{"id":3550,"date":"2022-04-14T11:24:48","date_gmt":"2022-04-14T09:24:48","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/gregory-blanc-2\/"},"modified":"2022-04-14T11:25:02","modified_gmt":"2022-04-14T09:25:02","slug":"gregory-blanc-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/gregory-blanc-2\/","title":{"rendered":"Gregory BLANC"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/Blanc-220x220-1-150x150.png\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Gregory <span class=\"MonLabo-lastname\">BLANC<\/span><\/h1><div class=\"coordonnees\"><em>Ma\u00eetre de Conf\u00e9rences<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">Gregory.blanc[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Shurok Khozam, Gregory Blanc, S\u00e9bastien Tixeuil, Eric Totel. QoSentry: a reinforcement learning framework for QoS-preserving DDoS mitigation in software-defined networks. <i>Journal of Network and Systems Management<\/i>, 2025, 33 (4), pp.97. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10922-025-09971-8\">&#x27E8;10.1007\/s10922-025-09971-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05244654v1\">&#x27E8;hal-05244654&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05244654v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. Xai-driven black-box adversarial attacks on network intrusion detectors. <i>International Journal of Information Security<\/i>, 2025, 24 (3), pp.103. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-025-01016-0\">&#x27E8;10.1007\/s10207-025-01016-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05009234v1\">&#x27E8;hal-05009234&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05009234\/file\/s10207-025-01016-0.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05009234\/file\/s10207-025-01016-0.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05009234\/file\/s10207-025-01016-0.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05009234v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2022, 77 (11-12), pp.727-729. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-022-00935-6\">&#x27E8;10.1007\/s12243-022-00935-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04164335v1\">&#x27E8;hal-04164335&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04164335\/file\/s12243-022-00935-6.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04164335\/file\/s12243-022-00935-6.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04164335\/file\/s12243-022-00935-6.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04164335v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-Fran\u00e7ois Gimenez, Yufei Han, et al.. Explainable artificial intelligence for cybersecurity: a literature survey. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2022, 77 (11-12), pp.789-812. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-022-00926-7\">&#x27E8;10.1007\/s12243-022-00926-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03965590v1\">&#x27E8;hal-03965590&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03965590\/file\/s12243-022-00926-7.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03965590\/file\/s12243-022-00926-7.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03965590\/file\/s12243-022-00926-7.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03965590v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. <i>IEEE Access<\/i>, 2022, 10, pp.97117-97141. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2022.3205023\">&#x27E8;10.1109\/ACCESS.2022.3205023&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03787447v1\">&#x27E8;hal-03787447&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03787447\/file\/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03787447\/file\/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03787447\/file\/A_Survey_of_Smart_Home_IoT_Device_Classification_Using_Machine_Learning-Based_Network_Traffic_Analysis_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03787447v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houda Jmila, Gregory Blanc. Towards security-aware 5G slice embedding. <i>Computers & Security<\/i>, 2021, 100, pp.102075:1-102075:18. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2020.102075\">&#x27E8;10.1016\/j.cose.2020.102075&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03123977v1\">&#x27E8;hal-03123977&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03123977\/file\/S0167404820303485.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03123977\/file\/S0167404820303485.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03123977\/file\/S0167404820303485.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03123977v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois Boutigny, St\u00e9phane Betg\u00e9-Brezetz, Gregory Blanc, Antoine Lavignotte, Herv\u00e9 Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. <i>Computers & Security<\/i>, 2020, 89, pp.101662-1 - 101662-18. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2019.101662\">&#x27E8;10.1016\/j.cose.2019.101662&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02387073v1\">&#x27E8;hal-02387073&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02387073v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, et al.. An empirical approach to phishing countermeasures through smart glasses and validation agents. <i>IEEE Access<\/i>, 2019, 7, pp.130758-130771. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/access.2019.2940669\">&#x27E8;10.1109\/access.2019.2940669&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438600v1\">&#x27E8;hal-02438600&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438600\/file\/08830416.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438600\/file\/08830416.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438600\/file\/08830416.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438600v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. <i>Computers & Security<\/i>, 2017, 70, pp.482 - 499. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2017.07.008\">&#x27E8;10.1016\/j.cose.2017.07.008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01648031v1\">&#x27E8;hal-01648031&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01648031v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solayman Ayoubi, Gregory Blanc, Houda Jmila, S\u00e9bastien Tixeuil. Privacy benchmarking of\u00a0intrusion detection sytems. <i>39th International Conference on Advanced Information Networking and Applications (AINA)<\/i>, Apr 2025, Barcelone, Spain. pp.406-417, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-87772-8_34\">&#x27E8;10.1007\/978-3-031-87772-8_34&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05045414v1\">&#x27E8;hal-05045414&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05045414\/file\/1571100747%20paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05045414\/file\/1571100747%20paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05045414\/file\/1571100747%20paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05045414v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '25: Third workshop on recent advances in resilient and trustworthy machine learning-driveN systems. <i>ACM SIGSAC Conference on Computer and Communications Security (CCS '25)<\/i>, Oct 2025, Taipei, Taiwan. pp.4894-4895, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3719027.3767660\">&#x27E8;10.1145\/3719027.3767660&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05415546v1\">&#x27E8;hal-05415546&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05415546\/file\/ARTMAN__25___2_page_summary-rev3.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05415546\/file\/ARTMAN__25___2_page_summary-rev3.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05415546\/file\/ARTMAN__25___2_page_summary-rev3.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05415546v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano de Cristofaro, Christophe Kiennert. PROTEAN: federated intrusion detection in\u00a0non-IID environments through prototype-based knowledge sharing. <i>30th European Symposium on Research in Computer Security (ESORICS )<\/i>, Sep 2025, Toulouse, France. pp.103-125, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-032-07884-1_6\">&#x27E8;10.1007\/978-3-032-07884-1_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05379203v1\">&#x27E8;hal-05379203&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05379203v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Matthieu Mouzaoui, Yufei Han, Gr\u00e9gory Blanc, Michel Hurfin, Gabriel Rilling. Towards problem space-constrained adversarial attacks against graph neural network based network intrusion detection systems. <i>Rendez-Vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information (RESSI)<\/i>, May 2025, Lanniron, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05478056v1\">&#x27E8;hal-05478056&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05478056\/file\/RESSI2025MouzaouiMatthieu.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05478056\/file\/RESSI2025MouzaouiMatthieu.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05478056\/file\/RESSI2025MouzaouiMatthieu.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05478056v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Benoit Nougnanke, Gregory Blanc, Thomas Robert. How dataset diversity affects generalization in ML-based NIDS. <i>30th European Symposium on Research in Computer Security (ESORICS)<\/i>, Sep 2025, Toulouse, France. pp.269 - 288, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-032-07884-1_14\">&#x27E8;10.1007\/978-3-032-07884-1_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05194730v1\">&#x27E8;hal-05194730&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05194730\/file\/ESORICS_2025_Paper_CR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05194730\/file\/ESORICS_2025_Paper_CR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05194730\/file\/ESORICS_2025_Paper_CR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05194730v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nikolaos Papadakis, Athanasios Tsirikas, Fotios Fouskas, Krish Chatterjie, Christian Badolato, et al.. A Context-Aware Benchmarking Approach for Scenario-Based Evaluation of Smart Devices. <i>15th International Conference on the Internet of Things (IoT 2025)<\/i>, ACM, Nov 2025, Vienna, Germany. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3770501.3770516\">&#x27E8;10.1145\/3770501.3770516&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05318585v2\">&#x27E8;hal-05318585v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05318585\/file\/_IoT_25__A_Context_Aware_Benchmarking_Approach_for_Scenario_Based_Evaluation_of_IoT_Devices-22.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05318585\/file\/_IoT_25__A_Context_Aware_Benchmarking_Approach_for_Scenario_Based_Evaluation_of_IoT_Devices-22.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05318585\/file\/_IoT_25__A_Context_Aware_Benchmarking_Approach_for_Scenario_Based_Evaluation_of_IoT_Devices-22.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05318585v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi. Dynamic transmission scheduling method for high-concurrent zero trust access control. <i>20th International Conference on Availability, Reliability and Security (ARES )<\/i>, Aug 2025, Ghent, Belgium. pp.324-341, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-032-00633-2_19\">&#x27E8;10.1007\/978-3-032-00633-2_19&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05446750v1\">&#x27E8;hal-05446750&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05446750v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solayman Ayoubi, S\u00e9bastien Tixeuil, Gregory Blanc, Houda Jmila. FREIDA: a concrete tool for reproducible evaluation of IDS using a data-driven approach. <i>Risks and Security of Internet and Systems: 19th International Conference (CRISIS)<\/i>, Nov 2024, Aix-en-Provence, France. pp.40-55, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-89350-6_3\">&#x27E8;10.1007\/978-3-031-89350-6_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05048479v1\">&#x27E8;hal-05048479&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05048479\/file\/Crisis_2024_paper_25.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05048479\/file\/Crisis_2024_paper_25.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05048479\/file\/Crisis_2024_paper_25.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05048479v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. <i>The 19th International Conference on Availability, Reliability and Security (ARES)<\/i>, Jul 2024, Vienna, Austria. pp.1-13, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3664500\">&#x27E8;10.1145\/3664476.3664500&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04669287v1\">&#x27E8;hal-04669287&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04669287v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joscha C\u00fcppers, Adrien Schoen, Gregory Blanc, Pierre-Francois Gimenez. FlowChronicle: synthetic network flow generation through pattern set mining. <i>CoNEXT 2024 - 20th International Conference on emerging Networking EXperiments and Technologies<\/i>, Dec 2024, Los Angeles (CA), United States. pp.1 - 20, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3696407\">&#x27E8;10.1145\/3696407&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04871198v1\">&#x27E8;hal-04871198&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04871198\/file\/tmptkq69tly_FlowChronicle.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04871198\/file\/tmptkq69tly_FlowChronicle.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04871198\/file\/tmptkq69tly_FlowChronicle.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04871198v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Shurok Khozam, Gregory Blanc, Sebastien Tixeuil, Eric Totel. DAMS: double deep Q-network approach for DDoS attack mitigation in SDN. <i>The 8th International Conference on Future Networks & Distributed Systems (ICFNDS '24)<\/i>, Dec 2024, Marrakesh, Morocco. pp.1049-1056, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3726122.3726282\">&#x27E8;10.1145\/3726122.3726282&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05141570v1\">&#x27E8;hal-05141570&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05141570v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Shurok Khozam, Gregory Blanc, S\u00e9bastien Tixeuil, Eric Totel. DDoS mitigation while preserving QoS: a deep reinforcement learning-based approach. <i>2024 IEEE : 10th International Conference on Network Softwarization (NetSoft)<\/i>, Jun 2024, Saint Louis, MO, United States. pp.369-374, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NetSoft60951.2024.10588889\">&#x27E8;10.1109\/NetSoft60951.2024.10588889&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04659906v1\">&#x27E8;hal-04659906&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04659906\/file\/1571016591%20paper-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04659906\/file\/1571016591%20paper-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04659906\/file\/1571016591%20paper-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04659906v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, et al.. XAI-driven adversarial attacks on network intrusion detectors. <i>European Interdisciplinary Cybersecurity Conference (EICC)<\/i>, Jun 2024, Xanthi, Greece. pp.65-73, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3655693.3655714\">&#x27E8;10.1145\/3655693.3655714&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04660625v1\">&#x27E8;hal-04660625&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04660625\/file\/eicc2024-18.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04660625\/file\/eicc2024-18.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04660625\/file\/eicc2024-18.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04660625v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adrien Schoen, Gregory Blanc, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, et al.. A tale of two methods: unveiling the limitations of GAN and the rise of bayesian networks for synthetic network traffic generation. <i>2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)<\/i>, Jul 2024, Vienna, Austria. pp.273-286, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSPW61312.2024.00036\">&#x27E8;10.1109\/EuroSPW61312.2024.00036&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04871298v1\">&#x27E8;hal-04871298&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04871298\/file\/tmpy9y3gxhu_AsiaCCS_Revised.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04871298\/file\/tmpy9y3gxhu_AsiaCCS_Revised.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04871298\/file\/tmpy9y3gxhu_AsiaCCS_Revised.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04871298v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hugo Teixeira de Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, et al.. A model-based approach for assessing the security of cyber-physical systems. <i>The 19th International Conference on Availability, Reliability and Security (ARES) (2024)<\/i>, Jul 2024, Vienne, Austria. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3670470\">&#x27E8;10.1145\/3664476.3670470&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04669279v1\">&#x27E8;hal-04669279&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04669279\/file\/A_Model-based_Approach_for_Assessing_the_Security_of_Cyber-Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04669279\/file\/A_Model-based_Approach_for_Assessing_the_Security_of_Cyber-Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04669279\/file\/A_Model-based_Approach_for_Assessing_the_Security_of_Cyber-Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04669279v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID\/session token abuse on openID connect. <i>21st International Conference on Security and Cryptography (SECRYPT 2024)<\/i>, Jul 2024, Dijon, France. pp.674-679, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0012757900003767\">&#x27E8;10.5220\/0012757900003767&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04719043v1\">&#x27E8;hal-04719043&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04719043v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier, Olivier Levillain, et al.. Mod\u00e9lisation et test des ambigu\u00eft\u00e9s de recouvrement de donn\u00e9es pour l'obtention des politiques de r\u00e9-assemblage dans les protocoles r\u00e9seaux. <i>RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2023, Neuvy-sur-Barangeon, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165396v1\">&#x27E8;hal-04165396&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165396\/file\/paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165396\/file\/paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165396\/file\/paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165396v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: first workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. <i>ACM SIGSAC Conference on Computer and Communications Security (CCS)<\/i>, ACM, Nov 2023, Copenhagen, Denmark. pp.3662-3663, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3576915.3624027\">&#x27E8;10.1145\/3576915.3624027&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04325353v1\">&#x27E8;hal-04325353&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04325353v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. <i>Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information (RESSI)<\/i>, LIFO, May 2023, Neuvy-sur-Barangeon, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04164470v1\">&#x27E8;hal-04164470&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04164470v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, S\u00e9bastien Tixeuil. Data-driven evaluation of\u00a0intrusion detectors: a methodological framework. <i>FPS 2022 - 15th International Symposium on Foundations & Practice of Security<\/i>, Dec 2022, Ottawa, ON, Canada. pp.142-157, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-30122-3_9\">&#x27E8;10.1007\/978-3-031-30122-3_9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04055085v1\">&#x27E8;hal-04055085&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04055085\/file\/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04055085\/file\/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04055085\/file\/Data_driven_evaluation_of_intrusion_detectors___a_taxonomy___FPS2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04055085v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adrien Schoen, Gregory Blanc, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, et al.. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. <i>RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2022, Chambon-sur-Lac, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03675359v1\">&#x27E8;hal-03675359&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03675359\/file\/tmp13_94k46_HowToEvaluateNetworkTrafficGeneration.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03675359\/file\/tmp13_94k46_HowToEvaluateNetworkTrafficGeneration.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03675359\/file\/tmp13_94k46_HowToEvaluateNetworkTrafficGeneration.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03675359v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elkin Aguas, Anthony Lambert, Gregory Blanc, Herv\u00e9 Debar. Automated saturation mitigation controlled by deep reinforcement learning. <i>ICNP 2020: IEEE 28th International Conference on Network Protocols<\/i>, Oct 2020, Madrid (online), Spain. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICNP49622.2020.9259356\">&#x27E8;10.1109\/ICNP49622.2020.9259356&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03124039v1\">&#x27E8;hal-03124039&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03124039v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Herv\u00e9 Debar. Generative Deep Learning for Internet of Things Network Traffic Generation. <i>2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)<\/i>, Dec 2020, Perth, Australia. pp.70-79, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PRDC50213.2020.00018\">&#x27E8;10.1109\/PRDC50213.2020.00018&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03127899v1\">&#x27E8;hal-03127899&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03127899v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource allocation for secure SDN-based virtual network migration. <i>NCA 2019: 18th International Symposium on Network Computing and Applications<\/i>, Sep 2019, Cambridge, MA, United States. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/nca.2019.8935027\">&#x27E8;10.1109\/nca.2019.8935027&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438632v1\">&#x27E8;hal-02438632&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438632v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houda Jmila, Gregory Blanc. Designing security-aware service requests for NFV-enabled networks. <i>ICCCN 2019: 28th International Conference on Computer Communication and Networks<\/i>, Jul 2019, Valencia, Spain. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/icccn.2019.8847058\">&#x27E8;10.1109\/icccn.2019.8847058&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438649v1\">&#x27E8;hal-02438649&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438649\/file\/Designing_a_security_aware_service_request_in_NVF_enabled_networks_20190510.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438649\/file\/Designing_a_security_aware_service_request_in_NVF_enabled_networks_20190510.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438649\/file\/Designing_a_security_aware_service_request_in_NVF_enabled_networks_20190510.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438649v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim El Yacoubi. Siamese network based feature learning for improved intrusion detection. <i>ICONIP 2019: International Conference on Neural Information Processing<\/i>, Dec 2019, Sydney, Australia. pp.377-389, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-36708-4_31\">&#x27E8;10.1007\/978-3-030-36708-4_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02421070v1\">&#x27E8;hal-02421070&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02421070v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Machine learning for IoT network monitoring. <i>RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2019, Erquy, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438733v1\">&#x27E8;hal-02438733&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438733v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Anomalous communications detection in IoT networks using sparse autoencoders. <i>NCA 2019: 18th International Symposium on Network Computing and Applications<\/i>, Sep 2019, Cambridge, MA, United States. pp.1-5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2019.8935007\">&#x27E8;10.1109\/NCA.2019.8935007&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02423336v1\">&#x27E8;hal-02423336&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02423336v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, et al.. Towards a 5G security architecture: articulating software-defined security and security as a service. <i>5G-NS 2018: Workshop on 5G Networks Security<\/i>, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3230833.3233251\">&#x27E8;10.1145\/3230833.3233251&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01988053v1\">&#x27E8;hal-01988053&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01988053v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois Boutigny, Stephane Betge-Brezetz, Herv\u00e9 Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. <i>NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Feb 2018, Paris, France. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2018.8328706\">&#x27E8;10.1109\/NTMS.2018.8328706&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01868949v1\">&#x27E8;hal-01868949&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01868949v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Gregory Blanc. Secure migration of virtual SDN topologies. <i>RESSI 2018: Rendez-vous de la Recherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/i>, May 2018, La Bresse, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438748v1\">&#x27E8;hal-02438748&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438748\/file\/charmet_secure_migration_virtual.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438748\/file\/charmet_secure_migration_virtual.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438748\/file\/charmet_secure_migration_virtual.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438748v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Edouard Fabre, Jouni Viinikka, Herv\u00e9 Debar, Gregory Blanc. Network visibility-aware blacklist generation. <i>ICIMP 2018: 13th International Conference on Internet Monitoring and Protection<\/i>, Jul 2018, Barcelone, Spain. pp.7 - 15. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01987693v1\">&#x27E8;hal-01987693&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01987693v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cuong Pham, Gregory Blanc, Herv\u00e9 Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. <i>RESSI 2018: Rendez-vous de la Recherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/i>, May 2018, La Bresse, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438757v1\">&#x27E8;hal-02438757&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438757v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. IoT devices recognition through network traffic analysis. <i>BIG DATA 2018: IEEE International Conference on Big Data<\/i>, Dec 2018, Seattle, United States. pp.5187-5192, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BigData.2018.8622243\">&#x27E8;10.1109\/BigData.2018.8622243&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01994156v1\">&#x27E8;hal-01994156&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01994156v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, David Machniki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, et al.. NECOMA: Nippon-European Cyberdefense-Oriented Multilayer Analysis. <i>EPS 2017: European Project Space on Networks, Systems and Technologies<\/i>, Feb 2017, Porto, Portugal. pp.81 - 105, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0007902500810105\">&#x27E8;10.5220\/0007902500810105&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02065143v1\">&#x27E8;hal-02065143&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02065143v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi. Preserving confidentiality during the migration of virtual SDN topologies: a formal approach. <i>NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications<\/i>, Oct 2017, Cambridge, United States. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2017.8171392\">&#x27E8;10.1109\/NCA.2017.8171392&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01666374v1\">&#x27E8;hal-01666374&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01666374v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Herv\u00e9 Debar. Adaptive policy-driven attack mitigation in SDN. <i>XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO)<\/i>, Apr 2017, Belgrade, Serbia. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3071064.3071068\">&#x27E8;10.1145\/3071064.3071068&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01649980v1\">&#x27E8;hal-01649980&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01649980v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Herv\u00e9 Debar. Hybrid Risk Assessment Model Based on Bayesian Networks. <i>11th International Workshop on Security, IWSEC 2016<\/i>, Sep 2016, Tokyo, Japan. pp.21 - 40, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-44524-3_2\">&#x27E8;10.1007\/978-3-319-44524-3_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01393744v1\">&#x27E8;hal-01393744&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01393744v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Edouard Fabre, Herv\u00e9 Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. <i>NordSec 2016<\/i>, Nov 2016, Oulu, Finland. pp.101--116, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_7\">&#x27E8;10.1007\/978-3-319-47560-8_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01387569v1\">&#x27E8;hal-01387569&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01387569v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Muhammad Sabir Idrees, Fabien Charmet, Reda Yaich, Gregory Blanc. Usage control policy enforcement in SDN-based clouds: a dynamic availability service use case. <i>HPCC 2016 : 18th IEEE International Conference on High Performance Computing and Communications<\/i>, Dec 2016, Sydney, Australia. pp.578 - 585, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/HPCC-SmartCity-DSS.2016.0087\">&#x27E8;10.1109\/HPCC-SmartCity-DSS.2016.0087&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01449235v1\">&#x27E8;hal-01449235&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01449235\/file\/Usage_Control_Policy_Enforcement_in_SDN_based_Clouds__A_Dynamic_Availability_Service_Use_Case__5724315rszcdk_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01449235\/file\/Usage_Control_Policy_Enforcement_in_SDN_based_Clouds__A_Dynamic_Availability_Service_Use_Case__5724315rszcdk_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01449235\/file\/Usage_Control_Policy_Enforcement_in_SDN_based_Clouds__A_Dynamic_Availability_Service_Use_Case__5724315rszcdk_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01449235v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. <i> 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection<\/i>, May 2015, Hamburg, Germany. pp.252 - 266, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-18467-8_17\">&#x27E8;10.1007\/978-3-319-18467-8_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255089v1\">&#x27E8;hal-01255089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01255089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi. AJNA : anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL\/TLS. <i>BADGERS 2015 : 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security<\/i>, Nov 2015, Kyoto, Japan. pp.74 - 84, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BADGERS.2015.019\">&#x27E8;10.1109\/BADGERS.2015.019&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01453228v1\">&#x27E8;hal-01453228&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01453228\/file\/mensah_badgers15_authorcr.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01453228\/file\/mensah_badgers15_authorcr.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01453228\/file\/mensah_badgers15_authorcr.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01453228v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi. Eye can tell : on the correlation between eye movement and phishing identification. <i>ICONIP 2015 : 22nd International Conference on Neural Information Processing<\/i>, Nov 2015, Istanbul, Turkey. pp.223 - 232, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-26555-1_26\">&#x27E8;10.1007\/978-3-319-26555-1_26&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263381v1\">&#x27E8;hal-01263381&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263381v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Towards autonomic DDoS mitigation using Software Defined Networking. <i>SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies<\/i>, Feb 2015, San Diego, Ca, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.14722\/sent.2015.23004\">&#x27E8;10.14722\/sent.2015.23004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01257899v1\">&#x27E8;hal-01257899&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01257899v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Mustapha, Herv\u00e9 Debar, Gregory Blanc. Policy enforcement point model. <i>SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks<\/i>, Sep 2014, Beijing, China. pp.278 - 286, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-23829-6_20\">&#x27E8;10.1007\/978-3-319-23829-6_20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263380v1\">&#x27E8;hal-01263380&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263380v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Herv\u00e9 Debar. Combining technical and financial impacts for countermeasure selection. <i>AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention<\/i>, Jun 2014, Marrakesh, Morocco. pp.1 - 14, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4204\/EPTCS.165.1\">&#x27E8;10.4204\/EPTCS.165.1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01257903v1\">&#x27E8;hal-01257903&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01257903v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi. EyeBit: eye-tracking approach for enforcing phishing prevention habits. <i>BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security<\/i>, Sep 2014, Wroclaw, Poland. pp.56 - 65, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BADGERS.2014.14\">&#x27E8;10.1109\/BADGERS.2014.14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304643v1\">&#x27E8;hal-01304643&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304643\/file\/miyamoto-badgers2014.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304643\/file\/miyamoto-badgers2014.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304643\/file\/miyamoto-badgers2014.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304643v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. <i>BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security<\/i>, Sep 2014, Wroclaw, Poland. pp.30 - 39, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BADGERS.2014.10\">&#x27E8;10.1109\/BADGERS.2014.10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332339v1\">&#x27E8;hal-01332339&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332339v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ahmad Samer Wazan, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. <i>TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Jul 2013, Melbourne, Australia. pp.421 - 430, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2013.53\">&#x27E8;10.1109\/TrustCom.2013.53&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275020v1\">&#x27E8;hal-01275020&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275020v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Matthews Jose, R\u00e9mi Badonnel, Thibault Cholez, Herv\u00e9 Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. <i>RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165397v1\">&#x27E8;hal-04165397&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165397v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Ouvrages<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jos\u00e9 Francisco Ruiz, et al.. Cybersecurity research analysis report for Europe and Japan. Springer, 75, pp.172, 2021, Studies in Big Data, 978-3-030-62311-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-62312-8\">&#x27E8;10.1007\/978-3-030-62312-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03124036v1\">&#x27E8;hal-03124036&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03124036v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cristiano Giuffrida, S\u00e9bastien Bardin, Gregory Blanc (Dir.). Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Springer, pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01864973v1\">&#x27E8;hal-01864973&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01864973v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al. (Dir.). Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Springer, pp.818, 2018, Lecture Notes in Computer Science, Security and Cryptology, 11149, Lecture Notes in Computer Science, Security and Cryptology, 11149, 978-3-030-01949-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01987497v1\">&#x27E8;hal-01987497&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01987497v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro (Dir.). Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450264v1\">&#x27E8;hal-01450264&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01450264v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herbert Bos, Fabian Monrose, Gregory Blanc (Dir.). Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings. Springer, 9404, pp.638, 2015, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-26361-8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01453167v1\">&#x27E8;hal-01453167&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01453167v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Poster de conf\u00e9rence<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solayman Ayoubi, S\u00e9bastien Tixeuil, Gregory Blanc, Houda Jmila. Demo: towards reproducible evaluations of ML-based IDS using data-driven approaches. Bo Luo; Xiaojing Liao; Jun Xu. <i>CCS '24: ACM SIGSAC Conference on Computer and Communications Security<\/i>, Oct 2024, Salt Lake City, UT, United States. <a target=\"_blank\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691368\">Association for Computing Machinery<\/a>, CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp.5081-5083, 2024, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3658644.3691368\">&#x27E8;10.1145\/3658644.3691368&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04879181v1\">&#x27E8;hal-04879181&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04879181\/file\/CCS_2024___Demo_Paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04879181\/file\/CCS_2024___Demo_Paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04879181\/file\/CCS_2024___Demo_Paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04879181v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solayman Ayoubi, Gregory Blanc, Houda Jmila, S\u00e9bastien Tixeuil, Thomas Silverston. Evaluation Framework for ML-based IDS. <i>RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2023, Neuvy-sur-Barangeon, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04164441v1\">&#x27E8;hal-04164441&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04164441\/file\/Evaluation_Framework_for_ML_based_IDS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04164441\/file\/Evaluation_Framework_for_ML_based_IDS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04164441\/file\/Evaluation_Framework_for_ML_based_IDS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04164441v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Thomas Silverston, S\u00e9bastien Tixeuil. GRIFIN: cognitive and programmable security for resilient next-generation networks. <i>RESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2022, Chambon-sur-Lac, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165398v1\">&#x27E8;hal-04165398&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165398\/file\/RESSI_2022_GRIFIN_1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165398\/file\/RESSI_2022_GRIFIN_1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165398\/file\/RESSI_2022_GRIFIN_1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165398v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elkin Aguas, Anthony Lambert, Herv\u00e9 Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. <i>RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, Dec 2020, En Ligne, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165399v1\">&#x27E8;hal-04165399&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165399v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc. VARIoT: vulnerability and attack repository for IoT. <i>RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, Dec 2020, En ligne, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165400v1\">&#x27E8;hal-04165400&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165400\/file\/Poster_VARIoT_RESSI2020.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165400\/file\/Poster_VARIoT_RESSI2020.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165400\/file\/Poster_VARIoT_RESSI2020.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165400v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, Pawe\u0142 Pawli\u0144ski. A trusted knowledge management system for multi-layer threat analysis. <i>TRUST 2014 : 7th International Conference on Trust and Trustworthy Computing <\/i>, Jun 2014, Heraklion, Greece. Springer International Publishing, pp.214 - 215, 2014, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-08593-7_18\">&#x27E8;10.1007\/978-3-319-08593-7_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263387v1\">&#x27E8;hal-01263387&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263387v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '25: proceedings of the 2025 workshop on recent advances in resilient and trustworthy machine learning-driveN systems. <i>CCS '25: ACM SIGSAC Conference on Computer and Communications Security<\/i>, Oct 2025, Taipei, Taiwan. <i>ACM SIGSAC Review (ACM Digital Library)<\/i>, ACM, 2025, 979-8-4007-1909-7. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3733821\">&#x27E8;10.1145\/3733821&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05415666v1\">&#x27E8;hal-05415666&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05415666v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gregory Blanc, Takeshi Takahashi, Zonghua Zhang. ARTMAN '23: proceedings of the 2023 Workshop on recent advances in resilient and trustworthy ML systems in autonomous networks. ACM, 2023, 979-8-4007-0265-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3605772\">&#x27E8;10.1145\/3605772&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04325343v1\">&#x27E8;hal-04325343&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04325343v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Dey, Benjamin Cost\u00e9, \u00c9ric Totel, Adrien B\u00e9cue, Elkin Aguas, et al.. Actes de la conf\u00e9rence CAID 2021 (Conference on Artificial Intelligence for Defense). <i>CAID 2021 (Conference on Artificial Intelligence for Defense)<\/i>, pp.1-152, 2021. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03535661v1\">&#x27E8;hal-03535661&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03535661v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al.. Information and Communications Security. 11149, Springer International Publishing, 2018, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-01950-1\">&#x27E8;10.1007\/978-3-030-01950-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04187775v1\">&#x27E8;hal-04187775&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04187775v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, Ludovic M\u00e9, Jean Leneutre, Vincent Nicomette, J\u00e9r\u00f4me Fran\u00e7ois, et al.. SuperviZ - Supervision et orchestration de la s\u00e9curit\u00e9 - Rapport d\u2019avancement \u00e0 mi-projet. L02, L03, L04, L05, L06, L07, T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com); Inria. 2025, pp.1-58. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05444442v1\">&#x27E8;hal-05444442&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05444442v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4469,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3550","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3550"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3550\/revisions"}],"predecessor-version":[{"id":3551,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3550\/revisions\/3551"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4469"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}