SCN (Security and digital trust)
SCN
Samovar, Telecom SudParis
Themes: Trust, safety and cybersecurity
The SCN (Sécurité et Confiance Numérique) team conducts research and teaching on cybersecurity topics, including protection, defense and resilience, from software to hardware, as well as networks, data and privacy.
Application domains: The team members have nationally and internationally recognized experience in cybersecurity and privacy, particularly on network protection, distributed systems, communicating objects and peer-to-peer applications, as well as on the use of AI for cyberdefense (such as intrusion detection and attack remediation), specification of security policies, and resilience of cyber-physical systems (e.g., industry 4.0 and digital health).
Contact person: Joaquin Garcia-Alfaro
web site: https://scn.telecom-sudparis.eu/
Journal articles
2024
- ref_biblio
- Nathanaël Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des télécommunications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
- Accès au bibtex
- ref_biblio
- Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and resilient 6 G RAN networks: a decentralized approach with zero trust architecture. Journal of Network and Systems Management, 2024, 32 (33), ⟨10.1007/s10922-024-09807-x⟩. ⟨hal-04610740⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. A survey on cyber-resilience approaches for cyber-physical systems. ACM Computing Surveys, 2024, 56 (8), pp.1-37. ⟨10.1145/3652953⟩. ⟨hal-04562096⟩
- Accès au texte intégral et bibtex
2023
- ref_biblio
- Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. IEEE Internet of Things Magazine, 2023, 6 (1), pp.46-50. ⟨10.1109/IOTM.001.2200244⟩. ⟨hal-04401093⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. Computer, 2023, 56 (7), pp.54-66. ⟨10.1109/MC.2023.3273491⟩. ⟨hal-04400976⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys, 2023, 55 (14s), pp.1-40. ⟨10.1145/3588999⟩. ⟨hal-04401069⟩
- Accès au texte intégral et bibtex
- ref_biblio
- David Pàmies-Estrems, Joaquin Garcia‐alfaro. On the self-adjustment of privacy safeguards for query log streams. Computers & Security, 2023, 134, pp.103450. ⟨10.1016/j.cose.2023.103450⟩. ⟨hal-04189131⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari. Secure attack detection framework for hierarchical 6G-enabled internet of vehicles. IEEE Transactions on Vehicular Technology, 2023, 73 (2), pp.1-11. ⟨10.1109/TVT.2023.3317940⟩. ⟨hal-04227768⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
- Accès au bibtex
- ref_biblio
- Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization’s data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos. SigML++: supervised log anomaly with probabilistic polynomial approximation. Cryptography, 2023, 7 (4), pp.52. ⟨10.3390/cryptography7040052⟩. ⟨hal-04304189⟩
- Accès au texte intégral et bibtex
2022
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro. Cyber-physical defense in the quantum Era. Scientific Reports, 2022, 12, pp.1905. ⟨10.1038/s41598-022-05690-1⟩. ⟨hal-03628438⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh. Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on emerging telecommunications technologies, 2022, 33 (3), pp.1-20. ⟨10.1002/ett.3667⟩. ⟨hal-03990998⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.727-729. ⟨10.1007/s12243-022-00935-6⟩. ⟨hal-04164335⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, et al.. Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.789-812. ⟨10.1007/s12243-022-00926-7⟩. ⟨hal-03965590⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
- Accès au bibtex
- ref_biblio
- Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mariana Segovia, Joaquin Garcia‐alfaro. Design, modeling and implementation of digital twins. Sensors, 2022, 22 (14), pp.5396-5426. ⟨10.3390/s22145396⟩. ⟨hal-03843008⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
- Accès au texte intégral et bibtex
2021
- ref_biblio
- Mikaël Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. Security and communication networks, 2021, 2021, pp.1 - 19. ⟨10.1155/2021/5512075⟩. ⟨hal-03991134⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Fillipe Santos. GPS-free, error tolerant path planning for swarms of micro aerial vehicles with quality amplification ‡. Sensors, 2021, 21 (14), pp.4731:1-4731:16. ⟨10.3390/s21144731⟩. ⟨hal-03628455⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michel Barbeau, Erwan Beurier, Joaquin Garcia‐alfaro, Randy Kuang, Marc-Oliver Pahl, et al.. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?. Digitale Welt, 2021, 5 (1), pp.34-39. ⟨10.1007/s42354-021-0402-0⟩. ⟨hal-03628446v2⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michel Barbeau, Frederic Cuppens, Nora Cuppens, Romain Dagnas, Joaquin Garcia‐alfaro. Resilience estimation of Cyber-Physical Systems via quantitative metrics. IEEE Access, 2021, 9, pp.46462-46475. ⟨10.1109/ACCESS.2021.3066108⟩. ⟨hal-03626725⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Edgar Galván, Joaquin Garcia‐alfaro, Vicenç Torra, Guillermo Navarro-Arribas. Agents in a privacy-preserving world. Transactions on Data Privacy, 2021, 14 (1), pp.53-63. ⟨hal-04337700⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
- Accès au bibtex
- ref_biblio
- Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, et al.. Framework, tools and good practices for cybersecurity curricula. IEEE Access, 2021, 9, pp.94723-94747. ⟨10.1109/ACCESS.2021.3093952⟩. ⟨hal-03997196⟩
- Accès au texte intégral et bibtex
2020
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi. PROUD: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 2020, 111, pp.899-918. ⟨10.1016/j.future.2019.11.012⟩. ⟨hal-03990965⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Giovanni Russello. CUPS: secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update. Security and Privacy , 2020, 3 (4), pp.1-24. ⟨10.1002/spy2.85⟩. ⟨hal-03991066⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia‐alfaro. Switched-based resilient control of cyber-physical systems. IEEE Access, 2020, 8 (3), pp.212194 - 212208. ⟨10.1109/ACCESS.2020.3039879⟩. ⟨hal-03113904⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Jean-Paul Yaacoub, Ola Salman, Hassan N Noura, Nesrine Kaaniche, Ali Chehab, et al.. Cyber-physical systems security: limitations, issues and future trends. Microprocessors and Microsystems: Embedded Hardware Design , 2020, 77, pp.103201. ⟨10.1016/j.micpro.2020.103201⟩. ⟨hal-03990927⟩
- Accès au texte intégral et bibtex
2019
- ref_biblio
- Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia‐alfaro, Jamil Kassem, Evangelos Kranakis. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications. Transactions on emerging telecommunications technologies, 2019, 30 (12), ⟨10.1002/ett.3712⟩. ⟨hal-02390285⟩
- Accès au bibtex
- ref_biblio
- Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 14, pp.14979-14993. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-03991234⟩
- Accès au texte intégral et bibtex
Conference papers
2025
- ref_biblio
- Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. Towards privacy-preserving and fairness-aware federated learning framework. Privacy Enhancing Technologies (PETs), Jul 2025, Washinghton, DC, United States. pp.845-865, ⟨10.56553/popets-2025-0044⟩. ⟨hal-04782394⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Alessandro Palma, Nikolaos Papadakis, Georgios Bouloukakis, Joaquin Garcia-Alfaro, Mattia Sospetti, et al.. SHIELD : assessing security-by-design in federated data spaces using attack graphs. The 40th ACM/SIGAPP Symposium On Applied Computing ( SAC), Mar 2025, Catania, Italy. ⟨10.1145/3672608.3707797⟩. ⟨hal-04832442v2⟩
- Accès au texte intégral et bibtex
2024
- ref_biblio
- Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Optimal UAV-trajectory design in a dynamic environment using NOMA and deep reinforcement learning. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.277-282, ⟨10.1109/CCECE59415.2024.10667252⟩. ⟨hal-04762084⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: a model for accurate predictions with inherent fairness evaluation. 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI), Oct 2024, Santiago de Compostela, SPAIN, Spain. ⟨10.3233/FAIA240592⟩. ⟨hal-04745438⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. The 19th International Conference on Availability, Reliability and Security (ARES), Jul 2024, Vienna, Austria. pp.1-13, ⟨10.1145/3664476.3664500⟩. ⟨hal-04669287⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Romain Dagnas, Michel Barbeau, Joaquin Garcia‐alfaro, Reda Yaich. Resilience assessment of multi-layered cyber-physical systems. IFIP Networking 2024 - IOCRCI, Jun 2024, Thessaloniki, Greece. ⟨hal-04559568v2⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. 2024 IEEE 14th annual computing and communication workshop and conference (CCWC), Jan 2024, Las vegas, NV (US), United States. ⟨10.1109/CCWC60891.2024.10427731⟩. ⟨hal-04402381⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in copyright management applications : the blockchain perspective. Barolli, L. (eds) Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.169-182, ⟨10.1007/978-3-031-57942-4_18⟩. ⟨hal-04690838⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Badis Hammi, Tristan Billot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.314-325, ⟨10.1007/978-3-031-57916-5_27⟩. ⟨hal-04580467⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Seyni Kane, Anis Bkakria. A privacy-preserving graph encryption scheme based on oblivious RAM. 38th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Jul 2024, San Jose, United States. pp.101-108, ⟨10.1007/978-3-031-65172-4_7⟩. ⟨hal-04588553⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Venkata Srinivas Kothapalli. Location optimization for tethered aerial base station serving mmWave high altitude UAVs. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.271-276, ⟨10.1109/CCECE59415.2024.10667117⟩. ⟨hal-04762101⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. TBS joint optimization to serve mmWave high altitude UAVs: a counterfactual MAB approach. 13th International Conference on Communications, Circuits and Systems (ICCCAS), May 2024, Xiamen, France. pp.424-429, ⟨10.1109/ICCCAS62034.2024.10652678⟩. ⟨hal-04762130⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024), Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. ⟨hal-04739382⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel. DDoS mitigation while preserving QoS: a deep reinforcement learning-based approach. 2024 IEEE : 10th International Conference on Network Softwarization (NetSoft), Jun 2024, Saint Louis, MO, United States. pp.369-374, ⟨10.1109/NetSoft60951.2024.10588889⟩. ⟨hal-04659906⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphael Troncy. X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), ACM, Jul 2024, Singapore, Singapore. pp.35-48, ⟨10.1145/3634737.3637654⟩. ⟨hal-04446027⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. XAI-driven adversarial attacks on network intrusion detectors. European Interdisciplinary Cybersecurity Conference (EICC), Jun 2024, Xanthi, Greece. pp.65-73, ⟨10.1145/3655693.3655714⟩. ⟨hal-04660625⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Hugo Teixeira de Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, et al.. A model-based approach for assessing the security of cyber-physical systems. The 19th International Conference on Availability, Reliability and Security (ARES) (2024), Jul 2024, Vienne, Austria. pp.1-10, ⟨10.1145/3664476.3670470⟩. ⟨hal-04669279⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩. ⟨hal-04695972⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID/session token abuse on openID connect. 21st International Conference on Security and Cryptography (SECRYPT 2024), Jul 2024, Dijon, France. pp.674-679, ⟨10.5220/0012757900003767⟩. ⟨hal-04719043⟩
- Accès au bibtex
2023
- ref_biblio
- Marwan Abbas-Escribano, Hervé Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. 18th International Conference on Risks and Security of Internet and Systems ( CRiSIS), Dec 2023, Rabat (MOROCCO), Morocco. pp.185-199, ⟨10.1007/978-3-031-61231-2_12⟩. ⟨hal-04609669⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier, Olivier Levillain, et al.. Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3. ⟨hal-04165396⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, ⟨10.1145/3576915.3624027⟩. ⟨hal-04325353⟩
- Accès au bibtex
- ref_biblio
- Iain Burge, Michel Barbeau, Joaquin Garcia‐alfaro. Quantum algorithms for shapley value calculation. 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep 2023, Bellevue, United States. pp.1-9, ⟨10.1109/QCE57702.2023.00024⟩. ⟨hal-04386997⟩
- Accès au bibtex
- ref_biblio
- Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), LIFO, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164470⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. 2023 IFIP Networking Conference (IFIP Networking), Jun 2023, Barcelone, Spain. ⟨10.23919/IFIPNetworking57963.2023.10186355⟩. ⟨hal-04083180⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mario Fernández-Tárraga, Alejandro David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. VIII National Conference on Cybersecurity Research (JNIC), Universidad de la Rioja, Jun 2023, Vigo, España. pp.469--476. ⟨hal-04198177⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Joaquin Garcia‐alfaro, Sandrine Bayle. Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS). Colloque IMT 2023 : « Sécurité et Résilience », Apr 2023, Palaiseau, France. ⟨hal-04098069⟩
- Accès au bibtex
- ref_biblio
- Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Towards understanding alerts raised by unsupervised network intrusion detection systems. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ), Oct 2023, Hong Kong China, France. pp.135-150, ⟨10.1145/3607199.3607247⟩. ⟨hal-04172470⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pablo Martínez-Sanchez, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. 2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444. ⟨hal-04198175⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Automated enrichment of logical attack graphs via formal ontologies. ICT Systems Security and Privacy Protection (SEC), Jun 2023, Poznan, Poland. pp.59-72, ⟨10.1007/978-3-031-56326-3_5⟩. ⟨hal-04563448⟩
- Accès au bibtex
2022
- ref_biblio
- Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA. 2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩. ⟨hal-04006345⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro, Christian Lübben, Marc-Oliver Pahl, Wüstrich Lars. Resilience via blackbox self-piloting plants. ECW 2022: European Cyber Week, Pôle d’Excellence Cyber, Nov 2022, Rennes, France. pp.35-46. ⟨hal-04006320⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Alexandre Dey, Eric Totel, Benjamin Costé. DAEMON: dynamic auto-encoders for contextualised anomaly detection applied to security monitoring. 37th IFIP TC 11 International Conference, SEC 2022,, Jun 2022, Copenhagen, Denmark. ⟨10.1007/978-3-031-06975-8_4⟩. ⟨hal-04181626⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez-Granadillo. Efficient hybrid model for intrusion detection systems. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.694-700, ⟨10.5220/0011328300003283⟩. ⟨hal-04137867⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R Cavalli. Digital twin for IoT environments : a testing and simulation tool. 15th International Conference on the Quality of Information and Communications Technology(QUATIC) ·, University of Castilla-La Mancha, Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04039592⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar. Towards a systematic and automatic use of state machine inference to uncover security flaws and fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. IEEE International Conference on Communications(ICC ), May 2022, Seoul, South Korea. pp.5238-5243, ⟨10.1109/ICC45855.2022.9838338⟩. ⟨hal-04069291⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. Switched-based control testbed to assure cyber-physical resilience by design. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩. ⟨hal-03843016⟩
- Accès au texte intégral et bibtex
- ref_biblio
- S. Seng, Joaquin Garcia‐alfaro, Y. Laarouci. Implementation of a stateful network protocol intrusion detection systems. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩. ⟨hal-03843013⟩
- Accès au texte intégral et bibtex
2021
- ref_biblio
- Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Tao Wan. Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks. MEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking, Sep 2021, Athens, Greece. pp.479-484, ⟨10.1109/MeditCom49071.2021.9647674⟩. ⟨hal-03628454⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Risky zone avoidance strategies for drones. CCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering, Sep 2021, Online, France. pp.1-6, ⟨10.1109/CCECE53047.2021.9569172⟩. ⟨hal-03628452⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and performance to the internet of things through usage control and blockchains. 16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2021, Virtual, Luxembourg. pp.57-72, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Levillain, Sébastien Naud, Aina Toky Rasoamanana. Work-in-Progress: towards a platform to compare binary parser generators. IEEE Security and Privacy Workshops, SPW (LangSec), May 2021, San Jose, United States. ⟨hal-04001619⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. The 14th International Symposium on Foundations and Practice of Security ( FPS), Dec 2021, Paris, France. pp.208-217, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03997389⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
- Accès au bibtex
- ref_biblio
- Mustafizur R. Shahid, Hervé Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨10.1109/ICMLA52953.2021.00256⟩. ⟨hal-03430826⟩
- Accès au texte intégral et bibtex
2020
- ref_biblio
- Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Neetu Sharma, Rajeev Anand-Sahu, Vishal Saraswat, Joaquin Garcia‐alfaro. Anonymous proof-of-asset transactions using designated blind signatures. FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩. ⟨hal-03125748⟩
- Accès au texte intégral et bibtex
2019
- ref_biblio
- Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2019, Tangier, Morocco. pp.1582-1587, ⟨10.1109/IWCMC.2019.8766478⟩. ⟨hal-04331571⟩
- Accès au bibtex
- ref_biblio
- Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche. Authledger: a novel Blockchain-based domain name authentication scheme. 5th International Conference on Information Systems Security and Privacy(ICISSP), Feb 2019, Prague, Czech Republic. pp.345-352, ⟨10.5220/0007366803450352⟩. ⟨hal-03991038⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
- Accès au texte intégral et bibtex
2018
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Giovanni Russello. Lightweight attribute-based encryption supporting access policy update for cloud assited IoT. Secrypt 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.135-146, ⟨10.5220/0006854603010312⟩. ⟨hal-03991119⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello. Coop-DAAB: cooperative attribute based data aggregation for internet of things applications. On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018,, Oct 2018, Valetta,, Malta. pp.498-515, ⟨10.1007/978-3-030-02610-3_28⟩. ⟨hal-03991056⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Jung Eunjin, Ashish Gehani. Efficiently validating aggregated IoT data integrity. 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Mar 2018, Bamberg, Germany. pp.17897073, ⟨10.1109/BigDataService.2018.00046⟩. ⟨hal-03991079⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Sana Belguith, Giovanni Russello. EMA-LAB: efficient multi authorisation level attribute based access control. International Conference on Network and System Security (NSS), Aug 2018, Hong Kong, China. pp.187-201, ⟨10.1007/978-3-030-02744-5_14⟩. ⟨hal-03991168⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Mostafa Rizk, Tarek Naser Al-Deen, Hassan Diab, Abdel-Mehsen Ahmad, Zouhair El-Bazzal. Proposition of online UAV-based pollutant detector and tracker for narrow-basin rivers: a case study on Litani River. ICCA 2018: 3rd International Conference on Computer and Applications, Aug 2018, Beirut, Lebanon. pp.189-195, ⟨10.1109/COMAPP.2018.8460374⟩. ⟨hal-03472152⟩
- Accès au bibtex
2017
- ref_biblio
- Gustavo Gonzalez-Granadillo, José Rubio-Hernán, Joaquin Garcia‐alfaro. Towards a security event data taxonomy. International Conference on Risks and Security of Internet and Systems (CRISIS), Sep 2017, Dinard, France. pp.29-45, ⟨10.1007/978-3-319-76687-4_3⟩. ⟨hal-04308618⟩
- Accès au bibtex
- ref_biblio
- Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
- Accès au texte intégral et bibtex
2016
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. Proc. 2e atelier sur la Sécurité dans les Clouds, Feb 2016, paris, France. ⟨hal-03991200⟩
- Accès au texte intégral et bibtex
2015
- ref_biblio
- Florian Maury, Jean-Rene Reinhard, Olivier Levillain, Henri Gilbert. Format Oracles on OpenPGP. The Cryptographer's Track at the RSA (CT-RSA), Apr 2015, San Francisco, United States. pp.220-236, ⟨10.1007/978-3-319-16715-2_12⟩. ⟨hal-01154822⟩
- Accès au texte intégral et bibtex
Book sections
2024
- ref_biblio
- Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Methodological resilience assessment of smart cyber infrastructures. Security and Privacy in Smart Environments. Lecture Notes in Computer Science, 2024, 978-3-031-66707-7. ⟨hal-04656303⟩
- Accès au texte intégral et bibtex
2022
- ref_biblio
- Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
- Accès au bibtex
- ref_biblio
- Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. Emerging Trends in Cybersecurity Applications, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. ⟨10.1007/978-3-031-09640-2_16⟩. ⟨hal-03958379⟩
- Accès au texte intégral et bibtex
2021
- ref_biblio
- Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. ⟨hal-04331489⟩
- Accès au bibtex
Other publications
2024
- ref_biblio
- Eva Poptcheva, Bram Vanderborght, Miguel Colom, Rūta Binkytė, Oana Balalau, et al.. Alvolution - al and digital technologies in the European Union. 2024. ⟨hal-04645463⟩
- Accès au texte intégral et bibtex
2023
- ref_biblio
- Matthews Jose, Rémi Badonnel, Thibault Cholez, Hervé Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 2023. ⟨hal-04165397⟩
- Accès au texte intégral et bibtex
Books
2023
- ref_biblio
- Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas, Nicola Dragoni (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer International Publishing, 13619, 2023, Lecture Notes in Computer Science, 978-3-031-25734-6. ⟨10.1007/978-3-031-25734-6⟩. ⟨hal-04006291⟩
- Accès au bibtex
2022
- ref_biblio
- Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia‐alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
- Accès au bibtex
Poster communications
2023
- ref_biblio
- Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil, Thomas Silverston. Evaluation Framework for ML-based IDS. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164441⟩
- Accès au texte intégral et bibtex
2022
- ref_biblio
- Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. Recherche d'indicateurs de compromission dans des journaux DNS chiffrés. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2022, Chambon-sur-Lac, France. RESSI 2022: Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information. ⟨hal-03997075⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Gregory Blanc, Thomas Silverston, Sébastien Tixeuil. GRIFIN: cognitive and programmable security for resilient next-generation networks. RESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. ⟨hal-04165398⟩
- Accès au texte intégral et bibtex
2020
- ref_biblio
- Elkin Aguas, Anthony Lambert, Hervé Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En Ligne, France. ⟨hal-04165399⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Gregory Blanc. VARIoT: vulnerability and attack repository for IoT. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En ligne, France. ⟨hal-04165400⟩
- Accès au texte intégral et bibtex
Proceedings
2024
- ref_biblio
- Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Foundations and Practice of Security, 14552, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57539-6. ⟨10.1007/978-3-031-57540-2⟩. ⟨hal-04734288⟩
- Accès au bibtex
- ref_biblio
- Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Foundations and Practice of Security, 14551, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57536-5. ⟨10.1007/978-3-031-57537-2⟩. ⟨hal-04601607⟩
- Accès au bibtex
2023
- ref_biblio
- Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: proceedings of the 2023 Workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM, 2023, 979-8-4007-0265-5. ⟨10.1145/3605772⟩. ⟨hal-04325343⟩
- Accès au bibtex
- ref_biblio
- Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro. Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers. 15th International Symposium, FPS, Lecture Notes in Computer Science, 13877, Springer Nature Switzerland, pp.1-471, 2023, Lecture Notes in Computer Science (LNCS), 978-3-031-30121-6. ⟨10.1007/978-3-031-30122-3⟩. ⟨hal-04180387⟩
- Accès au bibtex
2022
- ref_biblio
- David Megias, Roberto Di Pietro, Joaquin Garcia‐alfaro. EICC 2022: european interdisciplinary cybersecurity conference. ACM; ACM, 2022, ⟨10.1145/3528580⟩. ⟨hal-04006360⟩
- Accès au bibtex
2019
- ref_biblio
- Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquin Garcia-Alfaro. Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papers. ESORICS 2018 international workshops (ISSA 2018) and (CSITS 2018), Lecture Notes in Computer Science, LNCS 11552, Springer International Publishing, pp.1--173, 2019, Security and Cryptology, LNCS, 978-3-030-16873-5. ⟨10.1007/978-3-030-16874-2⟩. ⟨hal-02086531⟩
- Accès au bibtex
2018
- ref_biblio
- David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al.. Information and Communications Security. 11149, Springer International Publishing, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-01950-1⟩. ⟨hal-04187775⟩
- Accès au bibtex
Reports
2023
- ref_biblio
- Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia‐alfaro. Cyber-resilience approaches for cyber-physical systems. Télécom SudParis (Institut Mines-Télécom). 2023. ⟨hal-04495662⟩
- Accès au bibtex
Theses
2024
- ref_biblio
- Marwan Abbas Escribano. Modélisation de systèmes de leurres complexes. Sciences de l'information et de la communication. Institut Polytechnique de Paris, 2024. Français. ⟨NNT : 2024IPPAS009⟩. ⟨tel-04586272⟩
- Accès au texte intégral et bibtex
2023
- ref_biblio
- Aina Toky Rasoamanana. Derivation and Analysis of Cryptographic Protocol Implementation. Computer science. Institut Polytechnique de Paris, 2023. English. ⟨NNT : 2023IPPAS005⟩. ⟨tel-04251390⟩
- Accès au texte intégral et bibtex
Preprints, Working Papers, ...
2024
- ref_biblio
- Claudio Bellei, Hussain Alattas, Nesrine Kaaniche. Label-GCN: an effective method for adding label propagation to graph convolutional networks. 2024. ⟨hal-03991083⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'écosystème technique relatifs aux identités numériques - Écosystème élargi à la fourniture d'attributs, de justificatifs, de signatures électroniques et de portefeuilles d'identité numérique, working paper. 2024. ⟨halshs-04430701⟩
- Accès au texte intégral et bibtex
- Home
- Studying at IP Paris
- Research
- Labs & interdisciplinary centers
- CSDAI environment
- LTCI – Information Processing and Communications Laboratory
- LIX – Computer Science Laboratory
- SAMOVAR laboratory
- U2IS – Computer Science and Systems Engineering Laboratory
- Imagine (Computer Vision, Machine Learning and Optimization)
- CMAP – Applied Mathematics Center
- INRIA Paris Saclay
- Lab-STICC
- CIEDS center
- E4C center
- E4H center
- Hi!PARIS center
- Spiral
- Seminars
- Contact
- Login