ref_biblio
Shohreh Ahvar, Jagruti Sahoo, Ehsan Ahvar, Mouhamad Dieye, Roch Glitho, et al.. PCPV: Pattern-based Cost-efficient Proactive VNF placement and chaining for value-added services in content delivery networks. NETSOFT 2018: 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.313-317, ⟨10.1109/NETSOFT.2018.8459986⟩. ⟨hal-01879108⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01879108/file/HAL%20PCPV%3A%20Pattern-based%20Cost-efficient%20Proactive%20VNF.pdf BibTex
ref_biblio
Fred Kwasi Mawufemor Aklamanu, Sabine Randriamasy, Eric Renault, Imran Latif, Abdelkrim Hebbar. Intent-based real-time 5G cloud service provisioning. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Abu Dhabi, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOMW.2018.8644457⟩. ⟨hal-02050580⟩
Accès au bibtex
BibTex
ref_biblio
Bahram Alinia, Mohammad Sadegh Talebi, Mohammad Hajiesmaili, Ali Yekkehkhany, Noel Crespi. Competitive online scheduling algorithms with applications in deadline-constrained EV charging. IWQoS 2018: IEEE/ACM 26th International Symposium on Quality of Service, Jun 2018, Banff, Ab, Canada. pp.1 - 10, ⟨10.1109/IWQoS.2018.8624184⟩. ⟨hal-01998511⟩
Accès au bibtex
BibTex
ref_biblio
Danya Bachir, Ghazaleh Khodabandelou, Vincent Gauthier, Mounim El Yacoubi, Eric Vachon. Combining Bayesian inference and clustering for transport mode detection from sparse and noisy geolocation data. ECML PKDD 2018: Machine Learning and Knowledge Discovery in Databases, Sep 2018, Dublin, Ireland. pp.569-584, ⟨10.1007/978-3-030-10997-4_35⟩. ⟨hal-01939608⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01939608/file/sub_77.pdf BibTex
ref_biblio
Pierre-Marie Bajan, Hervé Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01901017/file/Article_1_vConf.pdf BibTex
ref_biblio
Hamza Baqa, Nguyen Binh Truong, Noel Crespi, Gyu Myoung Lee, Franck Le Gall. Quality of information as an indicator of trust in the Internet of Things. TrustCom/BigDataSE 2018: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, Aug 2018, New York, United States. pp.204 - 211, ⟨10.1109/TrustCom/BigDataSE.2018.00040⟩. ⟨hal-01988367⟩
Accès au bibtex
BibTex
ref_biblio
Shanay Behrad, Emmanuel Bertin, Noel Crespi. Securing authentication for mobile networks, a survey on 4G issues and 5G answers. ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 8, ⟨10.1109/ICIN.2018.8401619⟩. ⟨hal-01864531⟩
Accès au bibtex
BibTex
ref_biblio
Jaafar Bendriss, Imen Grida Ben Yahia, Roberto Riggio, Djamal Zeghlache. Demo: a deep learning based SLA management for NFV-based services. ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 3, ⟨10.1109/ICIN.2018.8401592⟩. ⟨hal-01868882⟩
Accès au bibtex
BibTex
ref_biblio
Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, et al.. Towards a 5G security architecture: articulating software-defined security and security as a service. 5G-NS 2018: Workshop on 5G Networks Security, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, ⟨10.1145/3230833.3233251⟩. ⟨hal-01988053⟩
Accès au bibtex
BibTex
ref_biblio
Amal Bouaziz, Ahlem Saddoud, Lamia Chaari Fourati., Hakima Chaouchi. Dynamic joint resource allocation and femtocell selection for 5G HetNet. ADHOC NOW 2018: International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.90 - 101, ⟨10.1007/978-3-030-00247-3_8⟩. ⟨hal-01999484⟩
Accès au bibtex
BibTex
ref_biblio
Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leila Azouz Saidane. QCH-MAC: A Qos-aware Centralized Hybrid MAC protocol for Vehicular Ad Hoc NETworks. AINA 2018: 32nd International Conference on Advanced Information Networking and Applications, May 2018, Krakow, Poland. pp.55 - 62, ⟨10.1109/AINA.2018.00021⟩. ⟨hal-01994055⟩
Accès au bibtex
BibTex
ref_biblio
François Boutigny, Stephane Betge-Brezetz, Hervé Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
Accès au bibtex
BibTex
ref_biblio
Fabien Charmet, Gregory Blanc. Secure migration of virtual SDN topologies. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438748⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438748/file/charmet_secure_migration_virtual.pdf BibTex
ref_biblio
Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. An energy model for the IoT: secure networking perspective. PIMRC 2018: 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, Oct 2018, Bologna, Italy. pp.1 - 5, ⟨10.1109/PIMRC.2018.8580885⟩. ⟨hal-01992339⟩
Accès au bibtex
BibTex
ref_biblio
Rebecca Copeland, Shohreh Ahvar, Noel Crespi, Romain Durand, Michael Copeland, et al.. Technology assessment for mission-critical services on automotive virtual edge communicator (AVEC). ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 8, ⟨10.1109/ICIN.2018.8401630⟩. ⟨hal-01865524⟩
Accès au bibtex
BibTex
ref_biblio
Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM/IFIP International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01940866/file/article_fonts_included.pdf BibTex
ref_biblio
Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré. Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01850383/file/2018-wisecAida-QuestioningEsIOTApproach.pdf BibTex
ref_biblio
Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01895391/file/2018-fev-soumis-Securecomm_2018_paper_84-1.pdf BibTex
ref_biblio
Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
Accès au bibtex
BibTex
ref_biblio
Simon Foley, Fabien Autrel, Edwin Bourget, Thomas Cledel, Stéphane Grunenwald, et al.. Science hackathons for cyberphysical system security research: putting CPS tesdbed platforms to good use. CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy, Oct 2018, Toronto, Canada. pp.102 - 107, ⟨10.1145/3564888.3264.897⟩. ⟨hal-01911182⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A pyramidal-based model to compute the impact of cyber security events. ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19 -, ⟨10.1145/3230833.3230847⟩. ⟨hal-01885053⟩
Accès au bibtex
BibTex
ref_biblio
Mohamed Hadded, Paul Mühlethaler, Anis Laouiti. TDMA scheduling strategies for vehicular ad hoc networks: from a distributed to a centralized approach. SoftCOM 2018 - 26th International Conference on Software, Telecommunications and Computer Networks, Sep 2018, Split, Croatia. ⟨10.23919/SOFTCOM.2018.8555781⟩. ⟨hal-01864550⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01864550/file/Hadded_paperv2.pdf BibTex
ref_biblio
Mohamed Hadded, Paul Mühlethaler, Anis Laouiti. An optimized multi-hop broadcast scheme for mesh networks with node failures. ICCC 2018: IEEE/CIC International Conference on Communications in China, Aug 2018, Beijing, China. pp.814 - 818, ⟨10.1109/ICCChina.2018.8641157⟩. ⟨hal-02022698⟩
Accès au bibtex
BibTex
ref_biblio
Seif Eddine Hammami, Hassine Moungla, Hossam Afifi. Proactive anomaly detection model for eHealth-enabled data in next generation cellular networks. ICC 2018 : IEEE International Conference on Communications, May 2018, Kansas City, United States. pp.1 - 6, ⟨10.1109/ICC.2018.8422516⟩. ⟨hal-01870403⟩
Accès au bibtex
BibTex
ref_biblio
Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. A security solution for V2V communication within VANETs. WD 2018 : 10th Wireless Days conference, Apr 2018, Dubai, United Arab Emirates. pp.181 - 183, ⟨10.1109/WD.2018.8361716⟩. ⟨hal-01867393⟩
Accès au bibtex
BibTex
ref_biblio
Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache, Farouk Kamoun. Virtualized network services extension algorithms. NCA 2018: 17th IEEE International Symposium on Network Computing and Applications, Nov 2018, Cambridge, Ma, United States. pp.1 - 5, ⟨10.1109/NCA.2018.8548341⟩. ⟨hal-01991876⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. N-Combat: a nuisance call combating framework for internet telephony. TrustCom/BigDataSE 2018: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, Aug 2018, New York, United States. pp.112 - 117, ⟨10.1109/TrustCom/BigDataSE.2018.00027⟩. ⟨hal-01988338⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01850387/file/2018-SECRYPT-SABE-Multi-level-AC.pdf BibTex
ref_biblio
Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. User reactions prediction using embedding features. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Abu Dhabi, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647625⟩. ⟨hal-02050597⟩
Accès au bibtex
BibTex
ref_biblio
Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. Who will like the post? A case study of predicting likers on Flickr. SNAMS 2018: 5th International Conference on Social Networks Analysis, Management and Security, Oct 2018, Valencia, Spain. pp.35 - 42, ⟨10.1109/SNAMS.2018.8554952⟩. ⟨hal-02014631⟩
Accès au bibtex
BibTex
ref_biblio
Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications. GRCON 2018: 8th Annual GNU Radio Conference, Sep 2018, Henderson, United States. pp.1 - 8. ⟨hal-02013656⟩
Accès au bibtex
BibTex
ref_biblio
Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. GNU radio blocks for long-lasting frames in mobile underwater acoustic communications. French GNU Radio days 2018, Jul 2018, Lyon, France. pp.1 - 2. ⟨hal-02013632⟩
Accès au bibtex
BibTex
ref_biblio
Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. A multi-objective non-dominated sorting genetic algorithm for VNF chains placement. CCNC 2018 : IEEE Consumer Communications & Networking Conference, Jan 2018, Las Vegas, United States. pp.1-4, ⟨10.1109/CCNC.2018.8319250⟩. ⟨hal-01613473⟩
Accès au bibtex
BibTex
ref_biblio
Mohammed Laroui, Akrem Sellami, Boubakr Nour, Hassine Moungla, Hossam Afifi, et al.. Driving path stability in VANETs. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Dubai, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647450⟩. ⟨hal-02049979⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01864317/file/2018-SECRYPT-BC-based-AC.pdf BibTex
ref_biblio
Maja Lazarevska, Nikesh Man Shakya, Reza Farahbakhsh, Noel Crespi. Mobility supported energy efficient routing protocol for IoT based healthcare applications. CSCN 2018: IEEE Conference on Standards for Communications and Networking, Oct 2018, Paris, France. pp.1 - 5, ⟨10.1109/CSCN.2018.8581828⟩. ⟨hal-01990562⟩
Accès au bibtex
BibTex
ref_biblio
Paul Marillonnet, Mikaël Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des données personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie Privée, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
Accès au bibtex
BibTex
ref_biblio
Pascale Minet, Eric Renault, Ines Khoufi, Selma Boumerdassi. Analyzing traces from a Google data center. IWCMC 2018 : 14th International Wireless Communications and Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1167 - 1172, ⟨10.1109/IWCMC.2018.8450304⟩. ⟨hal-01870216⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01870216/file/analyzing-traces-google.pdf BibTex
ref_biblio
Pascale Minet, Eric Renault, Ines Khoufi, Selma Boumerdassi. Data analysis of a Google data center. CCGRID 2018 : 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2018, Washington Dc, United States. pp.342 - 343, ⟨10.1109/CCGRID.2018.00049⟩. ⟨hal-01867409⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01867409/file/data-analysis-google.pdf BibTex
ref_biblio
Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Dima Al Mouhammad. General semantic system for monitoring & assisting diabetes patient "MySmart diabetes OntoREFerence" ontology. MENACOMM 2018: IEEE Middle East and North Africa Communications Conference, Apr 2018, Jounieh, Lebanon. pp.1 - 6, ⟨10.1109/MENACOMM.2018.8371024⟩. ⟨hal-01875454⟩
Accès au bibtex
BibTex
ref_biblio
van Khang Nguyen, Eric Renault, Viet Hai Ha. Road anomaly detection using smartphone : a brief analysis. MSPN 2018: 4th International Conference on Mobile, Secure and Programmable Networking, Jun 2018, Paris, France. pp.86 - 97, ⟨10.1007/978-3-030-03101-5_8⟩. ⟨hal-01997002⟩
Accès au bibtex
BibTex
ref_biblio
Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Ahmed E. Kamal, et al.. NCP: a near ICN cache placement scheme for IoT-based traffic class. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Dubai, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647629⟩. ⟨hal-02049991⟩
Accès au bibtex
BibTex
ref_biblio
David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01991849/file/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf BibTex
ref_biblio
Nahit Pawar, Thomas Bourgeau, Hakima Chaouchi. PrIoT: Prototyping the Internet of Things. FICLOUD 2018: 6th International Conference on Future Internet of Things and Cloud, Aug 2018, Barcelone, Spain. pp.216 - 223, ⟨10.1109/FiCloud.2018.00039⟩. ⟨hal-01993744⟩
Accès au bibtex
BibTex
ref_biblio
Cuong Pham, Gregory Blanc, Hervé Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438757/file/pham_automatic_network_environment.pdf BibTex
ref_biblio
Quan Pham Van, Dominique Verchère, Patricia Layec, Arnaud Dupas, Frank Ilchmann, et al.. Monitoring intent for optical channel defragmentation in software-defined elastic optical networks. ICTON 2018 : 20th International Conference on Transparent Optical Networks, Jul 2018, Bucharest, Romania, Romania. pp.1 - 4, ⟨10.1109/ICTON.2018.8473926⟩. ⟨hal-01992391⟩
Accès au bibtex
BibTex
ref_biblio
Eric Valega Prawirodidjojo, Rui Jie Quek, Bu Sung Lee, Vincent Gauthier, Markus Schläpfer. Using mobile phone data to determine human mobility patterns in Paris. CW 2018: International Conference on Cyberworlds, Oct 2018, Singapore, Singapore. pp.399 - 402, ⟨10.1109/CW.2018.00077⟩. ⟨hal-02152305⟩
Accès au bibtex
BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Inspecting interactions: online news media synergies in social media. ASONAM 2018: 2018 International Conference on Advances in Social Networks Analysis and Mining, IEEE/ACM, Aug 2018, Barcelona, Spain. pp.535-539, ⟨10.1109/ASONAM.2018.8508534⟩. ⟨hal-01957237⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01957237/file/Inspecting-interactions.pdf BibTex
ref_biblio
Yasir Saleem, Noel Crespi. Mapping of sensor and route coordinates for smart cities. COMPSAC 2018: 42nd Annual Computer Software and Applications Conference, Jul 2018, Tokyo, Japan. pp.570 - 576, ⟨10.1109/COMPSAC.2018.00087⟩. ⟨hal-01988425⟩
Accès au bibtex
BibTex
ref_biblio
Yasir Saleem, Noel Crespi, Pasquale Pace. SCDIoT: Social Cross-Domain IoT enabling application-to-application communications. IC2E 2018 : IEEE International Conference on Cloud Engineering, Apr 2018, Orlando, United States. pp.346 - 350, ⟨10.1109/IC2E.2018.00068⟩. ⟨hal-01865515⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
Accès au bibtex
BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01994156/file/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf BibTex
ref_biblio
Abdallah Sobehy, Eric Renault, Paul Mühlethaler. Position certainty propagation: a location service for MANETs. MSPN 2018 - 4th International Conference on Mobile, Secure and Programmable Networking, Jun 2018, Paris, France. pp.131-142, ⟨10.1007/978-3-030-03101-5_13⟩. ⟨hal-01864565⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01864565/file/main.pdf BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A green VNFs placement and chaining algorithm. NOMS 2018 : IEEE/IFIP Network Operations and Management Symposium, Apr 2018, Taipei, Taiwan. pp.1 - 5, ⟨10.1109/NOMS.2018.8406183⟩. ⟨hal-01868941⟩
Accès au bibtex
BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A green VNF-FG embedding algorithm. NETSOFT 2018 : 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.141 - 149, ⟨10.1109/NETSOFT.2018.8460013⟩. ⟨hal-01992428⟩
Accès au bibtex
BibTex
ref_biblio
Nouredine Tamani, Shohreh Ahvar, Gabriel Santos, Bernard Istasse, Isabel Praca, et al.. Rule-based model for smart building supervision and management. SCC 2018: IEEE International Conference on Services Computing, Jul 2018, San Francisco, United States. pp.9 - 16, ⟨10.1109/SCC.2018.00009⟩. ⟨hal-01988418⟩
Accès au bibtex
BibTex
ref_biblio
Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sarah Akbarzadeh, Ahlem Khlass. Simulation, modeling and analysis of the eICIC/ABS in H-CRAN. PEMWN 2018 : IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Sep 2018, Toulouse, France. pp.1 - 6, ⟨10.23919/PEMWN.2018.8548938⟩. ⟨hal-01994633⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Xuan Huyen Do, Viet Hai Ha. Implementation of OpenMP data-sharing on CAPE. SoICT 2018: 9th International Symposium on Information and Communication Technology, Dec 2018, Da Nang, Vietnam. pp.359 - 366, ⟨10.1145/3287921.3287950⟩. ⟨hal-01997176⟩
Accès au bibtex
BibTex
ref_biblio
Long Tran Van, Eric Renault, Xuan Huyen Do, Viet Hai Ha. A new execution model for improving performance and flexibility of CAPE. PDP 2018 : 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, Mar 2018, Cambridge, United Kingdom. pp.234 - 238, ⟨10.1109/PDP2018.2018.00039⟩. ⟨hal-01868501⟩
Accès au bibtex
BibTex

2017

ref_biblio
Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassen, Evangelos Kranakis, et al.. Doppler effect in the underwater acoustic ultra low frequency band. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.3 - 12, ⟨10.1007/978-3-319-74439-1_1⟩. ⟨hal-01699512⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01699512/file/18679.pdf BibTex
ref_biblio
Shohreh Ahvar, Gabriel Santos, Nouredine Tamani, Bernard Istasse, Isabel Praca, et al.. Ontology-based model for trusted critical site supervision in FUSE-IT. ICIN 2017 :20th Innovations in Clouds, Internet and Networks conference, Mar 2017, Paris, France. pp.313 - 315, ⟨10.1109/ICIN.2017.7899430⟩. ⟨hal-01586373⟩
Accès au bibtex
BibTex
ref_biblio
Shohreh Ahvar, Hnin Pann Phyu, Sachham Man Buddhacharya, Ehsan Ahvar, Noel Crespi, et al.. CCVP: cost-efficient centrality-based VNF placement and chaining algorithm for network service provisioning. NetSoft 2017: 3rd IEEE Conference on Network Softwarization, Jul 2017, Bologna, Italy. pp.1 - 9, ⟨10.1109/NETSOFT.2017.8004104⟩. ⟨hal-01660641⟩
Accès au bibtex
BibTex
ref_biblio
Danya Bachir, Vincent Gauthier, Mounim El Yacoubi, Ghazaleh Khodabandelou. Using mobile phone data analysis for the estimation of daily urban dynamics. ITSC 2017 : 20th International Conference on Intelligent Transportation Systems, Oct 2017, Yokohama, Japan. pp.626 - 632, ⟨10.1109/ITSC.2017.8317956⟩. ⟨hal-01745767⟩
Accès au bibtex
BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Steven Porretta. The sound of communication in underwater acoustic sensor networks. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.13 - 23, ⟨10.1007/978-3-319-74439-1_2⟩. ⟨hal-01699521⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01699521/file/18680.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01575575/file/2017-SECRYPT-ABSC-Sana-Belguith.pdf BibTex
ref_biblio
Jaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache. Forecasting and anticipating SLO breaches in programmable networks. ICIN 2017 : 20th Conference on Innovations in Clouds, Internet and Networks, Mar 2017, Paris, France. pp.127 - 134, ⟨10.1109/ICIN.2017.7899402⟩. ⟨hal-01531499⟩
Accès au bibtex
BibTex
ref_biblio
Jaafar Bendriss, Imen Grida Ben Yahia, Prosper Chemouil, Djamal Zeghlache. AI for SLA management in programmable networks. DRCN 2017 : 13th International Conference on Design of Reliable Communication Networks, Mar 2017, Munich, Germany. pp.130 - 137. ⟨hal-01630050⟩
Accès au bibtex
BibTex
ref_biblio
Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. Security establishment for IoT environments in 5G: Direct MTC-UE communications. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Oct 2017, Montreal, Canada. ⟨10.1109/PIMRC.2017.8292693⟩. ⟨cea-01888850⟩
Accès au bibtex
BibTex
ref_biblio
Juwendo Denis, Sinda Smirani, Bakarime Diomande, Takoua Ghariani, Badii Jouaber. Outage probability-based beamforming design for multi-cell multicast networks. PIMRC 2017 : 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.1 - 5, ⟨10.1109/PIMRC.2017.8292337⟩. ⟨hal-01712020⟩
Accès au bibtex
BibTex
ref_biblio
Juwendo Denis, Sinda Smirani, Bakarime Diomande, Takoua Ghariani, Badii Jouaber. Energy-efficient coordinated beamforming for multi-cell multicast networks under statistical CSI. SPAWC 2017 : IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications, Jul 2017, Sapporo, Japan. pp.1 - 5, ⟨10.1109/SPAWC.2017.8227795⟩. ⟨hal-01681414⟩
Accès au bibtex
BibTex
ref_biblio
Juwendo Denis, Sinda Smirani, Badii Jouaber. Beamformer designs for energy-efficient multi-cell physical layer multicasting. APCC 2017 : 23rd Asia-Pacific Conference on Communications, Dec 2017, Perth, Australia. pp.1 - 5, ⟨10.23919/APCC.2017.8304069⟩. ⟨hal-01721900⟩
Accès au bibtex
BibTex
ref_biblio
Thibaud Ecarot, Djamal Zeghlache, Cédric Brandily. Consumer-and-provider-oriented efficient IaaS resource allocation. IPDPSW 2017 : IEEE International Parallel and Distributed Processing Symposium Workshops, May 2017, Orlando, United States. pp.77 - 85, ⟨10.1109/IPDPSW.2017.97⟩. ⟨hal-01629722⟩
Accès au bibtex
BibTex
ref_biblio
Reza Farahbakhsh, Samin Karbalay Mohammadi Dastjerdi, Xiao Han, Angel Cuevas Rumin, Noel Crespi. Evolution of publicly disclosed information in Facebook profiles. TRUSTCOM 2017 : 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2017, Sydney, Australia. pp.9 - 16, ⟨10.1109/Trustcom/BigDataSE/ICESS.2017.214⟩. ⟨hal-01586705⟩
Accès au bibtex
BibTex
ref_biblio
Takoua Ghariani, Badii Jouaber. Green topological potential-based optimization for power and spectral efficiency tradeoff in LTE HetNets. ITNAC 2017: 26th International Telecommunication Networks and Applications Conference, Nov 2017, Melbourne, Australia. pp.1 - 6, ⟨10.1109/ATNAC.2017.8215394⟩. ⟨hal-01670388⟩
Accès au bibtex
BibTex
ref_biblio
Chaima Ghribi, Marouen Mechtri, Oussama Soualah, Djamal Zeghlache. SFC provisioning over NFV enabled clouds. CLOUD 2017 : IEEE 10th International Conference on Cloud Computing, Jun 2017, Honolulu, United States. pp.423 - 430, ⟨10.1109/CLOUD.2017.61⟩. ⟨hal-01629737⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack graph-based countermeasure selection using a stateful return on investment metric. FPS 2017: 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. pp.293 - 302, ⟨10.1007/978-3-319-75650-9_19⟩. ⟨hal-01740860⟩
Accès au bibtex
BibTex
ref_biblio
Ouassila Hoceini, Hossam Afifi, Rachida Apidjit. A new key management and authentication architecture for ZigBee networks (KAAZ). SAM 2017: international conference on Security & Management, Jul 2017, Las Vegas, United States. pp.39 - 45. ⟨hal-01699744⟩
Accès au bibtex
BibTex
ref_biblio
Fatma Hrizi, Anis Laouiti. Hierarchical small world overlay for efficient forwarding in volunteer clouds. AINA 2017 : IEEE 31st International Conference on Advanced Information Networking and Applications, Mar 2017, Taipei, Taiwan. pp.236 - 243, ⟨10.1109/AINA.2017.160⟩. ⟨hal-01643242⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Hossam Afifi, Hassine Moungla. Optimal Hadoop over ICN placement algorithm for networking and distributed computing. GLOBECOM 2017 : IEEE Global Communications Conference, Dec 2017, Singapore, Singapore. pp.1 - 6, ⟨10.1109/GLOCOM.2017.8254118⟩. ⟨hal-01816357⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Hossam Afifi, Ahmed E. Kamal. Service placement in complex active networks. ICCCN 2017 : 26th International Conference on Computer Communications and Networks, Jul 2017, Vancouver, Canada. pp.1 - 9, ⟨10.1109/ICCCN.2017.8038471⟩. ⟨hal-01593443⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Hossam Afifi, Hassnaa Moustafa. Optimal Placement Algorithm (OPA) for IoT over ICN. INFOCOM NOM 2017 : Named-Oriented Mobility: Architectures, Algorithms, and Applications workshop, May 2017, Atlanta, United States. pp.254 - 259, ⟨10.1109/INFCOMW.2017.8116405⟩. ⟨hal-01681395⟩
Accès au bibtex
BibTex
ref_biblio
Sonia Ikken, Eric Renault, Amine Barkat, Abdelkamel Tari, Tahar Kechadi. Cost-efficient big intermediate data placement in a collaborative cloud storage environment. 2017 IEEE 19th International Conference on High Performance Computing and Communications, IEEE 15th International Conference on Smart City and IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Dec 2017, Bangkok, Thailand. pp.514-521, ⟨10.1109/HPCC-SmartCity-DSS.2017.67⟩. ⟨hal-04390441⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04390441/file/2017%20IEEE%2019th%20International%20Conference_Cost-Efficient%20Big%20Intermediate%20Data%20Placement%20in%20a.pdf BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. ProtectCall: call protection based on user reputation. TRUSTCOM 2017 : 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2017, Sydney, Australia. pp.660 - 667, ⟨10.1109/Trustcom/BigDataSE/ICESS.2017.297⟩. ⟨hal-01586712⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01593433/file/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01575560/file/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01593430/file/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01682227/file/2017-NCA-Auditable-consent-with-Blockchain.pdf BibTex
ref_biblio
Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. Popularity evolution of professional users on Facebook. IEEE ICC, May 2017, Paris, France. pp.1 - 6, ⟨10.1109/ICC.2017.7997220⟩. ⟨hal-01586717⟩
Accès au bibtex
BibTex
ref_biblio
Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. Scalable and cost-efficient algorithms for VNF chaining and placement problem. ICIN 2017 : 20th Conference on Innovations in Clouds, Internet and Networks, Mar 2017, Paris, France. pp.92 - 99, ⟨10.1109/ICIN.2017.7899395⟩. ⟨hal-01630011⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Khedher, Emad Abd-Elrahman, Hossam Afifi, Michel Marot. Optimal and cost efficient algorithm for virtual CDN orchestration. LCN 2017 : 42nd IEEE Conference on Local Computer Networks, Oct 2017, Singapore, Singapore. pp.61 - 69, ⟨10.1109/LCN.2017.115⟩. ⟨hal-01664049⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01699347/file/18676.pdf BibTex
ref_biblio
Christophe Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana Durcheva, et al.. Security challenges in e-assessment and technical solutions. IV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩. ⟨hal-01699388⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01699388/file/18678.pdf BibTex
ref_biblio
Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
Accès au bibtex
BibTex
ref_biblio
Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin. Link reliable and trust aware RPL routing protocol for Internet of Things. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171360⟩. ⟨hal-01681446⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Lopez, Natalia Kushik, Djamal Zeghlache. Quality Estimation of Virtual Machine Placement in Cloud Infrastructures. 29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.213-229, ⟨10.1007/978-3-319-67549-7_13⟩. ⟨hal-01678958⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-01678958/file/449632_1_En_13_Chapter.pdf BibTex
ref_biblio
Jorge Eleazar Lopez Coronado, Natalia Kushik, Nina Yevtushenko, Djamal Zeghlache. Analyzing and validating virtual network requests. ICSOFT 2017 : 12th International Conference on Software Technologies, Jul 2017, Madrid, Spain. pp.441 - 446, ⟨10.5220/0006472304410446⟩. ⟨hal-01686297⟩
Accès au bibtex
BibTex
ref_biblio
Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01682257/file/2017-DASC-Serverless-Inventory-Mtita.pdf BibTex
ref_biblio
Lina Nachabe Ismail, Bachar El Hassan, Dima Al Mouhammad, Marc Girod-Genet. Intelligent system for diabetes patients monitoring and assistance. ICABME 2017 : 4th International Conference on Advances in Biomedical Engineering, Oct 2017, Beirut, Lebanon. pp.1 - 4, ⟨10.1109/ICABME.2017.8167570⟩. ⟨hal-01681434⟩
Accès au bibtex
BibTex
ref_biblio
Duy Huy Nguyen, Hang Nguyen, Eric Renault. Performance evaluation of E-MQS scheduler with mobility in LTE heterogeneous network. ICC 2017 : IEEE International Conference on Communications, May 2017, Paris, France. pp.1 - 6, ⟨10.1109/ICC.2017.7996487⟩. ⟨hal-01585029⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01585029/file/ICC2017-HuyND-E-MQS%20Scheduler_Camera-ready.pdf BibTex
ref_biblio
Minh Quang Nguyen, Hang Nguyen, Eric Renault, Yusheng Ji. Hybrid source-channel coding with bandwidth expansion for speech data. VTC Spring 2017 : IEEE 85th Vehicular Technology Conference, Jun 2017, Sydney, Australia. pp.1 - 5, ⟨10.1109/VTCSpring.2017.8108391⟩. ⟨hal-01654972⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01654972/file/%5Bquangnm%5D%20VTC.pdf BibTex
ref_biblio
Minh Quang Nguyen, Hang Nguyen, Eric Renault, Yusheng Ji. Hybrid digital-analog source-channel coding with adaptation. CCNC 2017 : 14th IEEE Consumer Communications & Networking Conference, Jan 2017, Las Vegas, United States. pp.957 - 962, ⟨10.1109/CCNC.2017.7983262⟩. ⟨hal-01703095⟩
Accès au bibtex
BibTex
ref_biblio
Steven Porretta, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Learning to communicate underwater: an exploration of limited mobility agents. WUWNET 2017 :12th International Conference on Underwater Networks & Systems, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, ⟨10.1145/3148675.3148709⟩. ⟨hal-01740876⟩
Accès au bibtex
BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Identifying content originator in social networks. GLOBECOM 2017 : IEEE International Conference on Global Communications, Dec 2017, Singapore, Singapore. pp.1 - 6, ⟨10.1109/GLOCOM.2017.8255074⟩. ⟨hal-01702753⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01649980/file/3071064.3071068.pdf BibTex
ref_biblio
Nikesh Man Shakya, Mehdi Mani, Noel Crespi. SEEOF: Smart Energy Efficient Objective Function. GIoTS 2017 : 1st IEEE Global Internet of Things Summit, Jun 2017, Geneva, Switzerland. pp.1 - 6, ⟨10.1109/GIOTS.2017.8016252⟩. ⟨hal-01586728⟩
Accès au bibtex
BibTex
ref_biblio
Sinda Smirani, Juwendo Denis, Badii Jouaber. Multilayered Wyner-Ziv lattice coding for single-cell point-to-multipoint communications. WIMOB 2017: IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2017, Rome, Italy. pp.1 - 6, ⟨10.1109/WiMOB.2017.8115817⟩. ⟨hal-01653382⟩
Accès au bibtex
BibTex
ref_biblio
Sinda Smirani, Juwendo Denis, Bakarime Diomande, Badii Jouaber. Wyner-Ziv nested lattice coding for single-cell multicast service delivery. PIMRC 2017 : IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.1 - 5, ⟨10.1109/PIMRC.2017.8292341⟩. ⟨hal-01710971⟩
Accès au bibtex
BibTex
ref_biblio
Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01576996/file/2017-SECRYPT-DR-Tcloseness.pdf BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A link failure recovery algorithm for Virtual Network Function chaining. IM 2017 : IFIP/IEEE Symposium on Integrated Network Management , May 2017, Lisbon, Portugal. pp.213 - 221, ⟨10.23919/INM.2017.7987282⟩. ⟨hal-01629687⟩
Accès au bibtex
BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. Energy efficient algorithm for VNF placement and chaining. CCGRID 2017 : 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017, Madrid, Spain. pp.579 - 588, ⟨10.1109/CCGRID.2017.84⟩. ⟨hal-01575711⟩
Accès au bibtex
BibTex
ref_biblio
Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. An efficient algorithm for virtual network function placement and chaining. CCNC 2017 : 14th IEEE conference on Consumer Communications & Networking, Jan 2017, Las Vegas, United States. pp.647 - 652, ⟨10.1109/CCNC.2017.7983207⟩. ⟨hal-01629694⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Xuan Huyen Do, Viet Hai Ha. Design and implementation of a new execution model for CAPE. SOICT 2017 : 8th international Symposium on Information and Communication Technology, Dec 2017, Nha Trang City, Vietnam. pp.453 - 459, ⟨10.1145/3155133.3155199⟩. ⟨hal-01702671⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Viet Hai Ha. Optimization of checkpoints and execution model for an implementation of OpenMP on distributed memory architectures. CCGRID 2017: 17th international symposium on Cluster, Cloud and Grid Computing, May 2017, Madrid, Spain. pp.711 - 714, ⟨10.1109/CCGRID.2017.119⟩. ⟨hal-01702680⟩
Accès au bibtex
BibTex
ref_biblio
Jun Zhang, Houda Labiod, Seif Eddine Hammami, Hossam Afifi. Scalable energy efficient routing in multi-layer femtocell networks. IWCMC 2017 : 13th International Wireless Communications & Mobile Computing Conference, Jun 2017, Valencia, Spain. pp.1540 - 1545, ⟨10.1109/IWCMC.2017.7986513⟩. ⟨hal-01577006⟩
Accès au bibtex
BibTex

2016

ref_biblio
Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Luigi Aztori, Makhlouf Hadji, Virginia Pilloni. IoT-D2D task allocation: an award-driven game theory approach. ICT 2016 : 23rd International Conference on Telecommunications, May 2016, Thessaloniki, Greece. pp.1 - 6, ⟨10.1109/ICT.2016.7500355⟩. ⟨hal-01370189⟩
Accès au bibtex
BibTex
ref_biblio
Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam-Mann, Noel Crespi, Joaquin Garcia-Alfaro, et al.. CACEV: a Cost and CArbon Emission-Efficient Virtual machine placement method for green distributed clouds. SCC 2016 : 13th IEEE International Conference on Services Computing , Jun 2016, San Francisco, United States. pp.275 - 282, ⟨10.1109/SCC.2016.43⟩. ⟨hal-01359868⟩
Accès au bibtex
BibTex
ref_biblio
Mayla Alimam, Emmanuel Bertin, Noel Crespi. Enterprise 2.0 : literature taxonomy and usage evaluation. POEM 2016 : 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling, Nov 2016, Skövde, Sweden. pp.26-40, ⟨10.1007/978-3-319-48393-1_3⟩. ⟨hal-01368016⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01368016/file/Poem%20-%20Camera%20ready%20-%20Enterprise%202.0%20Final.pdf BibTex
ref_biblio
Mayla Alimam, Emmanuel Bertin, Noel Crespi. Improving the Capabilities of Email for Businesses - The Case of Social Tagging. Twenty-Fourth European Conference on Information Systems (ECIS), Jun 2016, Istanbul, Turkey. ⟨hal-01368015⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01368015/file/Improving%20the%20Capabilities%20of%20Email%20for%20Businesses%20-%20The%20Case%20of%20Social%20Tagging%20-%20ECIS%202016%20-%20Camera%20ready.pdf BibTex
ref_biblio
Ichrak Amdouni, Fatma Hrizi, Anis Laouiti, Eduard Grasa, Hakima Chaouchi. Exploring the flexibility of network access control in the Recursive InterNetwork Architecture. APCC 2016 : 22nd Asia-Pacific Conference on Communications, Aug 2016, Yogyakarta, Indonesia. pp.559 - 566, ⟨10.1109/APCC.2016.7581476⟩. ⟨hal-01431552⟩
Accès au bibtex
BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01391253/file/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf BibTex
ref_biblio
Lyes Bouali, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Samia Bouzefrane, Mehammed Daoui. Virtualization techniques: challenges & opportunities. MSPN 2016 : International Conference on Mobile, Secure and Programmable Networking, Jun 2016, Paris, France. pp.49 - 62, ⟨10.1007/978-3-319-50463-6_5⟩. ⟨hal-01462931⟩
Accès au bibtex
BibTex
ref_biblio
Selma Boumerdassi, Eric Renault. A flooding-based solution to improve location services in VANETs. ICC 2016 : International Conference on Communications, May 2016, Kuala Lumpur, Malaysia. pp.1 - 6, ⟨10.1109/ICC.2016.7511575⟩. ⟨hal-01452205⟩
Accès au bibtex
BibTex
ref_biblio
Quyet Cao Huu, Imran Khan, Reza Farahbakhsh, Giyyarpuram Madhusudan, Gyu Myoung Lee, et al.. A trust model for data sharing in smart cities. ICC 2016 : IEEE International Conference on Communications : Communications for All Things, May 2016, Kuala Lumpur, Malaysia. pp.1 - 7, ⟨10.1109/ICC.2016.7510834⟩. ⟨hal-01348031⟩
Accès au bibtex
BibTex
ref_biblio
Yuanfang Chen, Lei Shu, Noel Crespi, Gyu Myoung Lee, Mohsen Guizani. Understanding the impact of network structure on propagation dynamics based on mobile big data. IWCMC 2016 : 12th International Wireless Communication and Mobile Computing Conference, Sep 2016, Paphos, Cyprus. pp.1018 - 1023, ⟨10.1109/IWCMC.2016.7577198⟩. ⟨hal-01404479⟩
Accès au bibtex
BibTex
ref_biblio
Nicolas Gensollen, Vincent Gauthier, Michel Marot, Monique Becker. Submodular optimization for control of prosumer networks. SMARTGRIDCOMM 2016 : 7th IEEE International Conference on Smart Grid Communications, Nov 2016, Sydney, Australia. pp.1 - 6, ⟨10.1109/SmartGridComm.2016.7778758⟩. ⟨hal-01663977⟩
Accès au bibtex
BibTex
ref_biblio
Chaima Ghribi, Marouen Mechtri, Djamal Zeghlache. Scalable virtual resource embedding in clouds. GLOBECOM 2016 : IEEE Global Communications Conference, Dec 2016, Washington, Dc, United States. pp.1 - 7, ⟨10.1109/GLOCOM.2016.7842242⟩. ⟨hal-01471721⟩
Accès au bibtex
BibTex
ref_biblio
Chaima Ghribi, Marouen Mechtri, Djamal Zeghlache. A dynamic programming algorithm for joint VNF placement and chaining. CAN 2016 : Workshop on Cloud-Assisted Networking, Dec 2016, Irvine, United States. pp.19 - 24 ⟨10.1145/3010079.3010083⟩. ⟨hal-01462061⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Hervé Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01468032/file/preprint_trustcom2016.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. New types of alert correlation for security information and event management systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Hervé Debar. Selection of mitigation actions based on financial and operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450193/file/preprint-ares-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450282/file/preprint-nordsec-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01487752/file/preprint_crisis2016.pdf BibTex
ref_biblio
Viet Hai Ha, Xuan Huyen Do, van Long Tran, Eric Renault. Creating an easy to use and high performance parallel platform on multi-cores networks. MSPN 2016 : 2nd International Conference on Mobile, Secure, and Programmable Networking, Jun 2016, Paris, France. pp.197 - 207, ⟨10.1007/978-3-319-50463-6_16⟩. ⟨hal-01452249⟩
Accès au bibtex
BibTex
ref_biblio
Samir Haddad, Jinane Sayah, Marc Girod-Genet, Bachar El Hassan. Optimized energy distribution in Wireless Sensor Networks. DIPDMWC 2016 : 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, Jul 2016, Moscow, Russia. pp.284 - 291, ⟨10.1109/DIPDMWC.2016.7529404⟩. ⟨hal-01358324⟩
Accès au bibtex
BibTex
ref_biblio
Makhlouf Hadji, Benjamin Aupetit, Djamal Zeghlache. Cost-efficient algorithms for critical resource allocation in cloud federations. CLOUDNET 2016 : 5th International Conference on Cloud Networking, Oct 2016, Pisa, Italy. pp.1 - 6, ⟨10.1109/CloudNet.2016.11⟩. ⟨hal-01471712⟩
Accès au bibtex
BibTex
ref_biblio
Seif Eddine Hammami, Hossam Afifi, Michel Marot, Vincent Gauthier. Network planning tool based on network classification and load prediction. WCNC 2016 : IEEE Wireless Communications and Networking Conference, Apr 2016, Doha, Qatar. pp.1 - 6, ⟨10.1109/WCNC.2016.7565166⟩. ⟨hal-01370148⟩
Accès au bibtex
BibTex
ref_biblio
Hamssa Hasrouny, Carole Bassil, Abed Ellatif Samhat, Anis Laouiti. Security risk analysis of a trust model for secure group leader-based communication in VANET. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.71 - 83, ⟨10.1007/978-981-10-3503-6_6⟩. ⟨hal-01532782⟩
Accès au texte intégral et bibtex
https://hal.sorbonne-universite.fr/hal-01532782/file/SecurityAnalysisofTrustModel.pdf BibTex
ref_biblio
Fatma Hrizi, Khalifa Toumi, Anis Laouiti. Trust-BZB : towards a trust-driven routing in vehicular networks. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.85 - 96, ⟨10.1007/978-981-10-3503-6_7⟩. ⟨hal-01496677⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi. OMAC: Optimal Migration Algorithm for virtual CDN. ICT 2016 : 23rd International Conference on Telecommunications, May 2016, Thessaloniki, Greece. pp.1 - 6, ⟨10.1109/ICT.2016.7500390⟩. ⟨hal-01370192⟩
Accès au bibtex
BibTex
ref_biblio
Hatem Ibn Khedher, Makhlouf Hadji, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Ahmed E. Kamal. Scalable and cost efficient algorithms for virtual CDN migration. LCN 2016 : 41st IEEE Conference on Local Computer Networks, Nov 2016, Dubai, United Arab Emirates. pp.112 - 120, ⟨10.1109/LCN.2016.23⟩. ⟨hal-01462218⟩
Accès au bibtex
BibTex
ref_biblio
Sonia Ikken, Eric Renault, Amine Barkat, M. Tahar Kechadi, Abdelkamel Tari. Efficient intermediate data placement in federated cloud data centers storage. MSPN 2016 : 2nd International Conference on Mobile, Secure, and Programmable Networking, Jun 2016, Paris, France. pp.1 - 15, ⟨10.1007/978-3-319-50463-6_1⟩. ⟨hal-01452230⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. Browser-to-browser authentication and trust relationships for WebRTC. UBICOMM 2016 : 10th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Oct 2016, Venice, Italy. pp.9 - 16. ⟨hal-01445063⟩
Accès au bibtex
BibTex
ref_biblio
Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi, Amir Mohammadinejad. Br2Br: a vector-based trust framework for WebRTC calling services. HPCC 2016 : 18th International Conference on High Performance Computing and Communications , Dec 2016, Sydney, Australia. pp.522 - 529, ⟨10.1109/HPCC-SmartCity-DSS.2016.0080⟩. ⟨hal-01463194⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Kaouthar Drira, Djamal Zeghlache. A self-stabilizing framework for dynamic bandwidth allocation in virtual networks. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.69 - 77, ⟨10.1109/NOMS.2016.7502798⟩. ⟨hal-01459193⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Kaouther Drira, Djamal Zeghlache. A self-stabilizing framework for dynamic bandwidth allocation in virtual networks. IEEE/IFIP Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. ⟨hal-01494259⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01494259/file/A%20self-stabilizing%20framework%20for%20dynamic%20bandwidth%20allocation%20in%20virtual%20networks.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01391343/file/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf BibTex
ref_biblio
Ghazaleh Khodabandelou, Vincent Gauthier, Mounim El Yacoubi, Marco Fiore. Population estimation from mobile network traffic metadata. WOWMOM 2016 : 17th International symposium on a world of wireless, mobile and multimedia networks, Jun 2016, Coimbra, Portugal. pp.1 - 9, ⟨10.1109/WoWMoM.2016.7523554⟩. ⟨hal-01426320⟩
Accès au bibtex
BibTex
ref_biblio
Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. VNF placement and chaining in distributed cloud. CLOUD 2016 : 9th IEEE International Conference on Cloud Computing, Jun 2016, San Francisco, United States. pp.376 - 383, ⟨10.1109/CLOUD.2016.0057⟩. ⟨hal-01462034⟩
Accès au bibtex
BibTex
ref_biblio
Marouen Mechtri, Imen Grida Ben Yahia, Djamal Zeghlache. Agile service manager for 5G. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.1285 - 1290, ⟨10.1109/NOMS.2016.7503004⟩. ⟨hal-01462110⟩
Accès au bibtex
BibTex
ref_biblio
Amir Mohammadinejad, Reza Farahbakhsh, Noel Crespi. Employing personality feature to rank the influential users in signed networks. SOCIALCOM 2016 : 9th International Conference on Social Computing and Networking, Oct 2016, Atlanta, United States. pp.346 - 353, ⟨10.1109/BDCloud-SocialCom-SustainCom.2016.59⟩. ⟨hal-01445075⟩
Accès au bibtex
BibTex
ref_biblio
Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Johnny Khawaja. Ontology based Tele-health Smart Home Care System: ontosmart to monitor elderly. CoNeCo 2016 : 8th International Conference on Computer Networks & Communications, Jun 2016, Zurich, Switzerland. pp.43 - 59, ⟨10.5121/csit.2016.60805⟩. ⟨hal-01340404⟩
Accès au bibtex
BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01391308/file/2016-WISTP-Signcryption-MIKEY-Kim-Nguyen.pdf BibTex
ref_biblio
Duy Huy Nguyen, Hang Nguyen, Eric Renault. E-MQS : a new downlink scheduler for real-time flows in LTE network. VTC FALL 2016 : 84th Vehicular Technology Conference , Sep 2016, Montreal, Canada. pp.1 - 5, ⟨10.1109/VTCFall.2016.7880981⟩. ⟨hal-01493173⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01493173/file/HuyND_P7_VTC%20Fall%202016.pdf BibTex
ref_biblio
Minh Quang Nguyen, Hang Nguyen, Eric Renault, Phan Thuan Do. Joint source-channel coding with adaptation. ICCE 2016 :6th International Conference on Communications and Electronics, Jul 2016, Halong Bay, Vietnam. pp.77 - 81, ⟨10.1109/CCE.2016.7562616⟩. ⟨hal-01446916⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01446916/file/adaptorForJSCC.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01391319/file/2016-ESORICS-Proxy-Reencryptor-Kim-Nguyen.pdf BibTex
ref_biblio
Manh Cuong Nguyen, Hang Nguyen, Eric Georgeaux, Philippe Mège, Laurent Martinod. Adaptive physical resource block design for enhancing voice capacity over LTE network in PMR context. PIMRC 2016 : 27th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2016, Valencia, Spain. pp.1 - 5, ⟨10.1109/PIMRC.2016.7794632⟩. ⟨hal-01446292⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01446292/file/nmcuongPRBmethod.pdf BibTex
ref_biblio
Duy Huy Nguyen, Hang Nguyen, Eric Renault. A new non-intrusive assessment method for VoLTE quality based on extended E-model. MSPN 2016: 2nd international conference on Mobile, Secure and Programmable Networking , Jun 2016, Paris, France. pp.122 - 136, ⟨10.1007/978-3-319-50463-6_11⟩. ⟨hal-01446945⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01446945/file/HuyND_P8_MSPN2016.pdf BibTex
ref_biblio
Duy-Huy Nguyen, Hang Nguyen. A dynamic rate adaptation algorithm using WB E-model for voice traffic over LTE network. 2016 Wireless Days (WD), IFIP; IEEE, Mar 2016, Toulouse, France. pp.1-6, ⟨10.1109/WD.2016.7461490⟩. ⟨hal-01319420⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01319420/file/07461490_WD2016.pdf BibTex
ref_biblio
Praboda Rajapaksha, Reza Farahbakhsh, Samin Karbalay Mohammadi Dastjerdi, Matthew N. Dailey, Noel Crespi. Video content delivery enhancement in CDNs based on users' social information. GLOBECOM 2016 : IEEE Global Communications Conference, Dec 2016, Washington Dc, United States. pp.1 - 6, ⟨10.1109/GLOCOMW.2016.7849079⟩. ⟨hal-01468028⟩
Accès au bibtex
BibTex
ref_biblio
Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered watermarking control to handle cyber-physical integrity attacks. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.3 - 19, ⟨10.1007/978-3-319-47560-8_1⟩. ⟨hal-01450276⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450276/file/preprint-nordsec-2016-A.pdf BibTex
ref_biblio
Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of cyber-physical systems : from theory to testbeds and validation. CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Sep 2016, Heraklion, Greece. pp.3 - 18, ⟨10.1007/978-3-319-61437-3_1⟩. ⟨hal-01543262⟩
Accès au bibtex
BibTex
ref_biblio
Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a watermark-based detection scheme to handle cyber-physical attacks. 11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzbourg, Austria. pp.21 - 28, ⟨10.1109/ARES.2016.2⟩. ⟨hal-01449821⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01449821/file/preprint-ares-2016-rw.pdf BibTex
ref_biblio
Mickael Salaun, Marion Daubignard, Hervé Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
Accès au bibtex
BibTex
ref_biblio
Yasir Saleem, Noel Crespi, Mubashir Husain Rehmani, Rebecca Copeland, Dina Hussein Ali, et al.. Exploitation of social IoT for recommendation services. WFIoT 2016 : 3rd World Forum on Internet of Things, Dec 2016, Reston, United States. pp.359 - 364, ⟨10.1109/WF-IoT.2016.7845500⟩. ⟨hal-01468020⟩
Accès au bibtex
BibTex
ref_biblio
Jose Manuel Sanchez Vilchez, Imen Grida Ben Yahia, Noel Crespi. Self-modeling based diagnosis of services over programmable networks. NETSOFT 2016 : 2nd IEEE Conference on Network Softwarization, Jun 2016, Seoul, South Korea. pp.277 - 285, ⟨10.1109/NETSOFT.2016.7502423⟩. ⟨hal-01348028⟩
Accès au bibtex
BibTex
ref_biblio
Abdallah Sobehy, Walid Ben-Ameur, Hossam Afifi, Amira Bradai. How to win elections. COLLABORATECOM 2016 : 12th International Conference on Collaborative Computing: Networking, Applications and Worksharing, Nov 2016, Beijing, China. pp.221 - 230, ⟨10.1007/978-3-319-59288-6_20⟩. ⟨hal-01710851⟩
Accès au bibtex
BibTex
ref_biblio
Oussama Soualah, Ilhem Fajjari, Makhlouf Hadji, Nadjib Aitsaadi, Djamal Zeghlache. A novel virtual network embedding scheme based on Gomory-Hu tree within cloud's backbone. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.536 - 542, ⟨10.1109/NOMS.2016.7502855⟩. ⟨hal-01459189⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Viet Hai Ha. Analysis and evaluation of the performance of CAPE. SCALCOM 2016 : International Conference on Scalable Computing and Communications, IEEE, Jul 2016, Toulouse, France. pp.620-627, ⟨10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0104⟩. ⟨hal-01496859⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01496859/file/paper2.pdf BibTex
ref_biblio
Quan Pham Van, Dominique Verchère, Selma Khebbache, Djamal Zeghlache, Patricia Layec, et al.. Virtualized routing and frequency allocation functions in elastic optical networks. ECOC 2016 : 42nd European Conference on Optical Communication, Sep 2016, Düsseldorf, Germany. pp.524 - 526. ⟨hal-01471669⟩
Accès au bibtex
BibTex
ref_biblio
Ifa Fatiha Zain, Azlan Awang, Anis Laouiti. Hybrid MAC protocols in VANET : a survey. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.3 - 14, ⟨10.1007/978-981-10-3503-6_1⟩. ⟨hal-01496679⟩
Accès au bibtex
BibTex

2015

ref_biblio
Emad Mohamed Abd Elrahman Abousabea, Hatem Ibn Khedher, Hossam Afifi, Thouraya Toukabri Gunes. Fast group discovery and non-repudiation in D2D communications using IBE. IWCMC 2015 : 11th Wireless Communications and Mobile Computing Conference, Aug 2015, Dubrovnik, Croatia. pp.616 - 621, ⟨10.1109/IWCMC.2015.7289154⟩. ⟨hal-01255105⟩
Accès au bibtex
BibTex
ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332029/file/preprint-ares-2015.pdf BibTex
ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332331/file/preprint-secrypt-2015.pdf BibTex
ref_biblio
Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atechian, Carole Bassil. Privacy using mobile cloud. DICTAP 2015 : 5th International Conference on Digital Information and Communication Technology and its Applications, Apr 2015, Beirut, Lebanon. pp.178 - 182, ⟨10.1109/DICTAP.2015.7113194⟩. ⟨hal-01272387⟩
Accès au bibtex
BibTex
ref_biblio
Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Rami Yared, Talar Atechian. Micro-economy effect on cloud federation. GSCIT 2015 : Global Summit on Computer & Information Technology, Jun 2015, Sousse, Tunisia. pp.1 - 4, ⟨10.1109/GSCIT.2015.7353324⟩. ⟨hal-01272535⟩
Accès au bibtex
BibTex
ref_biblio
Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atechian. Enhanced revenue optimizing SLA-based admission control for IaaS cloud networks. FICLOUD 2015 : 3rd International Conference on Future Internet of Things and Cloud, Aug 2015, Rome, Italy. pp.225 - 230, ⟨10.1109/FiCloud.2015.123⟩. ⟨hal-01272068⟩
Accès au bibtex
BibTex
ref_biblio
Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01279183/file/2015-Netgames-Fortat-model-security-Requirements.pdf BibTex
ref_biblio
Fréjus Gbaguidi, Selma Boumerdassi, Eric Renault, Eugène Ezin. Characterizing servers workload in cloud datacenters. FICLOUD 2015 : 3rd International Conference on Future Internet of Things and Cloud, Aug 2015, Rome, Italy. pp.657 - 661, ⟨10.1109/FiCloud.2015.120⟩. ⟨hal-01269580⟩
Accès au bibtex
BibTex
ref_biblio
Giovanni Giambene, van Anh Le, Thomas Bourgeau, Hakima Chaouchi. Soft frequency reuse schemes for heterogeneous LTE systems. ICC 2015 : IEEE International Conference on Communications, Jun 2015, Londres, United Kingdom. pp.3161 - 3166, ⟨10.1109/ICC.2015.7248810⟩. ⟨hal-01272534⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01263402/file/preprint-NTMS-2015.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332277/file/preprint-securecomm-2015.pdf BibTex
ref_biblio
Quyet H. Cao, Giyyarpuram Madhusudan, Reza Farahbakhsh, Noel Crespi. Usage control for data handling in smart cities. GLOBECOM 2015 : IEEE Global Communications Conference, Dec 2015, San Diego, United States. pp.1 - 6, ⟨10.1109/GLOCOM.2015.7417270⟩. ⟨hal-01367526⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01367526/file/paper1_conf.pdf BibTex
ref_biblio
Xiao Han, Leye Wang, Ngoc Son Han, Chao Chen, Noel Crespi, et al.. Link prediction for new users in Social Networks. ICC 2015 : IEEE International Conference on Communications , Jun 2015, London, United Kingdom. pp.1250 - 1255, ⟨10.1109/ICC.2015.7248494⟩. ⟨hal-01334023⟩
Accès au bibtex
BibTex
ref_biblio
Son Han, Quyet Cao Huu, Bahram Alinia, Noel Crespi. Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. AICCSA : 12th ACS/IEEE International Conference on Computer Systems and Applications, Nov 2015, Marrakech, Morocco. pp.1 - 8, ⟨10.1109/AICCSA.2015.7507264⟩. ⟨hal-01348001⟩
Accès au bibtex
BibTex
ref_biblio
Sonia Ikken, Eric Renault, M. Tahar Kechadi, Abdelkamel Tari. Toward scheduling I/O request of Mapreduce tasks based on Markov model. MSPN 2015 : First International Conference on Mobile, Secure and Programmable Networking , Jun 2015, Paris, France. pp.78 - 89, ⟨10.1007/978-3-319-25744-0_7⟩. ⟨hal-01269602⟩
Accès au bibtex
BibTex
ref_biblio
Houda Jmila, Djamal Zeghlache. An Adaptive Load Balancing Scheme for Evolving Virtual Networks. 12th Annual IEEE Consumer Communications & Networking Conference, Jan 2015, Las Vegas, United States. ⟨10.1109/CCNC.2015.7158024⟩. ⟨hal-01494255⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01494255/file/An%20Adaptive%20Load%20Balancing%20Scheme%20for%20Evolving%20Virtual%20Networks.pdf BibTex
ref_biblio
Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01283997/file/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf BibTex
ref_biblio
Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01285358/file/NTMS2015-Mtita-ServerlessProtocol.pdf BibTex
ref_biblio
Minh Quang Nguyen, Hang Nguyen. Joint effect of channel coding and AMR compression on speech quality. WICOM 2015 : 11th International Conference on Wireless Communications, Networking and Mobile Computing, Sep 2015, Shanghai, China. pp.291 - 295. ⟨hal-01272054⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01272054/file/compression-channel-coding.pdf BibTex
ref_biblio
Duy Huy Nguyen, Hang Nguyen. An improved Log-MAP algorithm based on polynomial regression function for LTE Turbo decoding. ICCW 2015 : International Conference on Communications, Jun 2015, London, United Kingdom. pp.2163 - 2167, ⟨10.1109/ICCW.2015.7247502⟩. ⟨hal-01283990⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01283990/file/ICCW2015-An-improved-Log-MAP-algorithm.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01279169/file/2015-trustcom-Signcryption.pdf BibTex
ref_biblio
Soochang Park, Dina Hussein Ali, Noel Crespi. On-site service discovery along user roaming over Internet of Things. ICCE 2015 : International Conference on Consumer Electronics, Jan 2015, Las Vegas, United States. pp.194 - 195, ⟨10.1109/ICCE.2015.7066377⟩. ⟨hal-01297735⟩
Accès au bibtex
BibTex
ref_biblio
Thouraya Toukabri, Adel Mounir Sareh Said, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi. Distributed D2D architecture for ITS services in advanced 4G networks. VTC Fall 2015 : IEEE 82nd Vehicular Technology Conference, Sep 2015, Boston, United States. pp.1 - 7, ⟨10.1109/VTCFall.2015.7390893⟩. ⟨hal-01282874⟩
Accès au bibtex
BibTex
ref_biblio
van Long Tran, Eric Renault, Viet Hai Ha. Improving the reliability and the performance of CAPE by using MPI for data exchange on network. MSPN 2015 : First International Conference on Mobile, Secure and Programmable Networking, Jun 2015, Paris, France. pp.90 - 100, ⟨10.1007/978-3-319-25744-0_8⟩. ⟨hal-01377623⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01377623/file/paper01_v1.1_Edited_OLD.pdf BibTex
ref_biblio
Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier. CrowdTasker : maximizing coverage quality in Piggyback Crowdsensing under budget constraint. PERCOM 2015 : International Conference on Pervasive Computing and Communications, Mar 2015, Saint Louis, United States. pp.55 - 62, ⟨10.1109/PERCOM.2015.7146509⟩. ⟨hal-01464645⟩
Accès au bibtex
BibTex
ref_biblio
Chen Yuanfang, Noel Crespi, Lei Shu, Lee Myoung Gyu. Reality Mining with Mobile Data. Understanding the Impact of Network Structure on Propagation Dynamics, ICA3PP 2015, 2015, Zhangjiajie, China. pp. 442-461. ⟨hal-01476292⟩
Accès au bibtex
BibTex

2014

ref_biblio
Jacques Abou Abdo, Jacques Demerjian, Hakima Chaouchi, Kabalan Barbar, Guy Pujolle. Operator centric mobile cloud architecture. WCNC 2014 : Wireless Communications and Networking Conference, Apr 2014, Istanbul, Turkey. pp.2982 - 2987, ⟨10.1109/WCNC.2014.6952953⟩. ⟨hal-01281766⟩
Accès au bibtex
BibTex
ref_biblio
Rebecca Copeland, Noel Crespi. Identifying risk profiles and mitigating actions for business communication services. CNSM 2014 : 10th International Conference on Network and Service Management, Nov 2014, Rio De Janeiro, Brazil. pp.236 - 241, ⟨10.1109/CNSM.2014.7014165⟩. ⟨hal-01286074⟩
Accès au bibtex
BibTex
ref_biblio
Rebecca Copeland, Noel Crespi. Rating credibility of sources for profiling risk and business context of service requests. SCC 2014 : IEEE International Conference on Services Computing, Jun 2014, Anchorage, United States. pp.416 - 423, ⟨10.1109/SCC.2014.62⟩. ⟨hal-01334171⟩
Accès au bibtex
BibTex
ref_biblio
Chaima Ghribi, Djamal Zeghlache. Exact and heuristic graph-coloring for energy efficient advance cloud resource reservation. CLOUD 2014 : 7th International Conference on Cloud Computing, Jun 2014, Alaska, United States. pp.112 - 119, ⟨10.1109/CLOUD.2014.25⟩. ⟨hal-01281941⟩
Accès au bibtex
BibTex
ref_biblio
Toufik Guettari, Jérôme Boudy, Badr-Eddine Benkelfat, Jean-Louis Baldinger, Pascal Doré, et al.. Thermal signal analysis in smart home environment for detecting a human presence. ATSIP 2014 : 1st International Conference on Advanced Technologies for Signal and Image Processing, Mar 2014, Sousse, Tunisia. pp.334 - 339, ⟨10.1109/ATSIP.2014.6834631⟩. ⟨hal-01304371⟩
Accès au bibtex
BibTex
ref_biblio
Toufik Guettari, Jérôme Boudy, Badr-Eddine Benkelfat, Jean-Louis Baldinger, Pascal Doré, et al.. Analyse du signal thermique dans un environement intelligent pour detecter la présence humaine. Journées d'Etude en TéléSanté (JETSAN 2014), Jun 2014, Troyes, France. pp.1 - 6. ⟨hal-01459133⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01459133/file/Guettari%20JETSAN%20%202014.pdf BibTex
ref_biblio
Mohamed Hadded, Rachid Zagrouba, Anis Laouiti, Paul Mühlethaler, Leila Azouz Saidane. An optimal strategy for collision-free slots allocations in Vehicular Ad-hoc NETworks. IWVSC 2014 : 1st International Workshop on Vehicular Adhoc Networks for Smart Cities, Jun 2014, Kuala Lumpur, Malaysia. pp.15 - 30, ⟨10.1007/978-981-287-158-9_2⟩. ⟨hal-01304348⟩
Accès au bibtex
BibTex
ref_biblio
Xiao Han, Leye Wang, Soochang Park, Angel Cuevas Rumin, Noel Crespi. Alike people, alike interests? A large-scale study on interest similarity in social networks. ASONAM 2014 : IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug 2014, Beijing, China. pp.491 - 496, ⟨10.1109/ASONAM.2014.6921631⟩. ⟨hal-01340426⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01340426/file/ASONAM2014.pdf BibTex
ref_biblio
Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identités multiples et protection des données à caractère personnel dans le champ des identités numériques : quelques aspects du paysage européen. 5ème Atelier sur la Protection de la Vie Privée, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
Accès au bibtex
BibTex
ref_biblio
Pinar Kirci, Hakima Chaouchi, Anis Laouiti. Wireless sensor networks and efficient localisation. FICLOUD 2014 : International Conference on Future Internet of Things and Cloud, Aug 2014, Barcelona, Spain. pp.98 - 100, ⟨10.1109/FiCloud.2014.25⟩. ⟨hal-01332368⟩
Accès au bibtex
BibTex
ref_biblio
Cuong Nguyen Manh, Hang Nguyen, Alina Alexandra Florea, Philippe Mège, Laurent Martinod, et al.. Architecture for multi-users multiplexing radio voice transmission for enhancing voice capacity over LTE in PMR context. PIMRC 2014 : IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, Sep 2014, Washington Dc, United States. pp.1459 - 1463 ⟨10.1109/PIMRC.2014.7136398⟩. ⟨hal-01286077⟩
Accès au bibtex
BibTex
ref_biblio
Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Hervé Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332339/file/badgers14_ssl.pdf BibTex
ref_biblio
Bruno Robillart, Cosimo Calo, Abdoulaye Fall, François Lamare, Yaneck Gottesman, et al.. Spectral and temporal phase measurement by Optical Frequency-Domain Reflectometry. PHOTONICS WEST 2014 : Fiber Lasers XI Conference, Feb 2014, San Francisco, CA, United States. pp.896134, ⟨10.1117/12.2039600⟩. ⟨hal-01285646⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01285646/file/article%20SPIE%20PW%202014.pdf BibTex
ref_biblio
Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. Digital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France. ⟨hal-01281994⟩
Accès au bibtex
BibTex

2013

ref_biblio
Ehsan Ahvar, Gyu Myoung Lee, Noel Crespi. A cluster-based peer-to-peer architecture for cloud-based smart homes. CCIS 2013 : International Workshop on Cloud Computing and Information Security, Nov 2013, Shanghai, China. ⟨hal-01369458⟩
Accès au bibtex
BibTex
ref_biblio
Emmanuel Bertin, Sébastien Cubaud, Stéphane Tuffin, Stéphane Cazeaux, Noel Crespi, et al.. WebRTC, the day after: what's next for conversational services?. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.46 - 52, ⟨10.1109/ICIN.2013.6670893⟩. ⟨hal-01274311⟩
Accès au bibtex
BibTex
ref_biblio
Amira Bradai, Hossam Afifi. Game theoretic framework for reputation-based distributed intrusion detection. PASSAT 2013 : ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust, Sep 2013, Washington D.C., United States. pp.214 - 219, ⟨10.1109/SocialCom.2013.84⟩. ⟨hal-01274853⟩
Accès au bibtex
BibTex
ref_biblio
Wipada Chanthaweethip, Xiao Han, Noel Crespi, Yuanfang Chen, Reza Farahbakhsh, et al.. 'Current City' prediction for coarse location based applications on Facebook. GLOBECOM 2013 : IEEE Global Communications Conference, Exhibition & Industry Forum, Dec 2013, Atlanta, United States. pp.3188 - 3193, ⟨10.1109/GLOCOM.2013.6831562⟩. ⟨hal-01297715⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01297715/file/Globalcomm_final.pdf BibTex
ref_biblio
Yuanfang Chen, Antonio M. Ortiz, Noel Crespi, Lei Shu, Lin Lv. Reality mining: digging the impact of friendship and location on crowd behavior. MOBIQUITOUS 2013 : 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Dec 2013, Tokyo, Japan. pp.142 - 154, ⟨10.1007/978-3-319-11569-6_12⟩. ⟨hal-01285971⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01285971/file/mobiqious_8.15_submit.pdf BibTex
ref_biblio
Bachir Chihani, Emmanuel Bertin, Noel Crespi. A graph-based context modeling approach. SACONET 2013: 4th International Conference on Smart Communications in Network Technologies, Jun 2013, Paris, France. pp.1 - 6, ⟨10.1109/SaCoNeT.2013.6654570⟩. ⟨hal-01277790⟩
Accès au bibtex
BibTex
ref_biblio
Bachir Chihani, Emmanuel Bertin, Noel Crespi. A user-centric context-aware mobile assistant. ICIN 2013 : 17th International Conference on Intelligence in Next Generation Networks, Oct 2013, Venice, Italy. pp.110 - 117, ⟨10.1109/ICIN.2013.6670901⟩. ⟨hal-01298746⟩
Accès au bibtex
BibTex
ref_biblio
Rebecca Copeland, Noel Crespi. Wallet-on-wheels using vehicle's identity for secure mobile money. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.102 - 109, ⟨10.1109/ICIN.2013.6670900⟩. ⟨hal-01274842⟩
Accès au bibtex
BibTex
ref_biblio
Wassim Drira, Eric Renault, Djamal Zeghlache. Towards a secure social sensor network. BIBM 2013 : International Conference on Bioinformatics and Biomedicine, Dec 2013, Shanghai, China. pp.24 - 29, ⟨10.1109/BIBM.2013.6732730⟩. ⟨hal-01281932⟩
Accès au bibtex
BibTex
ref_biblio
Marwa Elbouz, Fatma Bouzidi, Ayman Alfalou, Christian Brosseau, Isabelle Leonard, et al.. Adapted all-numerical correlator for face recognition applications. SPIE Defense, Security and Sensing 2013 : Optical Pattern Recognition XXIV, Apr 2013, Baltimore, United States. pp.874807 - ⟨10.1117/12.2014383⟩. ⟨hal-01696143⟩
Accès au bibtex
BibTex
ref_biblio
Reza Farahbakhsh, Angel Cuevas Rumin, Rubén Cuevas Rumin, Reza Rejaie, Michal Kryczka, et al.. Investigating the reaction of BitTorrent content publishers to antipiracy actions. P2P 2013 : 13th International Conference on Peer-to-Peer Computing, Sep 2013, Trento, Italy. pp.1 - 10, ⟨10.1109/P2P.2013.6688699⟩. ⟨hal-01286059⟩
Accès au bibtex
BibTex
ref_biblio
Takoua Ghariani, Badii Jouaber. Energy aware cross layer uplink scheduling for multihomed environments. GLOBECOM 2013 : 5th IEEE International Workshop on Management of Emerging Networks and Services, Dec 2013, Atlanta, United States. pp.861 - 866, ⟨10.1109/GLOCOMW.2013.6825097⟩. ⟨hal-01281918⟩
Accès au bibtex
BibTex
ref_biblio
Toufik Guettari, Jérôme Boudy, Dan Istrate, Badr-Eddine Benkelfat, Pascal Doré, et al.. Multimodal indoor tracking and localization in the context of healthcare monitoring system. JETSAN 2013 : Journées d'Etude en TéléSanté, May 2013, Fontainebleau, France. ⟨hal-01464756⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01275089/file/2013-cloud-IDbased-cloudstorage.pdf BibTex
ref_biblio
Antonio Manzalini, Roberto Minerva, Ernest Kaempfer, Franco Callegati, Aldo Campi, et al.. Manifesto of edge ICT fabric. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.9 - 15, ⟨10.1109/ICIN.2013.6670888⟩. ⟨hal-01274290⟩
Accès au bibtex
BibTex
ref_biblio
Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Real-time malicious fast-flux detection using DNS and bot related features. PST 2013 : 11th International Conference on Privacy, Security and Trust, Jul 2013, Tarragona, Spain. pp.369 - 372, ⟨10.1109/PST.2013.6596093⟩. ⟨hal-01275014⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Fernando Royo, Teresa Olivares, Noel Crespi, Luis Orozco Barbosa. Smart wireless design scheme: fuzzy-logic routing and TDMA MAC protocol integration. MOBIWAC 2013: 11th ACM International Symposium on Mobility Management and Wireless Access, Nov 2013, Barcelona, Spain. pp.81 - 88, ⟨10.1145/2508222.2508229⟩. ⟨hal-01286008⟩
Accès au bibtex
BibTex
ref_biblio
Bruno Vidalenc, Ludovic Noirie, Laurent Ciavaglia, Eric Renault. Dynamic risk-aware routing for OSPF networks. IM 2013 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.226 - 234. ⟨hal-00850335⟩
Accès au bibtex
BibTex
ref_biblio
Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
Accès au bibtex
BibTex

2012

ref_biblio
Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01300733/file/NTMS2012-Bekara-Kheira.pdf BibTex
ref_biblio
Ming-Chen Chung, Gyu Myoung Lee, Noel Crespi, Chien-Chao Tseng. RFID object tracking with IP compatibility for the internet of things. iThings 2012 : IEEE International Conference on Internet of Things, Nov 2012, Besançon, France. pp.132 - 139, ⟨10.1109/GreenCom.2012.30⟩. ⟨hal-00820265⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): mécanismes de prévention contre l'usurpation d'adresses IP source. SSTIC 2012 : Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01300731/file/SSTIC20112-SAVI-Combes.pdf BibTex
ref_biblio
Wassim Drira, Eric Renault, Djamal Zeghlache. Towards a dynamic middleware for wireless sensor networks. ICNFI 2012 : International Conference on Networking and Future Internet, Apr 2012, Istanbul, Turkey. pp.42 - 45. ⟨hal-01300847⟩
Accès au bibtex
BibTex
ref_biblio
Wassim Drira, Eric Renault, Djamal Zeghlache. Design and performance evaluation of a composite-based back end system for WSNs. IWCMC 2012 : 8th International Wireless Communications and Mobile Computing Conference, Aug 2012, Limassol, Cyprus. pp.1142 - 1148, ⟨10.1109/IWCMC.2012.6314367⟩. ⟨hal-01299328⟩
Accès au bibtex
BibTex
ref_biblio
Takoua Ghariani, Mehdi Loukil, Badii Jouaber. ECO-WISM: Energy Consumption Optimization for Wireless Interface Selection Mechanism. ICNFI 2012 : International Conference on Networking and Future Internet, Apr 2012, Istanbul, Turkey. ⟨hal-01461601⟩
Accès au bibtex
BibTex
ref_biblio
Viet Hai Ha, Eric Renault. Design of a shared-memory model for CAPE. IWOMP 2012 : 8th International Workshop on OpenMP, Jun 2012, Rome, Italy. pp.262 - 266, ⟨10.1007/978-3-642-30961-8_22⟩. ⟨hal-01300124⟩
Accès au bibtex
BibTex
ref_biblio
Marc Lacoste, Aurelien Wailly, Hervé Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
Accès au bibtex
BibTex
ref_biblio
Nassim Laga, Emmanuel Bertin, Noel Crespi. Promoting mashup creation through unstructured data extraction. ICOIN 2012 : International Conference on Information Networking, Feb 2012, Bali, Indonesia. pp.59-64, ⟨10.1109/ICOIN.2012.6164349⟩. ⟨hal-01300851⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01300851/file/ICOINIEEEVersion1.pdf BibTex
ref_biblio
Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
Accès au bibtex
BibTex
ref_biblio
Aida Seck, Jordi Vuong, Petros Ramantanis, Djalal Falih Bendimerad, Yann Frignac, et al.. Numerical investigation of performance variability for WDM transmission systems using PDM-QPSK channels. OFC/NFOEC 2012 : Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference, Mar 2012, Los Angeles, United States. pp.1 - 3, ⟨10.1364/NFOEC.2012.JW2A.51⟩. ⟨hal-01344518⟩
Accès au bibtex
BibTex
ref_biblio
Zhenzhen Zhao, Ji Liu, Noel Crespi. Dig-event: let's socialize around events. CSCW 2012 : ACM Conference on Computer Supported Cooperative Work, Feb 2012, Seattle, United States. pp.279 - 280, ⟨10.1145/2141512.2141602⟩. ⟨hal-01300820⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01300820/file/Dig-Event_camera_ready.pdf BibTex

2011

ref_biblio
Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
Accès au bibtex
BibTex
ref_biblio
Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304081/file/OntologyPaper-Kheira-Bekara-Sar-SSI2011.pdf BibTex
ref_biblio
Djalal Falih Bendimerad, Badr-Eddine Benkelfat, Yaneck Gottesman, Omar Seddiki, Rachid Hamdi. Performances of a tunable birefringent filter for high density multi-wavelength applications. Photonics North 2011 : International Conference on Application Photonic Technology, May 2011, Ottawa, Canada. ⟨hal-01302217⟩
Accès au bibtex
BibTex
ref_biblio
Emmanuel Bertin, Noel Crespi, Michel L'Hostis. A few myths about Telco and OTT models. ICIN 2011 : 15th International Conference on Intelligence in Next Generation Networks : From Bits to Data, from Pipes to Clouds, Oct 2011, Berlin, Germany. pp.6 - 10, ⟨10.1109/ICIN.2011.6081106⟩. ⟨hal-01303630⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303630/file/PID2045297.pdf BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011 : IEEE Wireless Communications and Networking Conference, Mar 2011, Cancun, Mexico. pp.784 - 789, ⟨10.1109/WCNC.2011.5779232⟩. ⟨hal-01304157⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304157/file/Aymen-WCNC2011-ID-based-Authentication-MeshNetworks.pdf BibTex
ref_biblio
Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
Accès au bibtex
BibTex
ref_biblio
Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304077/file/M-CGA-Tony-Cheneau-SAR-SSI-2011.pdf BibTex
ref_biblio
Bachir Chihani, Emmanuel Bertin, Noel Crespi. A comprehensive framework for context-aware communication services. ICIN 2011 : 15th International Conference on Intelligence in Next Generation Networks : From Bits to Data, from Pipes to Clouds, Oct 2011, Berlin, Germany. pp.52 - 57, ⟨10.1109/ICIN.2011.6081102⟩. ⟨hal-01303628⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303628/file/1569431045.pdf BibTex
ref_biblio
Kwangjin Choi, Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Navigation information-based proxy server handoff for mobile IPTV services. ITC-CSCC 2011 : 26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun 2011, Gyeongju, South Korea. pp.1170-1173. ⟨hal-01302433⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01302433/file/ckj_camera.pdf BibTex
ref_biblio
Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. Wireless sensor networks energy based protocol in medical application. WiCOM 2011 : 7th International Conference on Wireless Communications, Networking and Mobile Computing, Sep 2011, Wuhan, China. pp.1 - 6, ⟨10.1109/wicom.2011.6040383⟩. ⟨hal-01347756⟩
Accès au bibtex
BibTex
ref_biblio
Sonia Elwardi-Ben Amor, Mourad Zghal, Badr-Eddine Benkelfat. Optimization of coherence multiplexed coding for high density signal processing. PIERS 2011 : Progress In Electromagnetics Research Symposium, Mar 2011, Marrakesh, Morocco. pp.1243 - 1246. ⟨hal-01302403⟩
Accès au bibtex
BibTex
ref_biblio
Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303641/file/NSS2011-SophieGastellier-Pharming.pdf BibTex
ref_biblio
Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304087/file/Paper-gastellier-decisive-heuristics-SARSSI11.pdf BibTex
ref_biblio
Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304168/file/Gastellier-NTMS2011-Dual-Approach-Pharming.pdf BibTex
ref_biblio
Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303880/file/Gomez-integrationofRFIDandWSNCM2011.pdf BibTex
ref_biblio
Mathew Pradeep Goonewardena, Nandana Rajatheva, Tijani Chahed, Djamal Zeghlache. ENPA and EBPA models for primary user activity based power allocation in cognitive systems. PIMRC 2011 : 22nd Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2011, Toronto, Canada. pp.671 - 675, ⟨10.1109/PIMRC.2011.6140048⟩. ⟨hal-01302213⟩
Accès au bibtex
BibTex
ref_biblio
Zeynep Gurkas Aydin, Abdul Halim Zaim, Hakima Chaouchi, Tülin Atmaca. Extended early update for host identity protocol with movement prediction. ICNFI 2011 : 1st International Conference on Networking and Future Internet, Apr 2011, Paris, France. ⟨hal-01354611⟩
Accès au bibtex
BibTex
ref_biblio
Zeynep Gurkas Aydin, Abdul Halim Zaim, Hakima Chaouchi, Tülin Atmaca. A prediction based mobility extension for eHIP protocol. ISCIS 2011 : 26th International Symposium on Computer and Information Sciences, Sep 2011, London, United Kingdom. pp.209 - 213, ⟨10.1007/978-1-4471-2155-8_26⟩. ⟨hal-01302447⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Hervé Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
Accès au bibtex
BibTex
ref_biblio
Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache. Jeux non-coopératifs dans les clouds : tarification des services. ROADEF 2011 : 12e Congrès Annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision, Mar 2011, Saint-Etienne, France. ⟨hal-01343139⟩
Accès au bibtex
BibTex
ref_biblio
Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache. Constrained pricing for cloud resource allocation. NCA 2011 : 10th IEEE International Symposium on Network Computing and Applications, Aug 2011, Cambridge, United States. pp.359 - 365, ⟨10.1109/NCA.2011.64⟩. ⟨hal-01303658⟩
Accès au bibtex
BibTex
ref_biblio
Ines Houidi, Marouen Mechtri, Wajdi Louati, Djamal Zeghlache. Cloud service delivery across multiple cloud platforms. SCC 2011 : 8th International Conference on Services Computing, Jul 2011, Washington, United States. pp.741 - 742, ⟨10.1109/SCC.2011.107⟩. ⟨hal-01303863⟩
Accès au bibtex
BibTex
ref_biblio
Xin Jin, Abdelwaheb Marzouki, Li Chuan Tseng, Mathew Pradeep Goonewardena, Djamal Zeghlache. Adaptive resource allocation using Kalman filters in busy and idle bands for WPM-based cognitive radio systems. SCVT 2011 : 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux, Nov 2011, Ghent, Belgium. pp.1 - 5, ⟨10.1109/SCVT.2011.6101298⟩. ⟨hal-01345055⟩
Accès au bibtex
BibTex
ref_biblio
Khalil Ur Rehman Laghari, Noel Crespi, Benjamin Molina, Carlos E. Palau. QoE aware Service delivery in distributed environment. WAINA 2011 : IEEE Workshops of International Conference on Advanced Information Networking and Applications, Mar 2011, Singapour, Singapore. pp.837-842, ⟨10.1109/WAINA.2011.58⟩. ⟨hal-01303062⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303062/file/WAINApaper.pdf BibTex
ref_biblio
Sondes Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303801/file/Larafa-ieeeiscc2011.pdf BibTex
ref_biblio
Gyu Myoung Lee, Noel Crespi. Internet of things for smart objects : ubiquitous networking between humans and objects. ICAIT 2011 : International Conference on Advanced Infocomm Technology, Jul 2011, Wuhan, China. ⟨hal-01465049⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01465049/file/ICAIT-gmlee-20110503.pdf BibTex
ref_biblio
Gyu Myoung Lee, Noel Crespi. The internet of things : challenge for a new architecture from problems. Interconnecting Smart Objects with the Internet Workshop 2011, Mar 2011, Prague, Czech Republic. pp.1 - 2. ⟨hal-01304069⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304069/file/IoT%20position%20paper-gmlee-201103.pdf BibTex
ref_biblio
Houssem Medhioub, Ines Houidi, Wajdi Louati, Djamal Zeghlache. Design, implementation and evaluation of virtual resource description and clustering framework. AINA 2011 : 25th IEEE International Conference on Advanced Information Networking and Applications, Mar 2011, Singapour, Singapore. pp.83 - 89 ⟨10.1109/AINA.2011.46⟩. ⟨hal-01304190⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304190/file/Design%20Implementation%20and%20Evaluation%20of%20Virtual%20Resource%20Description%20and%20Clustering%20Framework.pdf BibTex
ref_biblio
S. H. Shah Newaz, Raja Usman Akbar, Y Lim, Gyu Myoung Lee, Noel Crespi, et al.. Efficient mobile IP location update mechanism for idle terminals in optical wireless integrated access networks. ICNS 2011 : 7th International Conference on Networking and Services, May 2011, Venice/Mestre, Italy. pp.257 - 261. ⟨hal-01303869⟩
Accès au bibtex
BibTex
ref_biblio
S. H. Shah Newaz, Youngin Bae, Jongmin Lee, Gyu Myoung Lee, Noel Crespi, et al.. Minimizing the number of IGMP report messages for receiver-driven layered video multicasting. VTC SPRING 2011 : IEEE 73rd Vehicular Technology Conference, May 2011, Budapest, Hungary. pp.1-5, ⟨10.1109/VETECS.2011.5956740⟩. ⟨hal-01304075⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01304075/file/PID1082148.pdf BibTex
ref_biblio
S. H. Shah Newaz, Angel Cuevas Rumin, Gyu Myoung Lee, Noel Crespi, Jun Kyun Choi. A novel approach for making energy efficient PON. SIGCOMM 2011 : Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, Aug 2011, Toronto, Canada. pp.428 - 429, ⟨10.1145/2018436.2018503⟩. ⟨hal-01464994⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Wendong Xiao, Hakima Chaouchi. Cooperative fingerprint-based indoor localization using self-organizing maps. IWCMC 2011 : 7th International Wireless Communications and Mobile Computing Conference, Jul 2011, Istanbul, Turkey. pp.1814 - 1819, ⟨10.1109/IWCMC.2011.5982810⟩. ⟨hal-01302453⟩
Accès au bibtex
BibTex
ref_biblio
Muhammad Shoaib Saleem, Eric Renault, Djamal Zeghlache. Architecture and design of network of information mobile node. ICNFI 2011 : 1st International Conference on Networking and Future Internet, Apr 2011, Paris, France. ⟨hal-01465024⟩
Accès au bibtex
BibTex
ref_biblio
Sivasothy Shanmugalingam, Vincent Verdot, Noel Crespi, Paul Labrogere. A solution for partial video voice over IP session transfer and retrieval. WPMC 2011 : 14th International Symposium on Wireless Personal Multimedia Communications, Oct 2011, Brest, France. pp.1-5. ⟨hal-01303623⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303623/file/1569450629.pdf BibTex
ref_biblio
Ines Slama, Djamal Zeghlache. A new energy efficient interface selection mechanism for power saving at multi-interface mobile terminals. WTS 2011 : Wireless Telecommunications Symposium, Apr 2011, New York City, United States. ⟨hal-01355089⟩
Accès au bibtex
BibTex
ref_biblio
Juan R. Velasco, Marc Roelands, Dries de Roeck, Rob Moonen, Lieven Trappeniers, et al.. Do-it-yourself creation of pervasive, tangible applications. TEI 2011 : 5th International Conference on Tangible, Embedded, and Embodied Interaction, Jan 2011, Funchal, Portugal. pp.361 - 364, ⟨10.1145/1935701.1935786⟩. ⟨hal-01303670⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Zekri, Jeevan Pokhrel, Badii Jouaber, Djamal Zeghlache. Reputation for vertical handover decision making. APCC 2011 : 17th Asia-Pacific Conference on Communications, Oct 2011, Sabah, Malaysia. pp.318 - 323, ⟨10.1109/APCC.2011.6152826⟩. ⟨hal-01347241⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Zekri, Makhlouf Hadji, Badii Jouaber, Djamal Zeghlache. A Nash Stackelberg approach for network pricing, revenue maximization and vertical handover decision making. LCN 2011 : 36th Annual IEEE Conference on Local Computer Networks, Oct 2011, Bonn, Germany. pp.622 - 629, ⟨10.1109/LCN.2011.6115526⟩. ⟨hal-01302399⟩
Accès au bibtex
BibTex
ref_biblio
Hongguang Zhang, Mohammed Boutabia, Hang Nguyen, Lingnan Xia. Field performance evaluation of VoIP in 4G trials. ICME 2011 : IEEE International Conference on Multimedia and Expo, Jul 2011, Barcelone, Spain. pp.1 - 4, ⟨10.1109/ICME.2011.6011962⟩. ⟨hal-01303884⟩
Accès au bibtex
BibTex
ref_biblio
Zhenzhen Zhao, Sirsha Bhattarai, Noel Crespi. An event-based functionality integration framework. ICWS 2011 : 9th IEEE International Conference on Web Services, Jul 2011, Washington, United States. pp.720 - 721, ⟨10.1109/ICWS.2011.121⟩. ⟨hal-01303685⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303685/file/PID1841337.pdf BibTex
ref_biblio
Zhenzhen Zhao, Sirsha Bhattarai, Ji Liu, Noel Crespi. Mashup services to daily activities : end-user perspective in designing a consumer mashups. iiWAS 2011 : 13th International Conference on Information Integration and Web-based Applications & Services, Dec 2011, Ho Chi Min, Vietnam. pp.222 - 229, ⟨10.1145/2095536.2095574⟩. ⟨hal-01302211⟩
Accès au bibtex
BibTex
ref_biblio
Zhenzhen Zhao, Nassim Laga, Noel Crespi. User-centric service selection, integration and management through daily events. MUCS 2011 : 8th International Workshop on Managing Ubiquitous Communications and Services, Mar 2011, Seatle, United States. pp.94-99, ⟨10.1109/PERCOMW.2011.5766979⟩. ⟨hal-01300822⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01300822/file/EBSP_MUCS_PerCom_camera_ready_v1.pdf BibTex
ref_biblio
Zhenzhen Zhao, Ji Liu, Noel Crespi. The design of activity-oriented social networking : Dig-Event. iiWAS 2011 : 13th International Conference on Information Integration and Web-based Applications & Services , Dec 2011, Ho Chi Min, Vietnam. pp.420 - 425, ⟨10.1145/2095536.2095621⟩. ⟨hal-01302162⟩
Accès au bibtex
BibTex
ref_biblio
Qin Zou, Robert Farha, Kamal Ghoumid, Badr-Eddine Benkelfat. Exaltation de l'émission spontanée à 1,53 µm dans un guide réalisé par diffusion de titane dans un substrat de niobate de lithium dopé à l'erbium et pompé optiquement à 980 nm. COLOQ 2011 : 12e Edition du Colloque sur les Lasers et l'Optique Quantique, Jul 2011, Marseille, France. pp.171 - 172. ⟨hal-01465704⟩
Accès au bibtex
BibTex

2010

ref_biblio
Tara Ali Yahiya, Hakima Chaouchi. On the integration of LTE and mobile WiMAX networks. CON-WIRE 2010 : 1st IEEE International Workshop on Convergence of Heterogeneous Wireless Systems , Aug 2010, Zurich, Switzerland. pp.1 - 5, ⟨10.1109/ICCCN.2010.5560067⟩. ⟨hal-01306780⟩
Accès au bibtex
BibTex
ref_biblio
Raheel Ali Baloch, Noel Crespi. Service dependency analysis in ubiquitous environment. IWUSP 2010 : International Workshop on Ubiquitous Service Platforms , Oct 2010, Kyoto, Japan. ⟨hal-01308713⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308713/file/Service%20Dependency%20Analysis%20in%20Ubiquitous%20Environment.pdf BibTex
ref_biblio
Raheel Ali Baloch, Noel Crespi. Addressing context dependency using profile context in overlay networks. PerNets 2010 : 4th International Workshop on Personalized Networks , Jan 2010, Las Vegas, United States. pp.1 - 5, ⟨10.1109/CCNC.2010.5421623⟩. ⟨hal-00470414⟩
Accès au bibtex
BibTex
ref_biblio
Raheel Ali Baloch, Noel Crespi. Formal model for analysis of context dependencies in ubiquitous systems. ICDIM 2010 : 5th International Conference on Digital Information Management, Jul 2010, Thunder Bay, Canada. ⟨10.1109/ICDIM.2010.5663468⟩. ⟨hal-01356345⟩
Accès au bibtex
BibTex
ref_biblio
Kheira Bekara, Maryline Laurent. La vie privée dans les environnements fédérés. Atelier protection de la vie privée 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356807/file/journee-Vie-Privee-Annecy-mai2010.pdf BibTex
ref_biblio
Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, Pékin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01306871/file/ICITIS2010-Bekara-Kheira-dec2010.pdf BibTex
ref_biblio
Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01306061/file/Bekara-Priv-Language-Comnet2010.pdf BibTex
ref_biblio
Shiddhartha Raj Bhandari, Gyu Myoung Lee, Noel Crespi. Mobility model for user's realistic behavior in mobile ad hoc network. CNSR 2010 : 8th Annual Conference on Communication Networks and Services Research, May 2010, Montreal, Canada. pp.102 - 107, ⟨10.1109/CNSR.2010.27⟩. ⟨hal-01314822⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01314822/file/CNSR_2010_MANET.pdf BibTex
ref_biblio
Sirsha Bhattarai, Zhenzhen Zhao, Noel Crespi. Consumer mashups : end-user perspectives and acceptance model. iiWAS 2010 : 12th International Conference on Information Integration and Web-based Applications & Services, Nov 2010, Paris, France. pp.930 - 933, ⟨10.1145/1967486.1967651⟩. ⟨hal-01308977⟩
Accès au bibtex
BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308630/file/Wimob2010-Aymen-Boudguiga-AuthScheme-MeshNetworks.pdf BibTex
ref_biblio
Ismehene Chahbi, Badii Jouaber, Djamal Zeghlache. SCLS : a stream-controlled link scheduling algorithm for MIMO wireless mesh networks. ICCS 2010 : IEEE International Conference on Communication Systems, Nov 2010, Singapore, Singapore. pp.400 - 405, ⟨10.1109/ICCS.2010.5686515⟩. ⟨hal-01308083⟩
Accès au bibtex
BibTex
ref_biblio
Ismehene Chahbi, Badii Jouaber. A joint AOA, AOD and delays estimation of multipath signals based on beamforming techniques. ASILOMAR 2010 : 44th Annual Asilomar Conference on Signals, Systems, and Computers, Nov 2010, Pacific Grove, United States. pp.603 - 607, ⟨10.1109/ACSSC.2010.5757632⟩. ⟨hal-01308159⟩
Accès au bibtex
BibTex
ref_biblio
Tony Cheneau, Maryline Laurent. Étude des solutions de proxy Neighbor Discovery sécurisées et proposition basée sur la Signature Agility. 5ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356372/file/Cheneau-SARSSI2010.pdf BibTex
ref_biblio
Khadija Daoud Triki, Karine Guillouard, Philippe Herbelin, Noel Crespi. A network-controlled architecture for SCTP hard handover. VTC FALL 2010 : IEEE 72nd Vehicular Technology Conference, Sep 2010, Ottawa, Canada. pp.1 - 5, ⟨10.1109/VETECF.2010.5594583⟩. ⟨hal-01305135⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01305135/file/A%20Network-Controlled%20Architecture%20for%20SCTP%20Hard%20Handover-%20VTC%20fall%202010%20.pdf BibTex
ref_biblio
Sonia Elwardi-Ben Amor, Mourad Zghal, Badr-Eddine Benkelfat. Gaussian beam divergence effects on crosstalk in coherence multiplexed system. EOSAM 2010 : 3rd Scientific European Optical Society Annual Meeting, Oct 2010, Paris, France. ⟨hal-01355085⟩
Accès au bibtex
BibTex
ref_biblio
Jagadish Ghimire, Mehdi Mani, Teerapat Sanguankotchakorn, Noel Crespi. Self-connectivity estimation for super node overlay creation in ad-hoc networks. ICT 2010 : 17th International Conference on Telecommunications, Apr 2010, Doha, Qatar. pp.722 - 727, ⟨10.1109/ICTEL.2010.5478804⟩. ⟨hal-01356827⟩
Accès au bibtex
BibTex
ref_biblio
Jagadish Ghimire, Mehdi Mani, Noel Crespi, Teerapat Sanguankotchakorn. Delay and capacity analysis of structured P2P overlay for IP telephony. SPECTS 2010 : International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Jul 2010, Ottawa, Canada. pp.1 - 8. ⟨hal-01356724⟩
Accès au bibtex
BibTex
ref_biblio
Kamal Ghoumid, Chafia Benmouhoub, Richard Ferriere, Badr-Eddine Benkelfat, Gwenn Ulliac, et al.. Performances d'une cavité Fabry-Pérot réalisée par faisceau d'ions focalisés. JNOG 2010 : 29e Journées Nationales d'Optique Guidée, Oct 2010, Besançon, France. pp.69 - 71. ⟨hal-01355082⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01355082/file/JNOG%202010_K%20Ghoumid.pdf BibTex
ref_biblio
Zeynep Gurkas Aydin, Tara Ali Yahiya, Hakima Chaouchi, Abdul Halim Zaim. QoS mobility-aware algorithm using early update for host identity protocol. PIMRC 2010 : 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2010, Istanbul, Turkey. pp.2014 - 2018 ⟨10.1109/PIMRC.2010.5671588⟩. ⟨hal-01306765⟩
Accès au bibtex
BibTex
ref_biblio
Leïla Harfouche, Selma Boumerdassi, Eric Renault. Weighted social Manhattan : modeling and performance analysis of a mobility model. PIMRC 2010 : 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2010, Istanbul, Turkey. pp.2019 - 2023, ⟨10.1109/PIMRC.2010.5671585⟩. ⟨hal-01309495⟩
Accès au bibtex
BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Djamal Zeghlache, Panagiotis Papadimitriou, Laurent Mathy. Adaptive virtual network provisioning. VISA 2010 : 2nd ACM SIGCOMM workshop on Virtualized Infrastructure Systems and Architectures, Sep 2010, New Delhi, India. pp.41 - 48, ⟨10.1145/1851399.1851407⟩. ⟨hal-01308686⟩
Accès au bibtex
BibTex
ref_biblio
Cuiting Huang, Noel Crespi. A service composition model for dynamic service creation and update in IMS/Web 2.0 converged environment. AINTEC 2010 : 6th Asian Internet Engineering Conference, Nov 2010, Bangkok, Thailand. pp.95 - 102, ⟨10.1145/1930286.1930299⟩. ⟨hal-01308974⟩
Accès au bibtex
BibTex
ref_biblio
Grégoire Jacob, Eric Filiol, Hervé Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
Accès au bibtex
BibTex
ref_biblio
Nassim Laga, Emmanuel Bertin, Noel Crespi. Business process personalization through Web widgets. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.551 - 558, ⟨10.1109/ICWS.2010.22⟩. ⟨hal-01308979⟩
Accès au bibtex
BibTex
ref_biblio
Nassim Laga, Emmanuel Bertin, Noel Crespi. Service oriented computing from the user perspective. KuVS 2010 : 3rd Kommunikation und Verteilte Systeme (KuVS) Fachgespräch meeting, Oct 2010, Berlin, Germany. ⟨hal-01308988⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308988/file/KuVS.pdf BibTex
ref_biblio
Nassim Laga, Emmanuel Bertin, Noel Crespi. Composition at the frontend : the user centric approach. ICIN 2010 : 14th International Conference on Intelligence in Next Generation Networks, Oct 2010, Berlin, Germany. pp.1 - 6, ⟨10.1109/ICIN.2010.5640926⟩. ⟨hal-01308991⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308991/file/ICIN2010FullPaper.pdf BibTex
ref_biblio
Khalil Ur Rehman Laghari, Noel Crespi, Imen Grida Ben Yahia. Towards a service delivery based on customer eXperience ontology : shift from service to eXperience. MACE '10 : The 5th International Workshop on Modelling Autonomic Communication Environments, Oct 2010, Niagara Falls, Canada. pp.51 - 61, ⟨10.1007/978-3-642-16836-9_5⟩. ⟨hal-01306841⟩
Accès au bibtex
BibTex
ref_biblio
Sondes Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, Pékin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356343/file/Larafa-ieeewcnis2010.pdf BibTex
ref_biblio
Gyu Myoung Lee, Noel Crespi. ITU-T standardization for energy saving using NGN and connected objects. NOC/OC&I 2010 : 15th European Conference on Networks and Optical Communications / 5th Conference on Optical Cabling and Infrastructure, Jun 2010, Faro-Algarve, Portugal. pp.1 - 7. ⟨hal-01356727⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356727/file/noc_invited_gmlee.pdf BibTex
ref_biblio
Gyu Myoung Lee, Noel Crespi. Shaping future service environments with the cloud and internet of things : networking challenges and service evolution. 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010), Oct 2010, Heraclion, Greece. pp.399-410, ⟨10.1007/978-3-642-16558-0_34⟩. ⟨hal-01308694⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308694/file/ISoLA-gmlee-20100809-clean.pdf BibTex
ref_biblio
Adisorn Lertsinsrubtavee, Teerapat Sanguankotchakorn, Anis Laouiti, Kanchana Kanchanasut. Velocity effect to the performance of MANEMO. AsiaFI 2010 : 3rd AsiaFI Winter School on Mobile and Wireless, Feb 2010, Seoul South Korea. ⟨hal-01306147⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Loukil, Takoua Ghariani, Badii Jouaber, Djamal Zeghlache. A semantic database framework for context management in heterogeneous wireless networks. WIMOB 2010 : 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.35 - 39, ⟨10.1109/WIMOB.2010.5645041⟩. ⟨hal-01308280⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Mani, Anh Minh Nguyen, Noel Crespi. SCOPE : a prototype for spontaneous P2P social networking. PerCom 2010 : 8th IEEE International Conference on Pervasive Computing and Communications, Mar 2010, Mannheim, Germany. pp.220 - 225, ⟨10.1109/PERCOMW.2010.5470664⟩. ⟨hal-01356722⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356722/file/Chapter%20IMS%20based%20WLAN-3G%20Convergence%20and%20advanced%20mobility%20features.pdf BibTex
ref_biblio
Daniel Migault, Cédric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308335/file/Migault-CNSM2010.pdf BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Energy-aware and fast handoff relying on wireless sensor/actuator networks and RFID. ANT 2010 : The International Conference on Ambient Systems, Networks and Technologies, Nov 2010, Paris, France. ⟨hal-01305738⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Handoff management relying on RFID technology. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sydney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506534⟩. ⟨hal-01306764⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Deploying wireless sensor/actuator networks and RFID for handoff enhancement. CIMSiM 2010 : 2nd International Conference on Computational Intelligence, Modelling and Simulation, Sep 2010, Bali Indonesia. pp.457 - 463, ⟨10.1109/CIMSiM.2010.57⟩. ⟨hal-01306767⟩
Accès au bibtex
BibTex
ref_biblio
Petros Ramantanis, Jordi Vuong, Yann Frignac, Badr-Eddine Benkelfat. Impact de la séquence de données sur la dégradation des signaux QPSK dans les systèmes de transmission optique. JNOG 2010 : 29e Journées Nationales d'Optique Guidée, Oct 2010, Besançon, France. pp.81 - 83. ⟨hal-01306008⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Wajdi Louati, Ines Houidi, Houssem Medhioub. A framework to describe and search for virtual resource objects. AST 2010 : 2010 International Conference on Advanced Science and Technology, Jun 2010, Miyazaki, Japan. pp.208 - 219, ⟨10.1007/978-3-642-17569-5_22⟩. ⟨hal-01308156⟩
Accès au bibtex
BibTex
ref_biblio
Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01306886/file/CloNeSecChallenge.pdf BibTex
ref_biblio
Sivasothy Shanmugalingam, Noel Crespi, Paul Labrogere. My own communication service provider. ICUMT 2010 : International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Oct 2010, Moscow, Russia. pp.260 - 266, ⟨10.1109/ICUMT.2010.5676628⟩. ⟨hal-01308993⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01308993/file/PID1545841.pdf BibTex
ref_biblio
Sivasothy Shanmugalingam, Noel Crespi, Paul Labrogere. User mobility in a web-based communication system. 4th International Conference on Internet Multimedia Systems Architecture and Applications (IMSAA 2010), Dec 2010, Bangalore, India. pp.1-6, ⟨10.1109/IMSAA.2010.5729395⟩. ⟨hal-01305754⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01305754/file/PID1545841.pdf BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Transmit and reserve (tar) : a coordinated channel access for IEEE 802.11 networks. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sidney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506240⟩. ⟨hal-01306741⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Zekri, Badii Jouaber, Djamal Zeghlache. On the use of network QoS reputation for vertical handover decision making. FUSECO 2010 : IEEE Globecom Future Seamless Communication Workshop, Dec 2010, Miami, United States. pp.2006 - 2011, ⟨10.1109/GLOCOMW.2010.5700296⟩. ⟨hal-01308057⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Zekri, Badii Jouaber, Djamal Zeghlache. Context aware vertical handover decision making in heterogeneous wireless networks. P2MNet 2010 : 6th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Oct 2010, Denver, United States. pp.780 - 784, ⟨10.1109/LCN.2010.5735809⟩. ⟨hal-01308022⟩
Accès au bibtex
BibTex
ref_biblio
Hongguang Zhang, Hang Nguyen, Noel Crespi, Sivasothy Shanmugalingam, Tien Anh Le, et al.. A metadata-based approach for multimedia service mashup in IMS. CNSR 2010 : 8th Conference on Communication Networks and Services Research, May 2010, Montreal, Canada. pp.356 - 360, ⟨10.1109/CNSR.2010.30⟩. ⟨hal-01354667⟩
Accès au bibtex
BibTex
ref_biblio
Hongguang Zhang, Marc Girod-Genet, Djamal Zeghlache, Tien Anh Le, Hang Nguyen, et al.. Collaborative home media community with semantic support. NIME 2010 : 6th IEEE International Workshop on Networking Issues in Multimedia Entertainment, Jul 2010, Singapore, Singapore. pp.1387 - 1392, ⟨10.1109/ICME.2010.5582945⟩. ⟨hal-01356677⟩
Accès au bibtex
BibTex

2009

ref_biblio
Ahmad Ahmad, Hossam Afifi, Aroua Biri, Djamal Zeghlache. TIBC : Trade-off between Identity-Based and Certificateless Cryptography for future internet. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.2866 - 2870, ⟨10.1109/PIMRC.2009.5450118⟩. ⟨hal-01366510⟩
Accès au bibtex
BibTex
ref_biblio
Tara Ali Yahiya, Hakima Chaouchi. Zone switching diversity for hierarchical resource allocation in mobile WiMAX networks. MWS 2009 : IEEE Mobile Wimax Symposium , Jul 2009, Napa Valley, Ca, United States. pp.69 - 74, ⟨10.1109/MWS.2009.9⟩. ⟨hal-01367450⟩
Accès au bibtex
BibTex
ref_biblio
Tara Ali Yahiya, Hakima Chaouchi. An optimized handover decision for heterogenous wireless networks. MSWiM 2009 : 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct 2009, Tenerife, Canary Islands, Spain. pp.137 - 142, ⟨10.1145/1641913.1641933⟩. ⟨hal-01361032⟩
Accès au bibtex
BibTex
ref_biblio
Ebtisam Amar, Selma Boumerdassi, Eric Renault. Predictive scheme for location service in mobile ad-hoc networks. MoWiN 2009 : 1st International Workshop on Mobile & Wireless Networks, Jun 2009, Seoul, South Korea. pp.522 - 531, ⟨10.1007/978-3-642-02617-1_53⟩. ⟨hal-00447548⟩
Accès au bibtex
BibTex
ref_biblio
Shiddhartha Raj Bhandari, Gyu Myoung Lee, Noel Crespi. Peer to peer proxy based IPTV services. GLOBECOM WORKSHOPS 2009 : 3rd Workshop on Enabling the Future Service-Oriented Internet : Towards Socially-Aware Networks, Nov 2009, Honolulu, United States. pp.1 - 6, ⟨10.1109/GLOCOMW.2009.5360711⟩. ⟨hal-01317645⟩
Accès au bibtex
BibTex
ref_biblio
Mathieu Boussard, Vincent Hiribarren, Jean Pierre Le Rouzic, Stephanie Fodor, Ivan Bedini, et al.. Servery : web telco marketplace. ICT - MobileSummit 2009 : ICT Mobile and Wireless Communications Summit, Jun 2009, Santander, Spain. ⟨hal-01316463⟩
Accès au bibtex
BibTex
ref_biblio
Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Evaluation of Two Privacy-Preserving Protocols for the DNS. 2009 Sixth International Conference on Information Technology: New Generations, Apr 2009, Las Vegas, United States. pp.411-416, ⟨10.1109/ITNG.2009.195⟩. ⟨hal-03628760⟩
Accès au bibtex
BibTex
ref_biblio
Ismehene Chahbi, Badii Jouaber, Djamal Zeghlache. Improving performance of ad hoc and vehicular networks using the LCMV Beamformer. WiMob 2009 : 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2009, Marrakech, Morocco. pp.98 - 103, ⟨10.1109/WiMob.2009.26⟩. ⟨hal-00441326⟩
Accès au bibtex
BibTex
ref_biblio
Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Amélioration des performances des adresses CGA et du protocole SEND : étude comparée de RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4ème Conférence sur la sécurité des architectures réseaux et des systèmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360812/file/Cheneau-SARSSI2009.pdf BibTex
ref_biblio
Khadija Daoud, Philippe Herbelin, Karine Guillouard, Noel Crespi. Performance and implementation of UFA : a SIP-based ultra flat mobile network architecture. PIMRC 2009 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2009, Tokyo, Japan. pp.793 - 797, ⟨10.1109/PIMRC.2009.5450117⟩. ⟨hal-01368589⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01368589/file/Performance%20and%20implementation%20of%20UFA-PIMRC%2009-camera%20ready_MR.pdf BibTex
ref_biblio
Joaquin Garcia‐alfaro, M. Barbeau, E. Kranakis. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. 2009 Seventh Annual Communication Networks and Services Research Conference (CNSR), May 2009, Moncton, Canada. pp.86-93, ⟨10.1109/CNSR.2009.23⟩. ⟨hal-03628765⟩
Accès au bibtex
BibTex
ref_biblio
Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim. eHIP: early update for Host Identity Protocol. MOBILITY 2009 : 6th International Conference on Mobile Technology, Applications and Systems, Sep 2009, Nice, France. pp.1 - 4, ⟨10.1145/1710035.1710090⟩. ⟨hal-01317690⟩
Accès au bibtex
BibTex
ref_biblio
Leïla Harfouche, Selma Boumerdassi, Eric Renault. Towards a social mobility model. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.2876 - 2880, ⟨10.1109/PIMRC.2009.5450050⟩. ⟨hal-00447551⟩
Accès au bibtex
BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Djamal Zeghlache, Stephan Baucke. Virtual resource description and clustering for virtual network discovery. ICC 2009 : IEEE International Conference on Communications, Jun 2009, Dresden, Germany. pp.1 - 6, ⟨10.1109/ICCW.2009.5207979⟩. ⟨hal-01368460⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01368460/file/VN-Description-Clustering.pdf BibTex
ref_biblio
Cuiting Huang, Noel Crespi. Extended policies for automatic service composition in IMS. APSCC 2009 : IEEE Asia-Pacific Services Computing Conference, Dec 2009, Biopolis, Singapore. pp.254 - 259, ⟨10.1109/APSCC.2009.5394116⟩. ⟨hal-01368599⟩
Accès au bibtex
BibTex
ref_biblio
Cuiting Huang, Noel Crespi. Enriched SCIM for service composition within IMS environment. MASS 2009 : International Conference on Management and Service Science, Sep 2009, Wuhan, China. pp.1 - 4, ⟨10.1109/ICMSS.2009.5303641⟩. ⟨hal-01360942⟩
Accès au bibtex
BibTex
ref_biblio
Willy Ronald Jimenez Freitez, Hakima Chaouchi. On AAA framework in opportunistic ad-hoc networks : OLSR usecase. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.37 - 49. ⟨hal-01333267⟩
Accès au bibtex
BibTex
ref_biblio
Nassim Laga, Emmanuel Bertin, Noel Crespi. Building a user friendly service dashboard : automatic and non-intrusive chaining between widgets. WebX 2009 : 3rd IEEE International Workshop on Web X.o, Jul 2009, Los Angeles, United States. pp.484 - 491, ⟨10.1109/SERVICES-I.2009.62⟩. ⟨hal-01317663⟩
Accès au bibtex
BibTex
ref_biblio
Sondes Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
Accès au bibtex
BibTex
ref_biblio
Jongmin Lee, S. H. Shah Newaz, Jun Kyun Choi, Gyu Myoung Lee, Noel Crespi. QoS mapping over hybrid optical and wireless access networks. HOWAN 2009 : 1st International Workshop on Hybrid Optical and Wireless Access Networks (workshop part of INTERNET 2009), Aug 2009, Cannes/La Bocca, France. pp.139 - 141, ⟨10.1109/INTERNET.2009.28⟩. ⟨hal-01316415⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Architecture for IPTV content delivery. ICAIT 2009 : International Conference on Advanced Infocomm Technology, Jul 2009, Xi'An, China. ⟨hal-01364284⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Object identification for ubiquitous networking. ICACT 2009 : 11th International Conference on Advanced Communication Technology, Feb 2009, Phoenix Park, South Korea. pp.255 - 259. ⟨hal-01360143⟩
Accès au bibtex
BibTex
ref_biblio
Abderrahmane Maaradji, Cuiting Huang, Noel Crespi. Towards personalized services composition on IMS : a basic approach. ICAIT 2009 : International Conference on Advanced Infocomm Technology, Jul 2009, Xi'An, China. ⟨hal-01368581⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Mani, Anh Minh Nguyen, Noel Crespi. What's up : P2P spontaneous social networking. PERCOM 2009 : 7th International Conference on Pervasive Computing and Communications, Mar 2009, Galveston, United States. pp.1 - 2, ⟨10.1109/PERCOM.2009.4912800⟩. ⟨hal-01316831⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Mani, Anh Minh Nguyen, Noel Crespi. What's up 2.0 : P2P spontaneous social networking. INFOCOM 2009 : 28th IEEE Conference on Computer Communications, Apr 2009, Rio De Janiero, Brazil. pp.1 - 2. ⟨hal-01360807⟩
Accès au bibtex
BibTex
ref_biblio
Benjamin Molina, Carlos E. Palau, Stephanie Fodor, Jean-Pierre Lerouzic, Oscar Lorenzo Dueñas, et al.. SERVERY : future Internet, telco and user convergence. FIA 2009 : Future Internet Assembly, Nov 2009, Stockholm, Sweden. ⟨hal-01316422⟩
Accès au bibtex
BibTex
ref_biblio
Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. 24th IFIP TC-11 International Information Security Conference (IFIPsec2009), May 2009, Pafos, Cyprus. pp.164-175, ⟨10.1007/978-3-642-01244-0_15⟩. ⟨hal-03628762⟩
Accès au bibtex
BibTex
ref_biblio
Anh Minh Nguyen, Noel Crespi. SOCIAL-DTN : why social networking services is more fruitful to mobile delay-tolerant networks ?. E-DTN 2009 : Workshop on the Emergence of Delay-/Disruption-Tolerant Networks, Oct 2009, Saint Petersbourg, Russia. pp.1 - 2, ⟨10.1109/ICUMT.2009.5345436⟩. ⟨hal-01364338⟩
Accès au bibtex
BibTex
ref_biblio
Anh Minh Nguyen, Muhammad Qaisar Choudhary, Mehdi Mani, Noel Crespi. What's UP 3.0 : spontaneous social networking in challenged networks. CHANTS 2009 : 5th Workshop on Challenged Networks, Sep 2009, Beijing, China. ⟨hal-01361008⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. RFID-assisted movement detection improvement in IP mobility. NTMS 2009 : 3rd International Conference on New Technologies, Mobility and Security, Dec 2009, Cairo, Egypt. pp.1 - 6, ⟨10.1109/NTMS.2009.5384701⟩. ⟨hal-01367458⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Orientation-based radio map extensions for improving positioning system accuracy. IWCMC 2009 : 5th International Wireless Communications and Mobile Computing Conference, Jun 2009, Leipzig, Germany. pp.947 - 951, ⟨10.1145/1582379.1582586⟩. ⟨hal-01366502⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Exploiting multi-modality and diversity for localization enhancement : WiFi & RFID usecase. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.1903 - 1907, ⟨10.1109/PIMRC.2009.5449853⟩. ⟨hal-01360206⟩
Accès au bibtex
BibTex
ref_biblio
Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. the 4th International Symposium, Mar 2009, Sydney, France. pp.251, ⟨10.1145/1533057.1533092⟩. ⟨hal-03628758⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Djamal Zeghlache. The metalist model : a simple and extensible information model for the future Internet. EUNICE 2009 : 15th Open European Summer School, Sep 2009, Barcelona, Spain. pp.88 - 97, ⟨10.1007/978-3-642-03700-9_10⟩. ⟨hal-00447549⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Selma Boumerdassi. Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards. ICUFN 2009 : 1st International Conference on Ubiquitous and Future Networks, Jun 2009, Hong-Kong, Hong Kong SAR China. pp.106 - 111, ⟨10.1109/ICUFN.2009.5174294⟩. ⟨hal-00447380⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Ahmad Ahmad, Mohamed Abid. Toward a security model for the future network of information. IWUCA 2009 : International Workshop on Ubiquitous Computing & Applications, Dec 2009, Fukuoka, Japan. pp.432 - 437, ⟨10.1109/ICUT.2009.5405676⟩. ⟨hal-00447552⟩
Accès au bibtex
BibTex
ref_biblio
Sivasothy Shanmugalingam, Gyu Myoung Lee, Noel Crespi, Emmanuel Bertin. An enabler gateway for service composition using SIP. ICIN 2009 : 13th International Conference on Intelligence in Next Generation Networks, Oct 2009, Bordeaux, France. pp.1 - 6, ⟨10.1109/ICIN.2009.5357077⟩. ⟨hal-01317670⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01317670/file/ICIN-service%20composition-final.pdf BibTex
ref_biblio
Sivasothy Shanmugalingam, Gyu Myoung Lee, Noel Crespi. A unified session control protocol for IPTV services. ICACT 2009 : 11th International Conference on Advanced Communication Technology, Feb 2009, Phoenix Park, South Korea. pp.961 - 965. ⟨hal-00435130⟩
Accès au bibtex
BibTex
ref_biblio
Mirza Tayyab Mehmood, Abdelwaheb Marzouki, Djamal Zeghlache. Decentralized link adaptation for multi-link MIMO interference system. WONS 2009 : 6th International Conference on Wireless On-demand Network Systems and Services, Feb 2009, Snowbird, Utah, United States. pp.71 - 77, ⟨10.1109/WONS.2009.4801845⟩. ⟨hal-01366252⟩
Accès au bibtex
BibTex
ref_biblio
Vincent Verdot, Noel Crespi. Demo - dSM : distributed Service Manager for seamless mobility. INFOCOM 2009 : 28th IEEE Conference on Computer Communications, Apr 2009, Rio De Janiero, Brazil. pp.1 - 3. ⟨hal-01367802⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
Accès au bibtex
BibTex

2008

ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01327378/file/cbekara-ICCS08.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
Accès au bibtex
BibTex
ref_biblio
Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Anonymous Resolution of DNS Queries. International Workshop on Information Security (IS'08), International OTM Conference, Nov 2008, Monterrey, Mexico. pp.987-1000, ⟨10.1007/978-3-540-88873-4_5⟩. ⟨hal-03628757⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01355075/file/MWNS%20CHA%20MAK-final.pdf BibTex
ref_biblio
Christian Dannewitz, Kostas Pentikousis, René Rembarz, Eric Renault, Ove Stranberg, et al.. Scenarios and research issues for a network of information. MOBIMEDIA 2008 : 4th International Mobile Multimedia Communications Conference, Jul 2008, Oulu, Finland. pp.451 - 482, ⟨10.4108/ICST.MOBIMEDIA2008.3980⟩. ⟨hal-01395075⟩
Accès au bibtex
BibTex
ref_biblio
Khadija Daoud, Philippe Herbelin, Noel Crespi. UFA : Ultra Flat Architecture for High Bitrate Services in mobile networks. PIMRC 2008 : 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2008, Cannes, France. pp.1 - 6, ⟨10.1109/PIMRC.2008.4699577⟩. ⟨hal-00435009⟩
Accès au bibtex
BibTex
ref_biblio
Khadija Daoud, Philippe Herbelin, Noel Crespi. One-node-based mobile architecture for a better QoS control. WD 2008 : 1st IFIP Wireless Days Conference, Nov 2008, Dubai, United Arab Emirates. pp.1 - 5, ⟨10.1109/WD.2008.4812874⟩. ⟨hal-00435069⟩
Accès au bibtex
BibTex
ref_biblio
Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
Accès au bibtex
BibTex
ref_biblio
Bassam El Saghir, Noel Crespi. A generic layer model for context-aware communication adaptation. WCNC 2008 : IEEE Wireless Communications & Networking Conference, Mar 2008, Las Vegas, United States. pp.3027 - 3032, ⟨10.1109/WCNC.2008.529⟩. ⟨hal-00435011⟩
Accès au bibtex
BibTex
ref_biblio
Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. Mobile wireless sensor networks using MDSAP, model for a hospital application. WiCOM 2008 : 4th international conference on Wireless Communications, Networking and Mobile Computing, Oct 2008, Dalian, China. pp.1 - 6, ⟨10.1109/WiCom.2008.835⟩. ⟨hal-01326192⟩
Accès au bibtex
BibTex
ref_biblio
Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. MDSAP simulation using TinyOs and hospital application modeling. ICADIWT 2008 : 1st IEEE International Conference on the Applications of Digital Information and Web Technologies , Aug 2008, Ostrava, Czech Republic. pp.133 - 138, ⟨10.1109/ICADIWT.2008.4664332⟩. ⟨hal-01326194⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Analysis of Threats to the Security of EPC Networks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR), May 2008, Halifax, Canada. pp.67-74, ⟨10.1109/CNSR.2008.69⟩. ⟨hal-03628754⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Security Threats on EPC Based RFID Systems. 2008 Fifth International Conference on Information Technology: New Generations (ITNG), Apr 2008, Las Vegas, United States. pp.1242-1244, ⟨10.1109/ITNG.2008.206⟩. ⟨hal-03628751⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, M. Jaeger, G. Muhl, I. Barrera, J. Borrell. Distributed Exchange of Alerts for the Detection of Coordinated Attacks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR '08), May 2008, Halifax, Canada. pp.96-103, ⟨10.1109/CNSR.2008.70⟩. ⟨hal-03628753⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Evaluation of Anonymized ONS Queries. Workshop on Security of Autonomous and Spontaneous Networks (SETOP 2008), Oct 2008, Loctudy, France. ⟨hal-03628755⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628755/file/setop08.pdf BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Djamal Zeghlache. A distributed virtual network mapping algorithm. ICC 2008 : IEEE International Conference on Communications, May 2008, Beijing, China. pp.5634 - 5640, ⟨10.1109/ICC.2008.1056⟩. ⟨hal-01343135⟩
Accès au bibtex
BibTex
ref_biblio
Ines Houidi, Wajdi Louati, Djamal Zeghlache. A distributed and autonomic virtual network mapping framework. ICAS 2008 : 4th International Conference on Autonomic and Autonomous System , Mar 2008, Gosier, France. pp.241 - 247, ⟨10.1109/ICAS.2008.40⟩. ⟨hal-01343126⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
Accès au bibtex
BibTex
ref_biblio
Satish Chandra Jha, Badii Jouaber, Kazi M. Ahmed. Dynamic-address-allocation based scalable routing protocol in context of node mobility. WHNC 2008 : IEEE Wireless Hive Networks Conference, Aug 2008, Austin, Texas, United States. pp.1 - 6, ⟨10.1109/WHNC.2008.4629491⟩. ⟨hal-01343138⟩
Accès au bibtex
BibTex
ref_biblio
Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01355081/file/Khakpour-ARES08.pdf BibTex
ref_biblio
Sondes Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01327396/file/LARAFA-SETOP08.pdf BibTex
ref_biblio
Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
Accès au bibtex
BibTex
ref_biblio
Wassef Louati, Djamal Zeghlache. A P2P-based middleware for wide-area service discovery. ASWN 2008 : 8th International Workshop on Applications and Services in Wireless Networks, Oct 2008, Kassel, Germany. pp.57 - 65, ⟨10.1109/ASWN.2008.11⟩. ⟨hal-01380282⟩
Accès au bibtex
BibTex
ref_biblio
Wassef Louati, Djamal Zeghlache. Personal overlay networks management using a P2P-based publish/subscribe naming system. PDP 2008 : 16th Euromicro Conference on Parallel, Distributed and network-based Processing, Feb 2008, Toulouse, France. pp.95 - 99, ⟨10.1109/PDP.2008.78⟩. ⟨hal-01326477⟩
Accès au bibtex
BibTex
ref_biblio
Abderrahmane Maaradji, Arnaud Gonguet, Noel Crespi, Johann Daigremont. La composition de service dans l'IMS, un premier pas vers "l'Ubiquitous Computing" dans les réseaux télécoms. DNAC 2008 : 22ème Congrès "De Nouvelles Architectures pour les Communications" : la convergence des réseaux IP et le Post-IP, Dec 2008, Paris, France. ⟨hal-00435097⟩
Accès au bibtex
BibTex
ref_biblio
Mehdi Mani, Anh Minh Nguyen, Noel Crespi. SCOPE- service classified overlay for P2P environment, a service platform for P2P services over ad-hoc networks. MASS 2008 : 5th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Sep 2008, Atlanta, Georgia, United States. pp.541 - 543, ⟨10.1109/MAHSS.2008.4660083⟩. ⟨hal-00435070⟩
Accès au bibtex
BibTex
ref_biblio
Moshe Timothy Masonta, Marc Girod-Genet, Olufemi James Oyedapo, Damien Chatelain. Light-weight IP Multimedia Subsystem (IMS) client for mobile devices. CCECE 2008 : IEEE 21st Canadian Conference on Electrical and Computer Engineering, May 2008, Niagara Falls, Ontario, Canada. pp.453 - 458, ⟨10.1109/CCECE.2008.4564575⟩. ⟨hal-01395068⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Charles Ancelin, Oscar Javier Botero Gomez, Willy Ronald Jimenez Freitez. Executing OpenMP programs on distributed resources using a source-to-source transformation tool. PDCCS 2008 : 21st International Conference on Parallel and Distributed Computing and Communication Systems, Sep 2008, New Orleans, United States. pp.199 - 204. ⟨hal-00447581⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Charles Ancelin, Willy Ronald Jimenez Freitez, Oscar Javier Botero Gomez. Using source-to-source transformation tools to provide distributed parallel applications from OpenMP source code. ISPDC 2008 : 7th International Symposium on Parallel and Distributed Computing, Jul 2008, Krakow, Poland. pp.197 - 204, ⟨10.1109/ISPDC.2008.65⟩. ⟨hal-00447557⟩
Accès au bibtex
BibTex
ref_biblio
Luis Sanchez, Jorge Lanza, Ingrid Moerman, Jeroen Hoebeke, Kimmo Ahola, et al.. Assessing personal networks on a Pan-European testbed. ICT-MobileSummit 2008, Jun 2008, Stockholm, Sweden. pp.1 - 8. ⟨hal-01326498⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Badii Jouaber, Djamal Zeghlache. A free collision and distributed slot assignment algorithm for wireless sensor networks. GLOBECOM 2008 : IEEE Global Telecommunications Conference, Nov 2008, New Orleans, Louisiana, United States. pp.367 - 372, ⟨10.1109/GLOCOM.2008.ECP.78⟩. ⟨hal-01395249⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache, Tapio J. Erke. DNIB : distributed neighborhood information based TDMA scheduling for wireless sensor networks. VTC Fall 2008: IEEE 68th Vehicular Technology Conference, Sep 2008, Calgary, Alberta, Canada. pp.1 - 5, ⟨10.1109/VETECF.2008.25⟩. ⟨hal-01395273⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Badii Jouaber, Djamal Zeghlache. Improving energy consumption in large scale wireless sensor networks with multiple mobile sinks deployment. WINSYS 2008 : International Conference on Wireless Information Networks and Systems, Jul 2008, Porto, Portugal. pp.29 - 37, ⟨10.5220/0002024700290037⟩. ⟨hal-00441316⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache. A hybrid MAC with prioritization for wireless sensor networks. LCN 2008 : 33rd IEEE Conference on Local Computer Networks, Oct 2008, Montréal, Canada. pp.274 - 281, ⟨10.1109/LCN.2008.4664180⟩. ⟨hal-01392802⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Badii Jouaber, Djamal Zeghlache. Energy efficient scheme for large scale wireless sensor networks with multiple sinks. WCNC 2008 : IEEE Wireless Communications & Networking Conference, Mar 2008, Las Vegas, United States. pp.2367 - 2372, ⟨10.1109/WCNC.2008.417⟩. ⟨hal-01343132⟩
Accès au bibtex
BibTex
ref_biblio
Zhenzhen Zhao, Jie Chen, Noel Crespi. A policy-based framework for autonomic reconfiguration management in heterogeneous networks. MUM 2008 : 7th International Conference on Mobile and Ubiquitous Multimedia, Dec 2008, Umea, Sweden. pp.71 - 78, ⟨10.1145/1543137.1543150⟩. ⟨hal-00435079⟩
Accès au bibtex
BibTex

2007

ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01328162/file/Bekara-SAPC-MSN07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP 2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01328143/file/bekara-WISTP07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01355352/file/bekara-WiMob07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01328148/file/bekara-SARSSI07.pdf BibTex
ref_biblio
Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de sécurité dans un réseau mesh multi sauts. GRES 2007 : 8ème Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des réseaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01327900/file/maknavicius-GRES07.pdf BibTex
ref_biblio
Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Sondes Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01328113/file/bournelle-ifip2007.pdf BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01328014/file/mlaurent-NTMS07.pdf BibTex
ref_biblio
Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. 2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007), Nov 2007, Vilamoura, Portugal. pp.1770-1784, ⟨10.1007/978-3-540-76843-2_45⟩. ⟨hal-03628749⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Frederic Cuppens, Nora Cuppens-Boulahia. Aggregating and Deploying Network Access Control Policies. The Second International Conference on Availability, Reliability and Security (ARES'07), Apr 2007, Vienna, France. pp.532-542, ⟨10.1109/ARES.2007.34⟩. ⟨hal-03628743⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. IFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security, Oct 2007, Malaga, Spain. pp.287-298, ⟨10.1007/978-3-540-89173-4_24⟩. ⟨hal-03628748⟩
Accès au bibtex
BibTex
ref_biblio
Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia‐alfaro, Laurent Toutain. Reliable Process for Security Policy Deployment. International Conference on Security and Cryptography, Jul 2007, Barcelona, France. pp.5-15, ⟨10.5220/0002119200050015⟩. ⟨hal-03628747⟩
Accès au bibtex
BibTex

2006

ref_biblio
Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection of Network Security Component Misconfiguration by Rewriting and Correlation. 5th Conference on Security and Network Architectures (SAR-SSI2006), Jun 2006, Seignose, France. ⟨hal-03628721⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628721/file/sar06.pdf BibTex

2005

ref_biblio
J. Castella-Roca, G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro. Digital chips for an on-line casino. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, ⟨10.1109/ITCC.2005.130⟩. ⟨hal-03628687⟩
Accès au bibtex
BibTex
ref_biblio
Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection and Removal of Firewall Misconfiguration. 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 ), Nov 2005, Phoenix, United States. ⟨hal-03628708⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628708/file/cnis05.pdf BibTex
ref_biblio
Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro. Misconfiguration Management of Network Security Components. 7th International Symposium on System and Information Security (SSI 2005), Nov 2005, Sao Paolo, Brazil. ⟨hal-03628705⟩
Accès au bibtex
https://arxiv.org/pdf/1912.07283 BibTex
ref_biblio
Joaquin Garcia‐alfaro, J. Borrell, M.A. Jaeger, G. Muhl. An alert communication infrastructure for a decentralized attack prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.234-237, ⟨10.1109/CCST.2005.1594878⟩. ⟨hal-03628691⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, F. Cuppens, F. Autrel, J. Castella-Roca, J. Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-03628680⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, S. Castillo, G. Navarro, J. Borrell. Mechanisms for attack protection on a prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.137-140, ⟨10.1109/CCST.2005.1594872⟩. ⟨hal-03628695⟩
Accès au bibtex
BibTex
ref_biblio
G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro, S. Robles. Secure agent-based management for pervasive environments. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.133-136, ⟨10.1109/CCST.2005.1594864⟩. ⟨hal-03628681⟩
Accès au bibtex
BibTex

2004

ref_biblio
André-Luc Beylot, Riadh Dhaou, Vincent Gauthier, Monique Becker. Cross Layer Simulation and Optimization for Mobile ad-hoc Networks. IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), IFIP Technical Committee 6 : TC6 - Communications Systems, Oct 2004, Paris, France. pp.13-22, ⟨10.1007/0-387-23150-1_2⟩. ⟨hal-03924175⟩
Accès au bibtex
BibTex

2003

ref_biblio
A. Meddahi, Hossam Afifi, Djamal Zeghlache. "Packet-e-model": e-model for wireless VoIP quality evaluation. 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communications., Sep 2003, Beijing, China. pp.2421-2425, ⟨10.1109/PIMRC.2003.1259153⟩. ⟨hal-04286287⟩
Accès au bibtex
BibTex

Book sections

2020

ref_biblio
Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩. ⟨hal-02393547⟩
Accès au bibtex
BibTex

2018

ref_biblio
Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : l’impact des labels sur la gestion des données personnelles. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
Accès au bibtex
BibTex
ref_biblio
Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-Télécom, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02516151/file/2018-EN-CahierChaireVPIP2-Fiche4-HAL.pdf BibTex
ref_biblio
Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02516126/file/2018-EN-CahierChaireVPIP2-Fiche11-HAL.pdf BibTex
ref_biblio
Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01778949/file/2017-09-18-confiance%26Blockchain-fin.pdf BibTex

2015

ref_biblio
Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
Accès au bibtex
BibTex

2013

ref_biblio
Gyu Myoung Lee, Noel Crespi, Jun Kyun Choi, Matthieu Boussard. Internet of Things. Evolution of Telecommunication Services, 7768, Springer-Verlag, pp.257 - 282, 2013, Lecture Notes in Computer Science, 978-3-642-41568-5. ⟨10.1007/978-3-642-41569-2_13⟩. ⟨hal-01335108⟩
Accès au bibtex
BibTex
ref_biblio
Antonio Manzalini, Roberto Minerva, Noel Crespi, Uddin Shah Muhammad Emad. Software networks at the edge. Evolution of cognitive networks and self-adaptive communication systems, IGI Global, pp.199 - 226, 2013, Advances in wireless technologies and telecommunication series, 978-1-4666-4189-1. ⟨10.4018/978-1-4666-4189-1.ch008⟩. ⟨hal-01335120⟩
Accès au bibtex
BibTex

2011

ref_biblio
Marc Roelands, Johan Plomb, Diego Casado Mansilla, Juan R. Velasco, Ismail Salhi, et al.. The DiY smart experiences project : a European endeavour removing barriers for user-generated Internet of Things applications. Architecting the internet of things, Springer-Verlag, pp.279 - 315, 2011, 978-3-642-19156-5. ⟨10.1007/978-3-642-19157-2_11⟩. ⟨hal-01335619⟩
Accès au bibtex
BibTex

2010

ref_biblio
Houssem Jarraya, Maryline Laurent. Sécurité des réseaux P2P. Evolution des technologies pair-à-pair : optimisation, sécurité et application, Hermès science; Lavoisier, pp.135 - 154, 2010, IC2 : Traité réseaux et télécoms, 978-2-7462-2579-4. ⟨hal-01355245⟩
Accès au bibtex
BibTex

2009

ref_biblio
Kimmo Ahola, Mikko Alutoin, Martin Bauer, Sandford Bessler, Marc Girod-Genet, et al.. PN platforms. My personal Adaptive Global NET (MAGNET), Springer, pp.337 - 408, 2009, Signals and Communication Technology, 978-90-481-3436-6. ⟨10.1007/978-90-481-3437-3_7⟩. ⟨hal-01359040⟩
Accès au bibtex
BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Tara Ali Yahiya. Introduction to wireless and mobile networks. Mobile and wireless network security, ISTE/Wiley, pp.3 - 46, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch1⟩. ⟨hal-00472917⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
Accès au bibtex
BibTex
ref_biblio
José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. Considerations for RFID-based indoor simultaneous tracking. Wireless and Mobile Networking : Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, 308, Springer, pp.309 - 320, 2009, IFIP Advances in Information and Communication Technology, 978-3-642-03840-2. ⟨10.1007/978-3-642-03841-9_28⟩. ⟨hal-00472958⟩
Accès au bibtex
BibTex
ref_biblio
Apostolia Papapostolou, Hakima Chaouchi. WIFE : Wireless Indoor positioning based on Fingerprint Evaluation. Networking 2009 : 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009, 5550, Springer, pp.234 - 247, 2009, Lecture notes in computer science, 978-3-642-01398-0. ⟨10.1007/978-3-642-01399-7_19⟩. ⟨hal-00472945⟩
Accès au bibtex
BibTex
ref_biblio
Luis Sanchez, Jorge Lanza, Jeroen Hoebeke, Marc Girod-Genet, Martin Bauer, et al.. PN networking. My personal Adaptive Global NET (MAGNET), Springer, pp.75 - 134, 2009, Signals and Communication Technology, 978-90-481-3436-6. ⟨10.1007/978-90-481-3437-3_3⟩. ⟨hal-01359064⟩
Accès au bibtex
BibTex
ref_biblio
Ines Slama, Badii Jouaber, Djamal Zeghlache. Multiple mobile sinks deployment for energy efficiency in large scale wireless sensor networks. e-Business and Telecommunications, International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, 48, Springer, pp.412 - 427, 2009, Communications in Computer and Information Science, 978-3-642-05196-8. ⟨10.1007/978-3-642-05197-5_30⟩. ⟨hal-00441321⟩
Accès au bibtex
BibTex

2008

ref_biblio
Miguel Castro, Dominique Gaïti, Abdallah M'Hamed, Djamal Zeghlache. Adaptive and programmable management of IP quality of service. Autonomic networks, ISTE, pp.23-59, 2008, 9781848210028. ⟨10.1002/9780470610879.ch2⟩. ⟨hal-02272040⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi. Mobilité dans Wi-Fi0-IEEE 802.11 r. Réseaux sans fil émergents : standards IEEE, Hermès science publications; Lavoisier, pp.249 - 278, 2008, IC2 : information, commande, communication, Réseaux et télécoms, 978-2-7462-1889-5. ⟨hal-01342750⟩
Accès au bibtex
BibTex
ref_biblio
Providence Salumu Munga, Hakima Chaouchi. Technologie MIH-IEEE 802.21. Réseaux sans fil émergents : standards IEEE, Hermès science publications; Lavoisier, pp.413 - 455, 2008, IC2 : information, commande, communication, Réseaux et télécoms, 978-2-7462-1889-5. ⟨hal-01342748⟩
Accès au bibtex
BibTex

2007

ref_biblio
Chakib Bekara, Maryline Laurent. Gestion de clés dans les réseaux de capteurs. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328150⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux mobiles IP. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328154⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, F. Cuppens, N. Cuppens-Boulahia. Management of Exceptions on Access Control Policies. New Approaches for Security, Privacy and Trust in Complex Environments, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, ⟨10.1007/978-0-387-72367-9_9⟩. ⟨hal-03628745⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi, Olivier Paul. Mécanismes de sécurité fondamentaux. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1697-6. ⟨hal-01328102⟩
Accès au bibtex
BibTex
ref_biblio
José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Sécurité dans les réseaux de capteurs sans fil. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328149⟩
Accès au bibtex
BibTex

2006

ref_biblio
Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. Protection of Components Based on a Smart-Card Enhanced Security Module. Critical Information Infrastructures Security, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, ⟨10.1007/11962977_11⟩. ⟨hal-03628730⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Computer Safety, Reliability, and Security, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, ⟨10.1007/11875567_14⟩. ⟨hal-03628725⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security Components. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, ⟨10.1007/11915034_65⟩. ⟨hal-03628734⟩
Accès au bibtex
BibTex

2005

ref_biblio
Joaquin Garcia‐alfaro, Michael Jaeger, Gero Mühl, Joan Borrell. Decoupling Components of an Attack Prevention System Using Publish/Subscribe. Intelligence in Communication Systems, Springer-Verlag, pp.87-97, 2005, ⟨10.1007/0-387-32015-6_9⟩. ⟨hal-03628700⟩
Accès au bibtex
BibTex
ref_biblio
G. Navarro, J. Peñalver, J.A. Ortega-Ruiz, J. Ametller, Joaquin Garcia‐alfaro, et al.. Amapola: a simple infrastructure for ubiquitous computing. Roch Glitho; Ahmed Karmouch; Samuel Pierre. Intelligence in Communication Systems, 190, Springer-Verlag, pp.77-86, 2005, IFIP — The International Federation for Information Processing book series (IFIPAICT), ⟨10.1007/0-387-32015-6_8⟩. ⟨hal-03628697⟩
Accès au bibtex
BibTex

2004

ref_biblio
Joaquin Garcia‐alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, et al.. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. Information and Communications Security, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-03628684⟩
Accès au bibtex
BibTex

Habilitation à diriger des recherches

2013

ref_biblio
Joaquin Garcia‐alfaro. Contributions to the security of EPC/RFID wireless technologies. Cryptography and Security [cs.CR]. Université Pierre et Marie Curie, Paris VI; Télécom SudParis (Institut Mines-Télécom), 2013. ⟨tel-03646853⟩
Accès au texte intégral et bibtex
https://hal.science/tel-03646853/file/hdr-jga.pdf BibTex

Special issue

2020

ref_biblio
Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro. Foundations and practice of security: 12th international symposium, FPS 2019, Toulouse, France, November 5–7, 2019, revised selected papers. Benzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin. FPS 2019: 12th International Symposium on Foundations and Practice of Security, Nov 2019, Toulouse, France. Lecture Notes in Computer Science, 12056, 408 p., 2020, Lecture Notes in Computer Science book series (LNCS), 978-3-030-45370-1. ⟨10.1007/978-3-030-45371-8⟩. ⟨hal-03001571⟩
Accès au bibtex
BibTex

2018

ref_biblio
Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro. Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers. FPS 2017 - 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. Lecture Notes in Computer Science, 10723, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. ⟨10.1007/978-3-319-75650-9⟩. ⟨hal-01869014⟩
Accès au bibtex
BibTex

Other publications

2019

ref_biblio
Marc Girod-Genet. Standardizing Smart Body Area Networks. 2019. ⟨hal-02277398⟩
Accès au bibtex
BibTex
ref_biblio
Marc Girod-Genet. Standard to facilitate Smart Body Area Networks. 2019, pp.12. ⟨hal-02277000⟩
Accès au bibtex
BibTex

2009

ref_biblio
Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Les composants RFID, sont-ils vulnerables ?. 2009. ⟨hal-03628767⟩
Accès au bibtex
BibTex

Books

2022

ref_biblio
Joaquin Garcia‐alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2021 international workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, revised selected papers. Springer, 13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS), 978-3-030-93943-4. ⟨10.1007/978-3-030-93944-1⟩. ⟨hal-03628440⟩
Accès au bibtex
BibTex

2021

ref_biblio
Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, José Francisco Ruiz, et al.. Cybersecurity research analysis report for Europe and Japan: cybersecurity and privacy dialogue between Europe and Japan. Springer, 75, pp.172, 2021, Studies in Big Data, 978-3-030-62311-1. ⟨10.1007/978-3-030-62312-8⟩. ⟨hal-03124036⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part I. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part II. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
Accès au bibtex
BibTex

2020

ref_biblio
Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-03173895/file/IFIPLNCS12024DL_2020_BookFrontmatter.pdf BibTex

2019

ref_biblio
Hamza Baqa, Martin Bauer, Sonia Bilbao, Aitor Corchero, Laura Daniele, et al.. Semantic IoT Solutions -A Developer Perspective: Semantic Interoperability White Paper. 51p, 2019, ⟨10.13140/RG.2.2.16339.53286⟩. ⟨emse-02345694⟩
Accès au texte intégral et bibtex
https://hal-emse.ccsd.cnrs.fr/emse-02345694/file/SemanticInteroperabilityWhitePaper_SemanticIoTSolutions-ADeveloperPerspective-20191020-final-1.0.1.pdf BibTex
ref_biblio
Hamza Baqa, Martin Bauer, Sonia Bilbao, Aitor Corchero, Laura Daniele, et al.. Towards semantic interoperability standards based on ontologies: Semantic Interoperability White Paper. 26 p., 2019, ⟨10.13140/RG.2.2.26825.29282⟩. ⟨emse-02352822⟩
Accès au texte intégral et bibtex
https://hal-emse.ccsd.cnrs.fr/emse-02352822/file/SemanticInteroperabilityWhitePaper_StandardizationPerspective-20191020-final-1.0.1.pdf BibTex

2018

ref_biblio
Nora Cuppens-Bouhlahia, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro (Dir.). Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers. Springer, 10694, pp.269, 2018, Lecture Notes in Computer Science, Lecture Notes in Computer Science (vol. 10694), 978-3-319-76686-7. ⟨hal-01865019⟩
Accès au bibtex
BibTex
ref_biblio
Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens-Bouhlahia, Frédéric Cuppens, et al. (Dir.). Interoperability, Safety and Security in IoT: Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Springer, pp.165, 2018, LNICST, volume 242, LNICST, volume 242, ISSN 1867-8211. ⟨hal-01993862⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios (Dir.). Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, proceedings. Springer, pp.442, 2018, Lecture Notes in Computer Science book series (LNCS, volume 11025), Lecture Notes in Computer Science book series (LNCS, volume 11025), 978-3-030-00304-3. ⟨hal-02014097⟩
Accès au bibtex
BibTex
ref_biblio
Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc (Dir.). Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Springer, pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5. ⟨hal-01864973⟩
Accès au bibtex
BibTex
ref_biblio
Ali Miri, Xiaodai Dong, Masoud Ardakani, Joaquin Garcia-Alfaro (Dir.). 29th biennial symposium on communications : Toronto, Ontario, Canada, June 6-7, 2018. IEEE Computer Society, pp.128, 2018, Biennial Symposium on Communications proceedings, Biennial Symposium on Communications proceedings, 978-1-5386-5735-5. ⟨hal-02014409⟩
Accès au bibtex
BibTex
ref_biblio
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al. (Dir.). Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Springer, pp.818, 2018, Lecture Notes in Computer Science, Security and Cryptology, 11149, Lecture Notes in Computer Science, Security and Cryptology, 11149, 978-3-030-01949-5. ⟨hal-01987497⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Selma Boumerdassi, Samia Bouzefrane (Dir.). Mobile, secure, and programmable networking: 4th international conference, MSPN 2018, Paris, France, June 18-20, 2018, revised selected papers. Springer, pp.340, 2018, Lecture Notes in Computer Science, volume 11005, Lecture Notes in Computer Science, volume 11005, 978-3-030-03100-8. ⟨10.1007/978-3-030-03101-5⟩. ⟨hal-01997524⟩
Accès au bibtex
BibTex
ref_biblio
Leye Wang, Vincent Gauthier, Guanling Chen, Luis  moreira‑matias (Dir.). Special issue on extracting crowd intelligence from pervasive and social big data. Springer, 9, n°2, pp.411, 2018. ⟨hal-01823619⟩
Accès au bibtex
BibTex

2017

ref_biblio
Samia Bouzefrane, Soumya Banerjee, Françoise Sailhan, Selma Boumerdassi, Eric Renault (Dir.). Mobile, secure, and programmable networking : third international conference, MSPN 2017, Paris, France, June 29-30, 2017, revised selected papers. Springer, pp.237, 2017, Lecture Notes in Computer Science, volume 10566, Lecture Notes in Computer Science, volume 10566, 978-3-319-67806-1. ⟨10.1007/978-3-319-67807-8⟩. ⟨hal-01997506⟩
Accès au bibtex
BibTex
ref_biblio
Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Bouhlahia, Nadia Tawbi, Joaquin Garcia-Alfaro (Dir.). Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Springer, 10128, pp.361, 2017, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-51965-4. ⟨hal-01449657⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomarti (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Springer, 10436, pp.446, 2017, Lecture Notes in Computer Science, 978-3-319-67815-3. ⟨10.1007/978-3-319-67816-0⟩. ⟨hal-01740241⟩
Accès au bibtex
BibTex
ref_biblio
Anis Laouiti, Amir Qayyum, Mohamad Naufal Mohamad Saad (Dir.). Vehicular Ad-hoc Networks for smart cities : second international workshop, 2016. Springer, 548, pp.97, 2017, Advances in Intelligent Systems and Computing, Advances in Intelligent Systems and Computing, 978-981-10-3502-9. ⟨hal-01496657⟩
Accès au bibtex
BibTex
ref_biblio
Roberto Minerva, Noel Crespi. Networks and new services : a complete story. Springer international publishing, pp.186, 2017, Internet of things, Internet of things, 978-3-319-33993-1. ⟨hal-01464422⟩
Accès au bibtex
BibTex
ref_biblio
Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, et al. (Dir.). Interoperability, safety and security in IoT : second international conference, InterIoT 2016 and third international conference, SaSeIoT 2016. Springer, 190, pp.139, 2017, LNICST, LNICST, 978-3-319-52726-0. ⟨hal-01647101⟩
Accès au bibtex
BibTex
ref_biblio
Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent (Dir.). Security, and privacy in emerging wireless networks : security and communication networks journal. Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal. ⟨hal-01682207⟩
Accès au bibtex
BibTex

2016

ref_biblio
Selma Boumerdassi, Eric Renault, Samia Bouzefrane (Dir.). Mobile, secure, and programmable networking : second international conference, MSPN 2016, Paris, France, June 1-3, 2016, revised selected papers. Springer, 10026, pp.225, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-50462-9. ⟨10.1007/978-3-319-50463-6⟩. ⟨hal-01452777⟩
Accès au bibtex
BibTex
ref_biblio
Didier El Baz, Julien Bourgeois, Bruno Defude, Zhangbing Zhou, Guangjie Han, et al. (Dir.). ATC 2016 : 13th Annual International Conference on Advanced and Trusted Computing. IEEE Computer Society, pp.1242, 2016, 978-1-5090-2770-5. ⟨hal-01449669⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (Dir.). Foundations and practice of security : 8th international symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers. Springer International Publishing, 9482, pp.323, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-30302-4. ⟨hal-01333422⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Dir.). Data privacy management, and security assurance : 10th international workshop, DPM 2015, and 4th international workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers. Springer International Publishing, 9481, pp.291, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-29882-5. ⟨hal-01333425⟩
Accès au bibtex
BibTex
ref_biblio
Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Caganova, Hakima Chaouchi, et al. (Dir.). Internet of Things: IoT Infrastructures: Second international summit, IoT 360°. Springer, 169-170, pp.547, 2016, LNICST, LNICST, 978-3-319-47062-7. ⟨hal-01646503⟩
Accès au bibtex
BibTex
ref_biblio
Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro (Dir.). Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5. ⟨hal-01450264⟩
Accès au bibtex
BibTex

2015

ref_biblio
Selma Boumerdassi, Samia Bouzefrane, Eric Renault (Dir.). Mobile, secure, and programmable networking : first international conference, MSPN 2015, Paris, France, June 15-17, 2015, selected papers. Springer international publishing, 9395, pp.175, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-25743-3. ⟨hal-01269566⟩
Accès au bibtex
BibTex
ref_biblio
Ali Ghorbani, Vicenç Torra, Huseyin Hisil, Ali Miri, Ahmet Koltuksuz, et al. (Dir.). 2015 Thirteenth annual conference on privacy, security and trust. IEEE, pp.200, 2015, 978-1-4673-7828-4. ⟨hal-01332268⟩
Accès au bibtex
BibTex

2014

ref_biblio
Joaquin Garcia-Alfaro, Gürkan Gür (Dir.). Proceedings 2014 : International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science, 165, pp.58, 2014. ⟨hal-01740931⟩
Accès au bibtex
BibTex

2013

ref_biblio
Emmanuel Bertin, Noel Crespi, Thomas Magedanz (Dir.). Evolution of telecommunication services : the convergence of telecom and internet: technologies and ecosystems. Springer-Verlag, 7768, pp.325, 2013, Information Systems and Applications, incl. Internet/Web, and HCI, Information Systems and Applications, incl. Internet/Web, and HCI, 978-3-642-41568-5. ⟨hal-01281478⟩
Accès au bibtex
BibTex

2010

ref_biblio
Moshe Timothy Masonta, Olufemi James Oyedapo, Marc Girod-Genet. A light-weight Internet protocol multimedia subsystem (IMS) client : development for smart mobile devices. LAP LAMBERT Academic Publishing, pp.108, 2010, 978-3-8433-7301-2. ⟨hal-01354824⟩
Accès au bibtex
BibTex

2009

ref_biblio
Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. ⟨hal-01370512⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. ⟨hal-01370514⟩
Accès au bibtex
BibTex

2008

ref_biblio
Hakima Chaouchi, Guy Pujolle. Réseaux sans fil émergents : standards IEEE. Hermès science publications; Lavoisier, pp.466, 2008, Traité IC2, série réseaux et télécommunications, Traité IC2, série réseaux et télécommunications, 978-2-7462-1889-5. ⟨hal-01342759⟩
Accès au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
Accès au bibtex
BibTex

2007

ref_biblio
Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01329422⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 2, Technologies du marché. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1698-3. ⟨hal-01328157⟩
Accès au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, Série Réseaux et Télécoms IC2, Série Réseaux et Télécoms 978-2-7462-1697-6. ⟨hal-01328159⟩
Accès au bibtex
BibTex

Patents

2017

ref_biblio
Vincent Gauthier, Fereshteh Asgari, Mounim El Yacoubi, Alexis Sultan. Procédé d'estimation de trajectoires utilisant des données mobiles. France, N° de brevet: FR3046006. 16609. 2017, pp.34. ⟨hal-01582154⟩
Accès au bibtex
BibTex

2013

ref_biblio
Ethmane El Moustaine, Maryline Laurent. Procédé pour crypter des données dans un cryptosystème NTRU (N,p,q). France, N° de brevet: FR2992510. 12959. 2013, pp.27. ⟨hal-01275262⟩
Accès au bibtex
BibTex

2012

ref_biblio
Ethmane El Moustaine, Maryline Laurent. Procédé d'authentification d'un tag. France, N° de brevet: FR2971905. 12982. 2012, pp.24. ⟨hal-01343576⟩
Accès au bibtex
BibTex
ref_biblio
Zhenzhen Zhao, Noel Crespi. Systems and methods for service provision based on events. United States, Patent n° : US20120102408. 13455. 2012, pp.19. ⟨hal-01336032⟩
Accès au bibtex
BibTex

2010

ref_biblio
Abdelwaheb Marzouki, Djamal Zeghlache. Orientation and localization system. France, Patent n° : WO/2010/122370. 9966. 2010, pp.38. ⟨hal-01343574⟩
Accès au bibtex
BibTex
ref_biblio
Abdelwaheb Marzouki, Djamal Zeghlache. Communication system comprising a plurality of nodes having a location and an orientation to be determined. France, Patent n° : WO/2010/092418. 9964. 2010, pp.35. ⟨hal-01343146⟩
Accès au bibtex
BibTex

2009

ref_biblio
Hakima Chaouchi, Maryline Laurent. Procédé d'échange de données dans un réseau ad hoc. France, N° de brevet: FR2919137. 7091. 2009, pp.50. ⟨hal-01354850⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi, Bassam El Saghir. Architecture informatique hiérarchisée à couches multiples. France, N° de brevet: FR2929474. 13447. 2009, pp.27. ⟨hal-01336020⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. Procédé de sauvegarde/restauration de fichiers dans un réseau pair à pair. France, N° de brevet: FR2929792. 5331. 2009, pp.36. ⟨hal-01343149⟩
Accès au bibtex
BibTex

2008

ref_biblio
Noel Crespi, Bassam El Saghir, Mehdi Mani. Mécanismes SIP pour l'indication des capacités des terminaux. France, N° de brevet: FR2909245. 13448. 2008, pp.29. ⟨hal-01336056⟩
Accès au bibtex
BibTex
ref_biblio
Wajdi Louati, Djamal Zeghlache. Autonomic network node system. France, Patent n° : WO/2008/093174. 13006. 2008, pp.62. ⟨hal-01343575⟩
Accès au bibtex
BibTex

Poster communications

2017

ref_biblio
Marouen Mechtri, Chaima Ghribi, Oussama Soualah, Djamal Zeghlache. ETSO : End-To-end SFC Orchestration framework. IM 2017 : IFIP/IEEE Symposium on Integrated Network and Service Management, May 2017, Lisbon, Portugal. IEEE Computer Society, pp.903 - 904, 2017, ⟨10.23919/INM.2017.7987405⟩. ⟨hal-01630098⟩
Accès au bibtex
BibTex

2015

ref_biblio
Samir El-Haddad, Marc Girod-Genet, Bachar El-Hassan, Lina Nachabe Ismail. Clustering energy based routing protocol for Wireless Sensor Networks. BLACKSEACOM 2015 : 3rd International Black Sea Conference on Communications and Networking, May 2015, Constanta, Romania. 2015. ⟨hal-01358334⟩
Accès au bibtex
BibTex

2013

ref_biblio
Yannick Le Louedec, Angel Cuevas Rumin, Danny de Vleeschlauwer, Joerg Widmer, Noel Crespi, et al.. eCOUSIN : enhanced COntent distribUtion with Social INformation. Future Network & Mobile Summit 2013, Jul 2013, Lisbon, Portugal. 2013. ⟨hal-01369474⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. RetroVisor : nested virtualization for multi IaaS VM availability. ComPAS 2013 : Conférence en Parallélisme, Architecture et Système, Jan 2013, Grenoble, France. 2013. ⟨hal-01287046⟩
Accès au bibtex
BibTex

2011

ref_biblio
Sonia Elwardi-Ben Amor, Badr-Eddine Benkelfat, Mourad Zghal. Multiplex coding for real-time optical image processing. SPIE 2011 : Optical Design and Engineering IV, Sep 2011, Marseille, France. SPIE, 8167, 2011, ⟨10.1117/12.899570⟩. ⟨hal-01302374⟩
Accès au bibtex
BibTex

Proceedings

2022

ref_biblio
Hakim Hacid, Monther Aldwairi, Mohamed Reda Bouadjenek, Marinella Petrocchi, Noura Faci, et al.. Service-oriented computing – ICSOC 2021 Workshops. 13236, Springer International Publishing, pp.XIV, 378, 2022, Lecture Notes in Computer Science, 978-3-031-14134-8. ⟨10.1007/978-3-031-14135-5⟩. ⟨hal-04063064⟩
Accès au bibtex
BibTex

2021

ref_biblio
Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28–29, 2020, revised selected papers. MSPN 2020: International Conference on Mobile, Secure, and Programmable Networking, Oct 2021, Paris, France. 12605, Springer, pp.X, 251, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-67549-3. ⟨10.1007/978-3-030-67550-9⟩. ⟨hal-03494288⟩
Accès au bibtex
BibTex
ref_biblio
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, et al.. Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense). CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021. ⟨hal-03535661⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03535661/file/Actes_CAID_2021%20%281%29.pdf BibTex
ref_biblio
Joaquin Garcia‐alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich. Risks and security of internet and systems: 15th international conference, CRiSIS 2020, Paris, France, November 4–6, 2020, revised selected papers. CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩. ⟨hal-03628457⟩
Accès au bibtex
BibTex

2020

ref_biblio
Apostolos Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, et al.. Computer security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, revised selected papers. ESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11981, Springer, pp.279, 2020, Lecture Notes in Computer Science(LNCS), 978-3-030-42050-5. ⟨10.1007/978-3-030-42051-2⟩. ⟨hal-03125783⟩
Accès au bibtex
BibTex
ref_biblio
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, et al.. Computer security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 revised selected papers. ESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11980, Springer, pp.440, 2020, Lecture Notes in Computer Science (LNCS), 978-3-030-42047-5. ⟨10.1007/978-3-030-42048-2⟩. ⟨hal-03125793⟩
Accès au bibtex
BibTex
ref_biblio
Anis Laouiti, Amir Qayyum, M.Naufalb.M. Saad. Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop, 2019. IWVSC 2019: 3rd International Workshop on Vehicular Ad-hoc Networks for Smart Cities, 1144, Springer, 120 p., 2020, Advances in Intelligent Systems and Computing. ⟨hal-02454413⟩
Accès au bibtex
BibTex

2019

ref_biblio
Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia Alfaro. Data privacy management, cryptocurrencies and blockchain technology. ESORICS 2019, DPM 2019 and CBT 2019 : Data Privacy Management, Cryptocurrencies and Blockchain Technology, Sep 2019, Luxembourg, Luxembourg. 11737, Springer, 400 p., 2019, Lecture Notes in Computer Science book series: Security and Cryptology book sub series, 978-3-030-31499-6. ⟨10.1007/978-3-030-31500-9⟩. ⟨hal-02390284⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Selma Boumerdassi, Leghris Cherkaoui, Samia Bouzefrane. Mobile, Secure, and Programmable Networking: 5th international conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, revised selected papers. MSPN 2019: International Conference on Mobile, Secure, and Programmable Networking, Apr 2019, Mohammedia, Morocco. 11557, Springer, 277 p., 2019, Lecture Notes in Computer Science (LNCS), 978-3-030-22884-2. ⟨10.1007/978-3-030-22885-9⟩. ⟨hal-02445391⟩
Accès au bibtex
BibTex
ref_biblio
Eric Renault, Paul Mühlethaler, Selma Boumerdassi. Machine Learning for Networking: first international conference, MLN 2018, Paris, France, November 27-29, 2018, revised selected papers. MLN 2018: 1st international conference on Machine Learning for Networking, Nov 2018, Paris, France. 11407, Springer, 388 p., 2019, Lecture Notes in Computer Science (LNCS), 978-3-030-19944-9. ⟨10.1007/978-3-030-19945-6⟩. ⟨hal-02445117⟩
Accès au bibtex
BibTex

2018

ref_biblio
Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, et al.. Interoperability, Safety and Security in IoT: Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Nov 2017, Valence, Spain. Springer, XIV-165 p., 2018, 978-3-319-93797-7. ⟨10.1007/978-3-319-93797-7⟩. ⟨hal-02145072⟩
Accès au bibtex
BibTex

Reports

2020

ref_biblio
Marc Girod-Genet, Lina Nachabe Ismail, Maxime Lefrançois, João Moreira, Mauro Dragoni. SmartM2M; Extension to SAREF; Part 8: eHealth/Ageing-well Domain. [Research Report] ETSI TS 103 410-8 V1.1.1, ETSI SmartM2M. 2020, pp.38. ⟨hal-02937318⟩
Accès au bibtex
BibTex

2019

ref_biblio
Marc Girod-Genet, Haissam Kharboutly, Lina Nachabe Ismail, Bachar El Hassan. Smart Body Area Networks (SmartBAN) : service and application standardized enablers and interfaces, APIs and infrastructure for interoperability management. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); American University of Culture & Education (.); Faculté de Génie / Faculty of Engineering (Université Libanaise / Lebanese University (UL)). 2019, pp.56. ⟨hal-02277563⟩
Accès au bibtex
BibTex
ref_biblio
Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal Pedrosa, Perez-Sola Cristina, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. [Research Report] Dépt. Réseaux et Service de Télécom (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Department of Information and Communications Engineering (Autonomous University of Barcelona). 2019, pp.13. ⟨hal-02086536⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02086536/file/preprint-iacr2019.pdf BibTex

2017

ref_biblio
Omar Elloumi, Jean-Pierre Desbenoit, Patrick Wetterwald, Georgios Karagiannis, Juergen Heiles, et al.. High Level Architecture (HLA) : release 3.0 : AIOTI WG03 - loT Standardisation. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Eurecat - Centro tecnológico de Cataluña (La Généralité de Catalogne = La Generalitat de Catalunya); Gemalto [Meudon] (.); Nokia Bell Labs [Paris Saclay] (Nokia); Schneider Electric (.); Cisco systems [France] (Cisco); Huawei Technologies [Dusseldorf] (Huawei ); Siemens AG [Munich] (.); Landis+Gyr (Toshiba); NEC Europe Ltd.[Middlesex] (NEC); Stiftelsen for INdustriell og TEknisk Forskning [Trondheim] (.); Insight Centre for Data Analytics [Galway] (National University of Ireland Galway (NUIG)); Telefonica Investigación y Desarrollo (Telefónica Group); Arthur’s Legal B.V. (.); Easy Global Market [Sophia-Antipolis] (.); IBM Germany (IBM); Tecnalia research and Innovation [Zamudio] (Tecnalia Corporación Tecnológica); European Software Institute (Tecnalia Corporación Tecnológica); Commledge (.). 2017, pp.40. ⟨hal-01592086⟩
Accès au bibtex
BibTex

2016

ref_biblio
Antonio Manzalini, Cagatay Buyukkoc, Prosper Chemouil, Slawomir Kuklinski, Franco Callegati, et al.. Towards 5G software-defined ecosystems. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); University College of London [London] (.); Hewlett Packard Enterprise (Hewlett Packard); China Mobile Research Institute (China Mobile); Intel UK (Intel); Department of electrical, electronic and information engineering "GUGLIELMO MARCONI" (Università di Bologna [Bologna]); Future Centre (Telecom Italia); pdvWireless (.); Telemates UK (Telemates); Orange Labs; AT&T Labs Research (AT&T). 2016, pp.16. ⟨hal-01419600⟩
Accès au bibtex
BibTex
ref_biblio
Paul Murdock, Louay Bassbouss, Martin Bauer, Mahdi Ben Alaya, Rajdeep Bhowmik, et al.. Semantic interoperability for the Web of Things. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); TNO [Netherlands] (.); National Institute of Standards and Technology [Gaithersburg] (Agency of the U.S. Department of Commerce); British Telecom Research & Technology (British Telecom); Intel corporation [USA] (Intel corporation); Krypton Brothers (.); EURECOM [Sophia Antipolis] (Institut Mines-Télécom); Fraunhofer-Institut für Offene Kommunikationssysteme (FOKUS Fraunhofer); LG Group (.); Rockwell automation (.); Huawei Technologies [Nanjing] (Huawei Technologies Co. Ltd.); Ericsson Research (Ericsson ); Insight Centre for Data Analytics [Galway] (National University of Ireland Galway (NUIG)); Network Research Division, NEC Laboratories Europe (NEC Europe Ltd.); Sensinov (.); Huawei Technologies [San Francisco] (Huawei Technologies Co. Ltd.); Department of Computer Science [Binghamton] (Binghamton University); Honeywell Process Solutions (Honeywell International Inc.); Senslytics (Senslytics Corporation); Telecom Orange (.); Laboratoire d'analyse et d'architecture des systèmes (CNRS (UPR8001)-Université Toulouse 3-INPT-Institut National des Sciences Appliquées de Toulouse); OpenDOF (Panasonic); Deutsche Telekom Laboratories (Deutsche Telekom); Schneider Electric (.); Nokia Bell Labs [Paris Saclay] (Nokia); Institut de Recherche en Informatique de Toulouse (CNRS : UMR5505; INPT de Toulouse; Universités de Toulouse I, II et III); FESTO (.); Landis+Gyr (Toshiba); IoTecha (.); Comcast (.); Orange Labs [Issy les Moulineaux] (France Télécom); InterDigital Communications (.); World Wide Web Consortium (.). 2016, pp.18. ⟨hal-01362033⟩
Accès au bibtex
BibTex

2014

ref_biblio
Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi. Discussion on energy efficient protocols. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2014. ⟨hal-01334216⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi, Byung-Hun Song, Junho Shin, et al.. Proposal for design principles on scalability in TS-0004. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Korea Electronics Technology Institute (.). 2014. ⟨hal-01334693⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Noel Crespi, Eric Farnier. Proposal for design principles on extensibility. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Ecometering (GDF-Suez). 2014. ⟨hal-01334679⟩
Accès au bibtex
BibTex
ref_biblio
Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi. Proposal for design principles and requirements on energy efficient protocols. [Rapport de recherche] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2014. ⟨hal-01334204⟩
Accès au bibtex
BibTex

2012

ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi, Ilyoung Chong. The internet of things : concept and problem statement : 05. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Hankuk University of Foreign Studies (Hankuk University of Foreign Studies). 2012, pp.19. ⟨hal-00849881⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Noel Crespi. Emerging cloud-based internet of things. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2012, pp.23. ⟨hal-00861826⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 04. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences). 2012, pp.18. ⟨hal-00849850⟩
Accès au bibtex
BibTex

2011

ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.34. ⟨hal-00665099⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 03. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences). 2011, pp.20. ⟨hal-00849851⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Updated text of Draft Recommendation Y.energy-hn. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011. ⟨hal-01334192⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN (2). [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.30. ⟨hal-00665290⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 01. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.21. ⟨hal-00634616⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 02. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.21. ⟨hal-00634610⟩
Accès au bibtex
BibTex
ref_biblio
Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN (3). [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.29. ⟨hal-00665292⟩
Accès au bibtex
BibTex

2010

ref_biblio
Chakib Bekara, Maryline Laurent, Wassim Drira, Rahim Kacimi, André-Luc Beylot, et al.. Tests, Mesures et Validation. [Contrat] Institut National Polytechnique de Toulouse. 2010. ⟨hal-03970390⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. IMS services interaction. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.12. ⟨hal-01346458⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01346458/file/S2-100343_23228_IMS_sces_interac.pdf BibTex
ref_biblio
Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 00. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.17. ⟨hal-00634613⟩
Accès au bibtex
BibTex
ref_biblio
Mohamed-Haykel Zayani, Vincent Gauthier, Djamal Zeghlache. Quantifying spatiotemporal stability by means of entropy : approach and motivations. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.10. ⟨hal-01356335⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01356335/file/Quantifying%20Spatiotemporal%20Stability%20by%20means%20of%20Entropy.pdf BibTex

2009

ref_biblio
Nahla Abid, Maryline Laurent. A new authentication method based on cryptographic identifiers CGAs. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.29. ⟨hal-01360031⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360031/file/RR-Nahla-Abid-EAP-CGA-2009.pdf BibTex
ref_biblio
Monique Becker, Chakib Bekara, André-Luc Beylot, Alexandre Delye, Riadh Dhaou, et al.. Cold chain monitoring using wireless sensor networks : design & experimental feedback. [Research Report] RR-09007–RST, Télécom Sud Paris. 2009. ⟨hal-03975329⟩
Accès au bibtex
BibTex
ref_biblio
Wassim Drira, Chakib Bekara, Maryline Laurent. Secure aggregation in wireless sensor networks. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.58. ⟨hal-01360043⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360043/file/RR_securite_Capteurs-Aggregation-WassimDRIRA-2009.pdf BibTex
ref_biblio
Sondes Larafa, Maryline Laurent. Distributed AAA framework for MANET: performance analysis. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.34. ⟨hal-01360029⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360029/file/RR-Sondes-Larafa-AAA-Manet-Performance.pdf BibTex
ref_biblio
Amina Mekki Mokhtar, Kheira Bekara, Maryline Laurent. Un protocole pour la négociation des politiques de privacy. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.55. ⟨hal-01369889⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01369889/file/RR-Amina-Mekki-Negot-Pol-2009-1.pdf BibTex

2008

ref_biblio
Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental experience with Host Identity Protocol (HIP). [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.58. ⟨hal-01373423⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01373423/file/RR-HIP-Mesures-NahlaABID-2008.pdf BibTex
ref_biblio
Aymen Boudguiga, Tony Cheneau, Maryline Laurent. Usage and performance of cryptographically generated addresses. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.94. ⟨hal-01373433⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01373433/file/RR-Boudguiga-CGA-Performance.pdf BibTex
ref_biblio
Noel Crespi. Revision in Section 4.1. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335943⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Revision of Section 4.2. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335939⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Conclusion derived from Sections 4.2.1 and 4.2.2 for clarification of scope for release 8. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.6. ⟨hal-01335909⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. ICS termination with UE assisted T-ADS in case of no simultaneous PS and CS support. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335888⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Use case to illustrate functions of release 8 ISB. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.3. ⟨hal-01335931⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Clean-up & conclusion of sections 5.1.2-5.1.4. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.8. ⟨hal-01335900⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. 2. References. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.1. ⟨hal-01335908⟩
Accès au bibtex
BibTex
ref_biblio
Noel Crespi. Inclusion of ISC enhancements to support SB for service class based SB. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.2. ⟨hal-01335935⟩
Accès au bibtex
BibTex
ref_biblio
Wassim Drira, Chakib Bekara, Maryline Laurent. Sécurité dans les réseaux de capteurs sans fil : conception et implémentation. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55. ⟨hal-01373430⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01373430/file/RR_securite_Capteurs-Implem-WassimDRIRA-2008.pdf BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. Un système de sauvegarde P2P sécurisé s'appuyant sur une architecture AAA. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55. ⟨hal-01373441⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01373441/file/RR_securite_P2P.pdf BibTex
ref_biblio
Willy Ronald Jimenez Freitez, Hakima Chaouchi, Maryline Laurent. Authentication services in mobile ad hoc networks. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.41. ⟨hal-01373823⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01373823/file/RR-Willy-Jimenez-Virtualisationb-AAA-AdHoc.pdf BibTex

Theses

2023

ref_biblio
Fariba Ghaffari. A novel blockchain-based architecture for mobile network operators : Beyond 5G. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2023. English. ⟨NNT : 2023IPPAS009⟩. ⟨tel-04328677⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-04328677/file/121373_GHAFFARI_2023_archivage_final.pdf BibTex
ref_biblio
Danny Qiu. Nouvelles méthodes d'apprentissage automatique pour la planification des réseaux mobiles. Intelligence artificielle [cs.AI]. Institut Polytechnique de Paris, 2023. Français. ⟨NNT : 2023IPPAS010⟩. ⟨tel-04345569⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-04345569/file/128979_QIU_2023_archivage_final.pdf BibTex

2022

ref_biblio
Faraz Malik Awan. Towards synthetic sensing for smart cities : a machine/deep learning-based approach. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS006⟩. ⟨tel-03722891⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03722891/file/120697_AWAN_2022_depot-final.pdf BibTex
ref_biblio
Aicha Dridi. A novel efficient time series deep learning approach using classification, prediction and reinforcement : energy and telecom use case. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS010⟩. ⟨tel-03957284⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03957284/file/108477_DRIDI_2022_archivage.pdf BibTex
ref_biblio
van Quan Pham. Cloud-native optical network automation platforms. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS005⟩. ⟨tel-03702081⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03702081/file/78378Pham_2022.pdf BibTex
ref_biblio
Sara Rabhi. Optimized deep learning-based multimodal method for irregular medical timestamped data. Neural and Evolutionary Computing [cs.NE]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS003⟩. ⟨tel-03600526⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03600526/file/104092_RABHI_2022.pdf BibTex
ref_biblio
Koosha Zarei. Fake identity & fake activity detection in online social networks based on transfer learning. Computation and Language [cs.CL]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS008⟩. ⟨tel-03936643⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03936643/file/120960_ZAREI_2022_depot_final.pdf BibTex

2021

ref_biblio
Antoine Bernard. Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutions. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS012⟩. ⟨tel-03517087⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03517087/file/107327_BERNARD_2021.pdf BibTex
ref_biblio
Hicham Hossayni. Enabling industrial maintenance knowledge sharing by using knowledge graphs. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS017⟩. ⟨tel-03545734⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03545734/file/101752_HOSSAYNI_2021_diffusion.pdf BibTex
ref_biblio
Franklin Leukam Lako. Protection des données à caractère personnel pour les services énergétiques. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS004⟩. ⟨tel-03249688⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03249688/file/98829_LEUKAM_LAKO_2021.pdf BibTex
ref_biblio
Paul Marillonnet. User centric personal data management. Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS011⟩. ⟨tel-03523081⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03523081/file/106506_MARILLONNET_2021.pdf BibTex
ref_biblio
Marzieh Mozafari. Hate speech and offensive language detection using transfer learning approaches. Document and Text Processing. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS007⟩. ⟨tel-03276023⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03276023/file/120699_MOZAFARI_2021.pdf BibTex
ref_biblio
Nahit Pawar. Conception d'une architecture complète pour l'interopérabilité des objets connectés hétérogènes et des services de l'Internet des Objets. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS009⟩. ⟨tel-03353645⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03353645/file/98171_PAWAR_2021_archivage.pdf BibTex
ref_biblio
Mariana Segovia-Ferreira. Cyber-resilience and attack tolerance for cyber-physical systems. Cryptographie et sécurité [cs.CR]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS005⟩. ⟨tel-03881707⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03881707/file/107149_SEGOVIA-FERREIRA_2021_archivage.pdf BibTex
ref_biblio
Mustafizur Rahman Shahid. Deep learning for Internet of Things (IoT) network security. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS003⟩. ⟨tel-03193266⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03193266/file/94113_SHAHID_2021.pdf BibTex

2020

ref_biblio
Shanay Behrad. Slice specific authentication and access control for 5G. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS007⟩. ⟨tel-02614232⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02614232/file/86001_BEHRAD_2020_archivage.pdf BibTex
ref_biblio
Fabien Charmet. Security characterization of SDN virtual network migration : formal approach and resource optimization. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS008⟩. ⟨tel-02860894⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02860894/file/98154_CHARMET_2020_archivage.pdf BibTex
ref_biblio
Aïda Abdou Diop. Cryptographic mechanisms for device authentication and attestation in the internet of things. Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS023⟩. ⟨tel-03051732⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03051732/file/97463_DIOP_2020.pdf BibTex
ref_biblio
Omar Houidi. Algorithmes exacts et heuristiques pour le chainage de services réseaux virtualisés. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2020. Français. ⟨NNT : 2020IPPAS005⟩. ⟨tel-02905778⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02905778/file/85584_HOUIDI_2020.pdf BibTex
ref_biblio
Mohamed Emine Laarouchi. A safety approach for CPS-IoT. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS010⟩. ⟨tel-03051734⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03051734/file/88253_LAAROUCHI_2020.pdf BibTex
ref_biblio
Asma Lahbib. Distributed management framework based on the blockchain technology for industry 4.0 environments. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS017⟩. ⟨tel-03121199⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03121199/file/85585_LAHBIB_2020.pdf BibTex
ref_biblio
Lionel Nganyewou Tidjon. Formal modeling of intrusion detection systems. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris; Université de Sherbrooke (Québec, Canada), 2020. English. ⟨NNT : 2020IPPAS021⟩. ⟨tel-03137661⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03137661/file/98766_NGANYEWOU_TIDJON_2020.pdf BibTex
ref_biblio
Rajapaksha Waththe Vidanelage Praboda Chathurangani Rajapaksha. Clickbait detection using multimodel fusion and transfer learning. Social and Information Networks [cs.SI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS025⟩. ⟨tel-03139880⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03139880/file/98914_PRABODA_CHATHURANGANI_RAJAPAKSHA_2020_ARCHIVAGE.pdf BibTex
ref_biblio
Yasir Saleem Shaikh. Privacy preserving internet of things recommender systems for smart cities. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS001⟩. ⟨tel-02500640⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02500640/file/90274_SHAIKH_2020_archivage.pdf BibTex
ref_biblio
Abdallah Sobehy. Machine learning based localization in 5G. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS012⟩. ⟨tel-03092322⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03092322/file/97326_SOBEHY_2020.pdf BibTex

2019

ref_biblio
Pierre-Marie Bajan. Simulation of activities and attacks : application to cyberdefense. Cryptography and Security [cs.CR]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL014⟩. ⟨tel-02316915⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02316915/file/75556_BAJAN_2019_archivage-2.pdf BibTex
ref_biblio
Filipe Conceicao. Network survival with energy harvesting : secure cooperation and device assisted networking. Networking and Internet Architecture [cs.NI]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL020⟩. ⟨tel-02437270⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02437270/file/99431_CONCEICAO_2019_archivage.pdf BibTex
ref_biblio
Montida Pattaranantakul. Moving towards software-defined security in the era of NFV and SDN. Cryptography and Security [cs.CR]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL009⟩. ⟨tel-02186875⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-02186875/file/78431_PATTARANANTAKUL_2019_archivage-2.pdf BibTex

2006

ref_biblio
Joaquin Garcia‐alfaro. Platform of intrusion management : design and implementation. Cryptography and Security [cs.CR]. Telecom Bretagne; Universitat Autònoma de Barcelona, 2006. English. ⟨NNT : ⟩. ⟨tel-03628739⟩
Accès au bibtex
BibTex

Preprints, Working Papers, ...

2020

ref_biblio
Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. A first Instagram dataset on COVID-19. 2020. ⟨hal-02557003⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02557003/file/2004.12226.pdf BibTex

2019

ref_biblio
Asma Berriri, Natalia Kushik, Djamal Zeghlache. Extended Finite State Machine based test generation for an OpenFlow switch. 2019. ⟨hal-02263575⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02263575/file/EFSMBasedApproach.pdf BibTex