SCN publications since 2022

Journal articles

2025

ref_biblio
Omar Cheikhrouhou, Khaleel Mershad, Maryline Laurent, Anis Koubaa. Blockchain and Emerging Technologies for Next Generation Secure Healthcare: A Comprehensive Survey of Applications, Challenges, and Future Directions. Blockchain: Research and Applications, 2025, pp.100305. ⟨10.1016/j.bcra.2025.100305⟩. ⟨hal-05073957⟩
Accès au bibtex
BibTex
ref_biblio
Lorena González-Manzano, Joaquin Garcia‐alfaro. Software vulnerability detection under poisoning attacks using CNN-based image processing. International Journal of Information Security, 2025, 24 (75), pp.1-22. ⟨10.1007/s10207-025-00989-2⟩. ⟨hal-05033755⟩
Accès au texte intégral et bibtex
https://hal.science/hal-05033755/file/preprint-IJIS-2025.pdf BibTex
ref_biblio
Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. Xai-driven black-box adversarial attacks on network intrusion detectors. International Journal of Information Security, 2025, 24 (3), pp.103. ⟨10.1007/s10207-025-01016-0⟩. ⟨hal-05009234⟩
Accès au texte intégral et bibtex
https://hal.science/hal-05009234/file/s10207-025-01016-0.pdf BibTex
ref_biblio
S. Seng, Joaquin Garcia‐alfaro, I. Gazeau, L. Desmonts. A stateful protocol-based detection engine combining behavior use cases and system specifications. Internet Technology Letters, 2025, ⟨10.1002/itl2.633⟩. ⟨hal-04913266⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913266/file/preprint-ITL2025.pdf BibTex

2024

ref_biblio
Nathanaël Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des télécommunications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04383612/file/article.pdf BibTex
ref_biblio
Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
Accès au bibtex
BibTex
ref_biblio
Omair Faraj, David Megías, Joaquin Garcia-Alfaro. ZIRCON: zero-watermarking-based approach for data integrity and secure provenance in IoT networks. Journal of information security and applications, 2024, 85, pp.103840. ⟨10.1016/j.jisa.2024.103840⟩. ⟨hal-04913392⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913392/file/preprint-ZIRCON.pdf BibTex
ref_biblio
Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and resilient 6 G RAN networks: a decentralized approach with zero trust architecture. Journal of Network and Systems Management, 2024, 32 (33), ⟨10.1007/s10922-024-09807-x⟩. ⟨hal-04610740⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04610740/file/ZeroTrust___6G-3.pdf BibTex
ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. A survey on cyber-resilience approaches for cyber-physical systems. ACM Computing Surveys, 2024, 56 (8), pp.1-37. ⟨10.1145/3652953⟩. ⟨hal-04562096⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04562096/file/COSUR.pdf BibTex

2023

ref_biblio
Nathanaël Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04121481/file/articleIEEE_hal.pdf BibTex
ref_biblio
Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04080819/file/sensors-23-04224.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. IEEE Internet of Things Magazine, 2023, 6 (1), pp.46-50. ⟨10.1109/IOTM.001.2200244⟩. ⟨hal-04401093⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401093/file/Non_Fungible_Tokens_A_review.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. Computer, 2023, 56 (7), pp.54-66. ⟨10.1109/MC.2023.3273491⟩. ⟨hal-04400976⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400976/file/main.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys, 2023, 55 (14s), pp.1-40. ⟨10.1145/3588999⟩. ⟨hal-04401069⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401069/file/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf BibTex
ref_biblio
David Pàmies-Estrems, Joaquin Garcia‐alfaro. On the self-adjustment of privacy safeguards for query log streams. Computers & Security, 2023, 134, pp.103450. ⟨10.1016/j.cose.2023.103450⟩. ⟨hal-04189131⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04189131/file/COSE.pdf BibTex
ref_biblio
Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari. Secure attack detection framework for hierarchical 6G-enabled internet of vehicles. IEEE Transactions on Vehicular Technology, 2023, 73 (2), pp.1-11. ⟨10.1109/TVT.2023.3317940⟩. ⟨hal-04227768⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227768/file/_Extension_ICC_2022__FL___SIEM.pdf BibTex
ref_biblio
Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
Accès au bibtex
BibTex
ref_biblio
Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization’s data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04331375/file/TCC-2004.10952.pdf BibTex
ref_biblio
Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04100562/file/SSI-Hindawi-SCN-Auteur2023.pdf BibTex
ref_biblio
Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos. SigML++: supervised log anomaly with probabilistic polynomial approximation. Cryptography, 2023, 7 (4), pp.52. ⟨10.3390/cryptography7040052⟩. ⟨hal-04304189⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04304189/file/MDPI_Article_Template.pdf BibTex

2022

ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro. Cyber-physical defense in the quantum Era. Scientific Reports, 2022, 12, pp.1905. ⟨10.1038/s41598-022-05690-1⟩. ⟨hal-03628438⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03628438/file/era.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Research trends in collaborative drones. Sensors, 2022, 22 (9), pp.3321:1-3321:17. ⟨10.3390/s22093321⟩. ⟨hal-03654021⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03654021/file/sensors-drone-survey.pdf BibTex
ref_biblio
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh. Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on emerging telecommunications technologies, 2022, 33 (3), pp.1-20. ⟨10.1002/ett.3667⟩. ⟨hal-03990998⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03990998/file/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__FinalVersion-3-22.pdf BibTex
ref_biblio
Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.727-729. ⟨10.1007/s12243-022-00935-6⟩. ⟨hal-04164335⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164335/file/s12243-022-00935-6.pdf BibTex
ref_biblio
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, et al.. Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications - annales des télécommunications, 2022, 77 (11-12), pp.789-812. ⟨10.1007/s12243-022-00926-7⟩. ⟨hal-03965590⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03965590/file/s12243-022-00926-7.pdf BibTex
ref_biblio
Sophie Dramé-Maigné, Hervé Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
Accès au bibtex
BibTex
ref_biblio
Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-03997331⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997331/file/2022-12-Peer_Journal_Sparta-PP-parkingService.pdf BibTex
ref_biblio
Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers & Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Jean-Philippe Monteuuis, Jonathan Petit. PKIs in C-ITS: Security functions, architectures and projects: A survey. Vehicular Communications, 2022, 38, pp.100531. ⟨10.1016/j.vehcom.2022.100531⟩. ⟨hal-04400865⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400865/file/PKIs_in_C_ITS_security_functions_architectures_and_projects_a_survey.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Transactions on Engineering Management, 2022, 69 (6), pp.3710-3725. ⟨10.1109/TEM.2021.3087112⟩. ⟨hal-04400815⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400815/file/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf BibTex
ref_biblio
Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03787447/file/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf BibTex
ref_biblio
Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227764/file/SPOT_IEEEAccess.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03793163/file/JNCA2022_PIMA.pdf BibTex
ref_biblio
Mariana Segovia, Joaquin Garcia‐alfaro. Design, modeling and implementation of digital twins. Sensors, 2022, 22 (14), pp.5396-5426. ⟨10.3390/s22145396⟩. ⟨hal-03843008⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843008/file/sensors-22-05396-preprint.pdf BibTex
ref_biblio
Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991044/file/Final_version.pdf BibTex

Conference papers

2025

ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil. Privacy benchmarking of intrusion detection sytems. 39th International Conference on Advanced Information Networking and Applications (AINA), Apr 2025, Barcelone, Spain. pp.406-417, ⟨10.1007/978-3-031-87772-8_34⟩. ⟨hal-05045414⟩
Accès au texte intégral et bibtex
https://hal.science/hal-05045414/file/1571100747%20paper.pdf BibTex
ref_biblio
Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. Towards privacy-preserving and fairness-aware federated learning framework. Privacy Enhancing Technologies (PETs), Jul 2025, Washinghton, DC, United States. pp.845-865, ⟨10.56553/popets-2025-0044⟩. ⟨hal-04782394⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04782394/file/popets-2025-0044.pdf BibTex
ref_biblio
Alessandro Palma, Nikolaos Papadakis, Georgios Bouloukakis, Joaquin Garcia-Alfaro, Mattia Sospetti, et al.. SHIELD : assessing security-by-design in federated data spaces using attack graphs. The 40th ACM/SIGAPP Symposium On Applied Computing ( SAC), Mar 2025, Catania, Italy. ⟨10.1145/3672608.3707797⟩. ⟨hal-04832442v2⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-04832442/file/SAC25_SHIELD.pdf BibTex

2024

ref_biblio
Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila. FREIDA: a concrete tool for reproducible evaluation of IDS using a data-driven approach. Risks and Security of Internet and Systems: 19th International Conference (CRISIS), Nov 2024, Aix-en-Provence, France. pp.40-55, ⟨10.1007/978-3-031-89350-6_3⟩. ⟨hal-05048479⟩
Accès au texte intégral et bibtex
https://hal.science/hal-05048479/file/Crisis_2024_paper_25.pdf BibTex
ref_biblio
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Optimal UAV-trajectory design in a dynamic environment using NOMA and deep reinforcement learning. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.277-282, ⟨10.1109/CCECE59415.2024.10667252⟩. ⟨hal-04762084⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762084/file/1571000942-final.pdf BibTex
ref_biblio
Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: a model for accurate predictions with inherent fairness evaluation. 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI), Oct 2024, Santiago de Compostela, SPAIN, Spain. ⟨10.3233/FAIA240592⟩. ⟨hal-04745438⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04745438/file/FairCognizer__ECAI_2024_-2.pdf BibTex
ref_biblio
Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. The 19th International Conference on Availability, Reliability and Security (ARES), Jul 2024, Vienna, Austria. pp.1-13, ⟨10.1145/3664476.3664500⟩. ⟨hal-04669287⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04669287/file/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf BibTex
ref_biblio
Joscha Cüppers, Adrien Schoen, Gregory Blanc, Pierre-Francois Gimenez. FlowChronicle: synthetic network flow generation through pattern set mining. CoNEXT 2024 - 20th International Conference on emerging Networking EXperiments and Technologies, Dec 2024, Los Angeles (CA), United States. pp.1 - 20, ⟨10.1145/3696407⟩. ⟨hal-04871198⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04871198/file/tmptkq69tly_FlowChronicle.pdf BibTex
ref_biblio
Romain Dagnas, Michel Barbeau, Joaquin Garcia‐alfaro, Reda Yaich. Resilience assessment of multi-layered cyber-physical systems. IFIP Networking 2024 - IOCRCI, Jun 2024, Thessaloniki, Greece. ⟨hal-04559568v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04559568/file/Resilience_Assessment_of_Multi_Layered_Cyber_Physical_Systems___VF.pdf BibTex
ref_biblio
Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. 2024 IEEE 14th annual computing and communication workshop and conference (CCWC), Jan 2024, Las vegas, NV (US), United States. ⟨10.1109/CCWC60891.2024.10427731⟩. ⟨hal-04402381⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04402381/file/Version%20Auteur%20IEEE%20CCWC%202024.pdf BibTex
ref_biblio
Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in copyright management applications : the blockchain perspective. Barolli, L. (eds) Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.169-182, ⟨10.1007/978-3-031-57942-4_18⟩. ⟨hal-04690838⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04690838/file/main.pdf BibTex
ref_biblio
Omair Faraj, David Megias, Joaquin Garcia‐alfaro. ZW-IDS: zero-watermarking-based network intrusion detection system using data provenance. The 19th International Conference on Availability, Reliability and Security(ARES), Jul 2024, Vienna, Austria. pp.1-11, ⟨10.1145/3664476.3670933⟩. ⟨hal-04913404⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913404/file/preprint-ares2024.pdf BibTex
ref_biblio
Mario Fernandez-Tarraga, Alejandro-David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia-Alfaro, Félix Gómez Mármol. Training on social media cybersecurity skills in the healthcare context. 2024 13th International Conference on Communications, Circuits and Systems (ICCCAS), May 2024, Stavanger, Norway. pp.3-20, ⟨10.1007/978-3-031-55829-0_1⟩. ⟨hal-04913424⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913424/file/preprint_sunriseA.pdf BibTex
ref_biblio
Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739413/file/main.pdf BibTex
ref_biblio
Badis Hammi, Tristan Billot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.314-325, ⟨10.1007/978-3-031-57916-5_27⟩. ⟨hal-04580467⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04580467/file/hammi.24.aina.pdf BibTex
ref_biblio
Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis, Venkata Srinivas Kothapalli. Location optimization for tethered aerial base station serving mmWave high altitude UAVs. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Aug 2024, Kingston, France. pp.271-276, ⟨10.1109/CCECE59415.2024.10667117⟩. ⟨hal-04762101⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762101/file/1571012068-final.pdf BibTex
ref_biblio
Pravallika Katragunta, Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. TBS joint optimization to serve mmWave high altitude UAVs: a counterfactual MAB approach. 13th International Conference on Communications, Circuits and Systems (ICCCAS), May 2024, Xiamen, France. pp.424-429, ⟨10.1109/ICCCAS62034.2024.10652678⟩. ⟨hal-04762130⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04762130/file/ICCCAS.pdf BibTex
ref_biblio
Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024), Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. ⟨hal-04739382⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739382/file/Main.pdf BibTex
ref_biblio
Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel. DDoS mitigation while preserving QoS: a deep reinforcement learning-based approach. 2024 IEEE : 10th International Conference on Network Softwarization (NetSoft), Jun 2024, Saint Louis, MO, United States. pp.369-374, ⟨10.1109/NetSoft60951.2024.10588889⟩. ⟨hal-04659906⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04659906/file/1571016591%20paper-2.pdf BibTex
ref_biblio
Quentin Michaud, Yohan Pipereau, Olivier Levillain, Dhouha Ayed. Robust stack smashing protection for webassembly. IEEE Future Networks World Forum(FNWF), Oct 2024, Dubai, United Arab Emirates. ⟨hal-04888542⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04888542/file/article.pdf BibTex
ref_biblio
Quentin Michaud, Yohan Pipereau, Olivier Levillain, Dhouha Ayed. Securing Stack Smashing Protection in WebAssembly Applications. The 19th Workshop on Programming Languages and Analysis for Security(PLAS), Oct 2024, Salt Lake, United States. ⟨hal-04888610⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04888610/file/Michaud_etal_PLAS2024.pdf BibTex
ref_biblio
Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphael Troncy. X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), ACM, Jul 2024, Singapore, Singapore. pp.35-48, ⟨10.1145/3634737.3637654⟩. ⟨hal-04446027⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04446027/file/publi-7588.pdf BibTex
ref_biblio
Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. XAI-driven adversarial attacks on network intrusion detectors. European Interdisciplinary Cybersecurity Conference (EICC), Jun 2024, Xanthi, Greece. pp.65-73, ⟨10.1145/3655693.3655714⟩. ⟨hal-04660625⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04660625/file/eicc2024-18.pdf BibTex
ref_biblio
Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645794/file/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf BibTex
ref_biblio
Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. A tale of two methods: unveiling the limitations of GAN and the rise of bayesian networks for synthetic network traffic generation. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul 2024, Vienna, Austria. pp.273-286, ⟨10.1109/EuroSPW61312.2024.00036⟩. ⟨hal-04871298⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04871298/file/tmpy9y3gxhu_AsiaCCS_Revised.pdf BibTex
ref_biblio
Hugo Teixeira de Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, et al.. A model-based approach for assessing the security of cyber-physical systems. The 19th International Conference on Availability, Reliability and Security (ARES) (2024), Jul 2024, Vienne, Austria. pp.1-10, ⟨10.1145/3664476.3670470⟩. ⟨hal-04669279⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04669279/file/A_Model-based_Approach_for_Assessing_the_Security_of_Cyber-Physical_Systems.pdf BibTex
ref_biblio
Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩. ⟨hal-04695972⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04695972/file/MealyVerifier.pdf BibTex
ref_biblio
Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID/session token abuse on openID connect. 21st International Conference on Security and Cryptography (SECRYPT 2024), Jul 2024, Dijon, France. pp.674-679, ⟨10.5220/0012757900003767⟩. ⟨hal-04719043⟩
Accès au bibtex
BibTex

2023

ref_biblio
Marwan Abbas-Escribano, Hervé Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400399/file/3600160.3604993.pdf BibTex
ref_biblio
Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. 18th International Conference on Risks and Security of Internet and Systems ( CRiSIS), Dec 2023, Rabat (MOROCCO), Morocco. pp.185-199, ⟨10.1007/978-3-031-61231-2_12⟩. ⟨hal-04609669⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04609669/file/crisis-2023--content.pdf BibTex
ref_biblio
Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier, Olivier Levillain, et al.. Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3. ⟨hal-04165396⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165396/file/paper.pdf BibTex
ref_biblio
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, ⟨10.1145/3576915.3624027⟩. ⟨hal-04325353⟩
Accès au bibtex
BibTex
ref_biblio
Iain Burge, Michel Barbeau, Joaquin Garcia‐alfaro. Quantum algorithms for shapley value calculation. 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep 2023, Bellevue, United States. pp.1-9, ⟨10.1109/QCE57702.2023.00024⟩. ⟨hal-04386997⟩
Accès au bibtex
BibTex
ref_biblio
Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), LIFO, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164470⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164470/file/Survey_on_intrusion_detection_systems_in_5G_.pdf BibTex
ref_biblio
Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. 2023 IFIP Networking Conference (IFIP Networking), Jun 2023, Barcelone, Spain. ⟨10.23919/IFIPNetworking57963.2023.10186355⟩. ⟨hal-04083180⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04083180/file/Exploring_the_Quantitative_Resilience_Analysis_of_Cyber_Physical_Systems.pdf BibTex
ref_biblio
Mario Fernández-Tárraga, Alejandro David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. VIII National Conference on Cybersecurity Research (JNIC), Universidad de la Rioja, Jun 2023, Vigo, España. pp.469--476. ⟨hal-04198177⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04198177/file/preprint_jnic-B.pdf BibTex
ref_biblio
Joaquin Garcia‐alfaro, Sandrine Bayle. Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS). Colloque IMT 2023 : « Sécurité et Résilience », Apr 2023, Palaiseau, France. ⟨hal-04098069⟩
Accès au bibtex
BibTex
ref_biblio
Alexandre Grimaldi, Julien Ribiollet, Pantaleone Nespoli, Joaquin Garcia‐alfaro. Toward next-generation cyber range: a comparative study of training platforms. 28th European Symposium on Research in Computer Security (ESORICS 2023), Sep 2023, The Hague, Netherlands. pp.271-290, ⟨10.1007/978-3-031-54129-2_16⟩. ⟨hal-04913448⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913448/file/SecAssure.pdf BibTex
ref_biblio
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Towards understanding alerts raised by unsupervised network intrusion detection systems. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ), Oct 2023, Hong Kong China, France. pp.135-150, ⟨10.1145/3607199.3607247⟩. ⟨hal-04172470⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04172470/file/2023-Lanvin_et_al-Towards_Understanding_Alerts_raised_by_Unsupervised_Network_Intrusion_Detection_Systems-preprint.pdf BibTex
ref_biblio
Pablo Martínez-Sanchez, Pantaleone Nespoli, Joaquin Garcia‐alfaro, Félix Gómez Mármol. Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. 2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444. ⟨hal-04198175⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04198175/file/preprint_jnic-A.pdf BibTex
ref_biblio
Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Automated enrichment of logical attack graphs via formal ontologies. ICT Systems Security and Privacy Protection (SEC), Jun 2023, Poznan, Poland. pp.59-72, ⟨10.1007/978-3-031-56326-3_5⟩. ⟨hal-04563448⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04563448/file/548810_1_En_5_Chapter.pdf BibTex
ref_biblio
Pablo Martínez Sánchez, Pantaleone Nespoli, Joaquín García Alfaro, Félix Gómez Mármol. Methodology for automating attacking agents in cyber range training platforms. 35th Norwegian ICT Conference for Research and Education(NIKT), University of Stavanger, Nov 2023, Stavanger, Norway. pp.90-109, ⟨10.1007/978-3-031-55829-0_6⟩. ⟨hal-04913438⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913438/file/preprint_sunriseB.pdf BibTex

2022

ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04055085/file/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf BibTex
ref_biblio
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia‐alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA. 2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩. ⟨hal-04006345⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04006345/file/preprint-latincom.pdf BibTex
ref_biblio
Michel Barbeau, Joaquin Garcia‐alfaro, Christian Lübben, Marc-Oliver Pahl, Wüstrich Lars. Resilience via blackbox self-piloting plants. ECW 2022: European Cyber Week, Pôle d’Excellence Cyber, Nov 2022, Rennes, France. pp.35-46. ⟨hal-04006320⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04006320/file/preprint-cessar2022.pdf BibTex
ref_biblio
Sandrine Bayle, Joaquin Garcia‐alfaro. Plateforme de sécurisation des villes: le projet européen IMPETUS. Colloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France. ⟨emse-03624167⟩
Accès au bibtex
BibTex
ref_biblio
Tristan Bilot, Grégoire Geis, Badis Hammi. PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, France. pp.428-435, ⟨10.5220/0011328600003283⟩. ⟨hal-04401167⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401167/file/PhishGNN_A_Phishing_Website_Detection_Framework_using_Graph_Neural_Networks.pdf BibTex
ref_biblio
Alexandre Dey, Eric Totel, Benjamin Costé. DAEMON: dynamic auto-encoders for contextualised anomaly detection applied to security monitoring. 37th IFIP TC 11 International Conference, SEC 2022,, Jun 2022, Copenhagen, Denmark. ⟨10.1007/978-3-031-06975-8_4⟩. ⟨hal-04181626⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04181626/file/main.pdf BibTex
ref_biblio
Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
Accès au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez-Granadillo. Efficient hybrid model for intrusion detection systems. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.694-700, ⟨10.5220/0011328300003283⟩. ⟨hal-04137867⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04137867/file/Secrypt2022.pdf BibTex
ref_biblio
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Detecting APT through graph anomaly detection. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675346⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03675346/file/tmpz65x_ciq_RESSI_2022.pdf BibTex
ref_biblio
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. 17th International Conference on Risks and Security of Internet and Systems (CRiSIS), Dec 2022, Sousse, Tunisia. pp.18-33, ⟨10.1007/978-3-031-31108-6_2⟩. ⟨hal-03775466⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03775466/file/CRiSIS_2022_Maxime_Lanvin.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04227767/file/Springer_SPOT_.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997364/file/2022-SECRYPT_SEVIL-Masmoudi.pdf BibTex
ref_biblio
Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar. Towards a systematic and automatic use of state machine inference to uncover security flaws and fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997060/file/document.pdf BibTex
ref_biblio
Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675359⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03675359/file/tmp13_94k46_HowToEvaluateNetworkTrafficGeneration.pdf BibTex
ref_biblio
Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. IEEE International Conference on Communications(ICC ), May 2022, Seoul, South Korea. pp.5238-5243, ⟨10.1109/ICC45855.2022.9838338⟩. ⟨hal-04069291⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04069291/file/ICC_New%20version.pdf BibTex
ref_biblio
Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. Switched-based control testbed to assure cyber-physical resilience by design. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩. ⟨hal-03843016⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843016/file/secrypt2022a-preprint.pdf BibTex
ref_biblio
S. Seng, Joaquin Garcia‐alfaro, Y. Laarouci. Implementation of a stateful network protocol intrusion detection systems. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩. ⟨hal-03843013⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843013/file/secrypt2022b-preprint.pdf BibTex

Book sections

2025

ref_biblio
Marwan Lazrag, Christophe Kiennert, Joaquin Garcia‐alfaro. Quantifying the impact propagation of cyber attacks using business logic modeling. Security and Privacy in Smart Environments, 14800, Springer Nature Switzerland, pp.49-71, 2025, Lecture Notes in Computer Science, 978-3-031-66708-4. ⟨10.1007/978-3-031-66708-4_3⟩. ⟨hal-04913285⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04913285/file/preprint-SPSE-Lazrag.pdf BibTex

2024

ref_biblio
Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Methodological resilience assessment of smart cyber infrastructures. Security and Privacy in Smart Environments. Lecture Notes in Computer Science, 2024, 978-3-031-66707-7. ⟨hal-04656303⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04656303/file/Springer_Book_Chapter__Methodological_Assessment_of_Cyber_Resilience__ISX_.pdf BibTex

2022

ref_biblio
Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
Accès au bibtex
BibTex
ref_biblio
Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. Emerging Trends in Cybersecurity Applications, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. ⟨10.1007/978-3-031-09640-2_16⟩. ⟨hal-03958379⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03958379/file/preprint-bcs2022.pdf BibTex

Other publications

2025

ref_biblio
Antonio López Martínez, Montassar Naghmouchi, Maryline Laurent, Joaquin Garcia‐alfaro, Manuel Gil Pérez, et al.. Empower healthcare through a self-sovereign identity infrastructure for secure electronic health data access. 2025, ⟨10.48550/arXiv.2501.12229⟩. ⟨hal-04930967⟩
Accès au bibtex
https://arxiv.org/pdf/2501.12229 BibTex
ref_biblio
Louis-Philippe Sondeck, Maryline Laurent. Practical and ready-to-use methodology to assess the re-identification risk in anonymized datasets. 2025, ⟨10.48550/arXiv.2501.10841⟩. ⟨hal-04931011⟩
Accès au bibtex
https://arxiv.org/pdf/2501.10841v1 BibTex

2024

ref_biblio
Eva Poptcheva, Bram Vanderborght, Miguel Colom, Rūta Binkytė, Oana Balalau, et al.. Alvolution - al and digital technologies in the European Union. 2024. ⟨hal-04645463⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645463/file/AIvolution%20Conclusions%20%284%29.pdf BibTex

2023

ref_biblio
Matthews Jose, Rémi Badonnel, Thibault Cholez, Hervé Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 2023. ⟨hal-04165397⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165397/file/REWIRE_RESSI_application.pdf BibTex
ref_biblio
Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche. Comparative analysis of technical and legal frameworks of various national digial identity solutions. 2023, ⟨10.48550/arXiv.2310.01006⟩. ⟨hal-04931054⟩
Accès au bibtex
https://arxiv.org/pdf/2310.01006 BibTex

Books

2023

ref_biblio
Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas, Nicola Dragoni (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer International Publishing, 13619, 2023, Lecture Notes in Computer Science, 978-3-031-25734-6. ⟨10.1007/978-3-031-25734-6⟩. ⟨hal-04006291⟩
Accès au bibtex
BibTex

2022

ref_biblio
Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia‐alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer, 13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS), 978-3-030-93943-4. ⟨10.1007/978-3-030-93944-1⟩. ⟨hal-03628440⟩
Accès au bibtex
BibTex

Poster communications

2024

ref_biblio
Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila. Demo: towards reproducible evaluations of ML-based IDS using data-driven approaches. Bo Luo; Xiaojing Liao; Jun Xu. CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Oct 2024, Salt Lake City, UT, United States. Association for Computing Machinery, CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp.5081-5083, 2024, ⟨10.1145/3658644.3691368⟩. ⟨hal-04879181⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04879181/file/CCS_2024___Demo_Paper.pdf BibTex

2023

ref_biblio
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil, Thomas Silverston. Evaluation Framework for ML-based IDS. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04164441⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04164441/file/Evaluation_Framework_for_ML_based_IDS.pdf BibTex

2022

ref_biblio
Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. Recherche d'indicateurs de compromission dans des journaux DNS chiffrés. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2022, Chambon-sur-Lac, France. RESSI 2022: Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information. ⟨hal-03997075⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997075/file/slides.pdf BibTex
ref_biblio
Gregory Blanc, Thomas Silverston, Sébastien Tixeuil. GRIFIN: cognitive and programmable security for resilient next-generation networks. RESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. ⟨hal-04165398⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165398/file/RESSI_2022_GRIFIN_1.pdf BibTex

Proceedings

2024

ref_biblio
Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Part 2. Foundations and Practice of Security, 14552, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57539-6. ⟨10.1007/978-3-031-57540-2⟩. ⟨hal-04734288⟩
Accès au bibtex
BibTex
ref_biblio
Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Part 1. Foundations and Practice of Security, 14551, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57536-5. ⟨10.1007/978-3-031-57537-2⟩. ⟨hal-04601607⟩
Accès au bibtex
BibTex

2023

ref_biblio
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: proceedings of the 2023 Workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM, 2023, 979-8-4007-0265-5. ⟨10.1145/3605772⟩. ⟨hal-04325343⟩
Accès au bibtex
BibTex
ref_biblio
Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro. Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers. 15th International Symposium, FPS, Lecture Notes in Computer Science, 13877, Springer Nature Switzerland, pp.1-471, 2023, Lecture Notes in Computer Science (LNCS), 978-3-031-30121-6. ⟨10.1007/978-3-031-30122-3⟩. ⟨hal-04180387⟩
Accès au bibtex
BibTex

2022

ref_biblio
David Megias, Roberto Di Pietro, Joaquin Garcia‐alfaro. EICC 2022: european interdisciplinary cybersecurity conference. ACM; ACM, 2022, ⟨10.1145/3528580⟩. ⟨hal-04006360⟩
Accès au bibtex
BibTex

Reports

2023

ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia‐alfaro. Cyber-resilience approaches for cyber-physical systems. Télécom SudParis (Institut Mines-Télécom). 2023. ⟨hal-04495662⟩
Accès au bibtex
https://arxiv.org/pdf/2302.05402 BibTex

Preprints, Working Papers, ...

2024

ref_biblio
Claudio Bellei, Hussain Alattas, Nesrine Kaaniche. Label-GCN: an effective method for adding label propagation to graph convolutional networks. 2024. ⟨hal-03991083⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03991083/file/2104.02153.pdf BibTex
ref_biblio
Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'écosystème technique relatifs aux identités numériques - Écosystème élargi à la fourniture d'attributs, de justificatifs, de signatures électroniques et de portefeuilles d'identité numérique, working paper. 2024. ⟨halshs-04430701⟩
Accès au texte intégral et bibtex
https://shs.hal.science/halshs-04430701/file/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf BibTex