{"id":3560,"date":"2022-04-14T11:57:05","date_gmt":"2022-04-14T09:57:05","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/joaquin-garcia-alfaro-2\/"},"modified":"2022-04-14T11:57:20","modified_gmt":"2022-04-14T09:57:20","slug":"joaquin-garcia-alfaro-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/joaquin-garcia-alfaro-2\/","title":{"rendered":"Joaquin GARCIA ALFARO"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/Garcia-220x220-1-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Pr. Joaquin <span class=\"MonLabo-lastname\">GARCIA ALFARO<\/span><\/h1><div class=\"coordonnees\"><em>Professeur<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">joaquin.garcia_alfaro[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omair Faraj, David Megias, Joaquin Garcia\u2010alfaro. Security approaches for data provenance in the internet of things: a systematic literature review. <i>ACM Computing Surveys<\/i>, 2025, 57 (10), pp.1 - 41. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3718735\">&#x27E8;10.1145\/3718735&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05033850v1\">&#x27E8;hal-05033850&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05033850\/file\/preprint-CSUR2025.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05033850\/file\/preprint-CSUR2025.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05033850\/file\/preprint-CSUR2025.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05033850v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Lorena Gonz\u00e1lez-Manzano, Joaquin Garcia\u2010alfaro. Software vulnerability detection under poisoning attacks using CNN-based image processing. <i>International Journal of Information Security<\/i>, 2025, 24 (75), pp.1-22. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-025-00989-2\">&#x27E8;10.1007\/s10207-025-00989-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05033755v1\">&#x27E8;hal-05033755&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05033755\/file\/preprint-IJIS-2025.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05033755\/file\/preprint-IJIS-2025.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05033755\/file\/preprint-IJIS-2025.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05033755v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Lorena Gonz\u00e1lez-Manzano, Joaquin Garcia\u2010alfaro. On the resilience of traditional AI algorithms toward poisoning attacks for vulnerability detection. <i>IET Information Security<\/i>, 2025, 2025 (1), pp.1-31. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1049\/ise2\/9997989\">&#x27E8;10.1049\/ise2\/9997989&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05309774v1\">&#x27E8;hal-05309774&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05309774\/file\/ITL25-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05309774\/file\/ITL25-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05309774\/file\/ITL25-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05309774v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio L\u00f3pez Mart\u00ednez, Montassar Naghmouchi, Maryline Laurent, Joaqu\u00edn Garc\u00eda Alfaro, Manuel Gil P\u00e9rez, et al.. Breaking barriers in healthcare: A secure identity framework for seamless access. <i>Computer Standards and Interfaces<\/i>, 2025, 95, pp.104020. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.csi.2025.104020\">&#x27E8;10.1016\/j.csi.2025.104020&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05138125v1\">&#x27E8;hal-05138125&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05138125v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pantaleone Nespoli, Albaladejo-Gonzalez Mariano, Pastor Valera Jose Antonio, Ruip\u00e9rez-Valiente Jos\u00e9 A., Joaquin Garcia\u2010alfaro, et al.. SCORPION cyber range: fully customizable cyberexercises, gamification and learning analytics to train cybersecurity competencies. <i>Human-centric Computing and Information Sciences<\/i>, 2025, 15, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.22967\/HCIS.2025.15.067\">&#x27E8;10.22967\/HCIS.2025.15.067&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05397331v1\">&#x27E8;hal-05397331&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05397331\/file\/preprint-scorpion.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05397331\/file\/preprint-scorpion.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05397331\/file\/preprint-scorpion.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05397331v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">S. Seng, Joaquin Garcia\u2010alfaro, I. Gazeau, L. Desmonts. A stateful protocol-based detection engine combining behavior use cases and system specifications. <i>Internet Technology Letters<\/i>, 2025, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.633\">&#x27E8;10.1002\/itl2.633&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913266v1\">&#x27E8;hal-04913266&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913266\/file\/preprint-ITL2025.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913266\/file\/preprint-ITL2025.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913266\/file\/preprint-ITL2025.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913266v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omair Faraj, David Meg\u00edas, Joaquin Garcia-Alfaro. ZIRCON: zero-watermarking-based approach for data integrity and secure provenance in IoT networks. <i>Journal of information security and applications<\/i>, 2024, 85, pp.103840. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jisa.2024.103840\">&#x27E8;10.1016\/j.jisa.2024.103840&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913392v1\">&#x27E8;hal-04913392&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913392\/file\/preprint-ZIRCON.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913392\/file\/preprint-ZIRCON.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913392\/file\/preprint-ZIRCON.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913392v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. A survey on cyber-resilience approaches for cyber-physical systems. <i>ACM Computing Surveys<\/i>, 2024, 56 (8), pp.1-37. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3652953\">&#x27E8;10.1145\/3652953&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04562096v1\">&#x27E8;hal-04562096&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04562096v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. <i>Sensors<\/i>, 2023, 23 (9), pp.4224. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s23094224\">&#x27E8;10.3390\/s23094224&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04080819v1\">&#x27E8;hal-04080819&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04080819\/file\/sensors-23-04224.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04080819\/file\/sensors-23-04224.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04080819\/file\/sensors-23-04224.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04080819v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David P\u00e0mies-Estrems, Joaquin Garcia\u2010alfaro. On the self-adjustment of privacy safeguards for query log streams. <i>Computers & Security<\/i>, 2023, 134, pp.103450. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2023.103450\">&#x27E8;10.1016\/j.cose.2023.103450&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04189131v1\">&#x27E8;hal-04189131&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04189131\/file\/COSE.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04189131\/file\/COSE.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04189131\/file\/COSE.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04189131v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro. Cyber-physical defense in the quantum Era. <i>Scientific Reports<\/i>, 2022, 12, pp.1905. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1038\/s41598-022-05690-1\">&#x27E8;10.1038\/s41598-022-05690-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628438v1\">&#x27E8;hal-03628438&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628438\/file\/era.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628438\/file\/era.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628438\/file\/era.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628438v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis. Research trends in collaborative drones. <i>Sensors<\/i>, 2022, 22 (9), pp.3321:1-3321:17. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s22093321\">&#x27E8;10.3390\/s22093321&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03654021v1\">&#x27E8;hal-03654021&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03654021\/file\/sensors-drone-survey.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03654021\/file\/sensors-drone-survey.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03654021\/file\/sensors-drone-survey.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03654021v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Joaquin Garcia\u2010alfaro. Design, modeling and implementation of digital twins. <i>Sensors<\/i>, 2022, 22 (14), pp.5396-5426. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s22145396\">&#x27E8;10.3390\/s22145396&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843008v1\">&#x27E8;hal-03843008&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03843008\/file\/sensors-22-05396-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03843008\/file\/sensors-22-05396-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03843008\/file\/sensors-22-05396-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03843008v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Joaquin Garcia\u2010alfaro, et al.. DECA: a Dynamic Energy cost and Carbon emission-efficient Application placement method for Edge Clouds. <i>IEEE Access<\/i>, 2021, 9, pp.70192-70213. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2021.3075973\">&#x27E8;10.1109\/ACCESS.2021.3075973&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03208423v2\">&#x27E8;hal-03208423v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03208423\/file\/IEEEAccessDECA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03208423\/file\/IEEEAccessDECA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03208423\/file\/IEEEAccessDECA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03208423v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Erwan Beurier, Joaquin Garcia\u2010alfaro, Randy Kuang, Marc-Oliver Pahl, et al.. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?. <i>Digitale Welt<\/i>, 2021, 5 (1), pp.34-39. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s42354-021-0402-0\">&#x27E8;10.1007\/s42354-021-0402-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628446v2\">&#x27E8;hal-03628446v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628446\/file\/preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628446\/file\/preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628446\/file\/preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628446v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Frederic Cuppens, Nora Cuppens, Romain Dagnas, Joaquin Garcia\u2010alfaro. Resilience estimation of Cyber-Physical Systems via quantitative metrics. <i>IEEE Access<\/i>, 2021, 9, pp.46462-46475. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2021.3066108\">&#x27E8;10.1109\/ACCESS.2021.3066108&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03626725v1\">&#x27E8;hal-03626725&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03626725\/file\/Resilience_Estimation.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03626725\/file\/Resilience_Estimation.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03626725\/file\/Resilience_Estimation.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03626725v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis, Fillipe Santos. GPS-free, error tolerant path planning for swarms of micro aerial vehicles with quality amplification \u2021. <i>Sensors<\/i>, 2021, 21 (14), pp.4731:1-4731:16. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s21144731\">&#x27E8;10.3390\/s21144731&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628455v1\">&#x27E8;hal-03628455&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628455\/file\/pre-print-sensors2021.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628455\/file\/pre-print-sensors2021.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628455\/file\/pre-print-sensors2021.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628455v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Edgar Galv\u00e1n, Joaquin Garcia\u2010alfaro, Vicen\u00e7 Torra, Guillermo Navarro-Arribas. Agents in a privacy-preserving world. <i>Transactions on Data Privacy<\/i>, 2021, 14 (1), pp.53-63. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04337700v1\">&#x27E8;hal-04337700&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04337700\/file\/preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04337700\/file\/preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04337700\/file\/preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04337700v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia\u2010alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs. <i>Journal of information security and applications<\/i>, 2020, 54, pp.102562:1-102562:14. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jisa.2020.102562\">&#x27E8;10.1016\/j.jisa.2020.102562&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125762v1\">&#x27E8;hal-03125762&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125762v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia\u2010alfaro. A real-time query log protection method for web search engines. <i>IEEE Access<\/i>, 2020, 8, pp.87393-87413. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2020.2992012\">&#x27E8;10.1109\/ACCESS.2020.2992012&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125769v1\">&#x27E8;hal-03125769&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125769v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia\u2010alfaro. Switched-based resilient control of cyber-physical systems. <i>IEEE Access<\/i>, 2020, 8 (3), pp.212194 - 212208. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2020.3039879\">&#x27E8;10.1109\/ACCESS.2020.3039879&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03113904v1\">&#x27E8;hal-03113904&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03113904v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia\u2010alfaro, Jamil Kassem, Evangelos Kranakis. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications. <i>Transactions on emerging telecommunications technologies<\/i>, 2019, 30 (12), <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.3712\">&#x27E8;10.1002\/ett.3712&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02390285v1\">&#x27E8;hal-02390285&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02390285v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. <i>Journal of Ambient Intelligence and Humanized Computing<\/i>, 2019, 14, pp.14979-14993. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12652-019-01545-2\">&#x27E8;10.1007\/s12652-019-01545-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991234v1\">&#x27E8;hal-03991234&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991234v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The influence of conception paradigms on data protection in e-learning platforms: a case study. <i>IEEE Access<\/i>, 2019, 7, pp.64110-64119. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2019.2915275\">&#x27E8;10.1109\/ACCESS.2019.2915275&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02281231v1\">&#x27E8;hal-02281231&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02281231v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdel-Mehsen Ahmad, Jamil Kassem, Michel Barbeau, Evangelos Kranakis, Steven Porretta, et al.. Doppler effect in the acoustic ultra low frequency band for wireless underwater networks. <i>Mobile Networks and Applications<\/i>, 2018, 23 (5), pp.1282 - 1292. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11036-018-1036-9\">&#x27E8;10.1007\/s11036-018-1036-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013724v1\">&#x27E8;hal-02013724&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013724v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Xavier Bar\u00f3\u2010sol\u00e9, Ana E. Guerrero\u2010roldan, Josep Prieto\u2010bl\u00e1zquez, Anna Rozeva, Orlin Marinov, et al.. Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experience. <i>Internet technology letters<\/i>, 2018, 1 (4), pp.e56-1 - e56-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.56\">&#x27E8;10.1002\/itl2.56&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013504v1\">&#x27E8;hal-02013504&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013504v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security (third edition). <i>Computers and Electrical Engineering<\/i>, 2018, 71, pp.1040 - 1042. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2018.10.008\">&#x27E8;10.1016\/j.compeleceng.2018.10.008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013479v1\">&#x27E8;hal-02013479&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013479v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. <i>Future Generation Computer Systems<\/i>, 2018, 83, pp.535 - 552. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.future.2017.05.043\">&#x27E8;10.1016\/j.future.2017.05.043&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01745780v1\">&#x27E8;hal-01745780&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01745780v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Hypergraph-driven mitigation of cyber-attacks. <i>Internet technology letters<\/i>, 2018, 1 (3), pp.e38-1 - e38-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.38\">&#x27E8;10.1002\/itl2.38&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013488v1\">&#x27E8;hal-02013488&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013488v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Using an event data taxonomy to represent the impact of cyber events as geometrical instances. <i>IEEE Access<\/i>, 2018, 6, pp.8810 - 8828. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2017.2740402\">&#x27E8;10.1109\/ACCESS.2017.2740402&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01729364v1\">&#x27E8;hal-01729364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01729364v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. <i>Transactions on emerging telecommunications technologies<\/i>, 2018, 29 (7), pp.e3209-1 - e3209-17. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.3209\">&#x27E8;10.1002\/ett.3209&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01823618v1\">&#x27E8;hal-01823618&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01823618v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro. Cyber\u2010physical architecture assisted by programmable networking. <i>Internet technology letters<\/i>, 2018, 1 (4), pp.e44-1 - e44-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.44\">&#x27E8;10.1002\/itl2.44&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01869475v1\">&#x27E8;hal-01869475&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01869475v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. <i>Computers and Electrical Engineering<\/i>, 2017, 59, pp.73 - 75. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2017.05.027\">&#x27E8;10.1016\/j.compeleceng.2017.05.027&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013472v1\">&#x27E8;hal-02013472&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013472v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. A polytope-based approach to measure the impact of events against critical infrastructures. <i>Journal of Computer and System Sciences<\/i>, 2017, 83 (1), pp.3 - 21. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jcss.2016.02.004\">&#x27E8;10.1016\/j.jcss.2016.02.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01453253v1\">&#x27E8;hal-01453253&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01453253v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Herv\u00e9 Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. <i>EURASIP Journal on Information Security<\/i>, 2017, 2017 (12), pp.1 - 22. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13635-017-0063-6\">&#x27E8;10.1186\/s13635-017-0063-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01649965v1\">&#x27E8;hal-01649965&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01649965v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of watermark-based schemes to detect cyber-physical attacks. <i>EURASIP Journal on Information Security<\/i>, 2017, 2017, pp.8-1 - 8-25. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13635-017-0060-9\">&#x27E8;10.1186\/s13635-017-0060-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01701167v1\">&#x27E8;hal-01701167&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01701167v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, Meng Yao. Secure localization in the presence of colluders in WSNs. <i>Sensors<\/i>, 2017, 17 (8), pp.1892-1 - 1892-15. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s17081892\">&#x27E8;10.3390\/s17081892&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01701140v1\">&#x27E8;hal-01701140&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01701140\/file\/18688.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01701140\/file\/18688.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01701140\/file\/18688.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01701140v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Channel selection using a multiple radio model. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2016, 64 (C), pp.113 - 123. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2016.01.021\">&#x27E8;10.1016\/j.jnca.2016.01.021&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332350v1\">&#x27E8;hal-01332350&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332350\/file\/preprint-jnca2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332350\/file\/preprint-jnca2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332350\/file\/preprint-jnca2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332350v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Hela Sfar, Joaquin Garcia-Alfaro. Reputation trust mechanism under the organizational-based access control model. <i>Security and communication networks<\/i>, 2016, 9 (18), pp.5295 - 5310. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/sec.1698\">&#x27E8;10.1002\/sec.1698&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01453259v1\">&#x27E8;hal-01453259&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01453259\/file\/preprint_scm_2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01453259\/file\/preprint_scm_2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01453259\/file\/preprint_scm_2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01453259v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Remarks on Peinado et al.'s analysis of J3Gen. <i>Sensors<\/i>, 2015, 15 (3), pp.6217 - 6220. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s150306217\">&#x27E8;10.3390\/s150306217&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263408v1\">&#x27E8;hal-01263408&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263408v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Francesco Longo, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. <i>Computers and Electrical Engineering<\/i>, 2015, 47, pp.255 - 257. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2015.11.016\">&#x27E8;10.1016\/j.compeleceng.2015.11.016&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332012v1\">&#x27E8;hal-01332012&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01332012v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, Mohammed El Barbori, Herv\u00e9 Debar. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. <i>Computers and Electrical Engineering<\/i>, 2015, 47, pp.13 - 34. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2015.07.023\">&#x27E8;10.1016\/j.compeleceng.2015.07.023&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255033v1\">&#x27E8;hal-01255033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255033v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. On the similarity of commercial EPC Gen2 pseudorandom number generators. <i>Transactions on emerging telecommunications technologies<\/i>, 2014, 25 (2), pp.151 - 154. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.2600\">&#x27E8;10.1002\/ett.2600&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01286097v1\">&#x27E8;hal-01286097&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01286097v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wei Shi, Joaquin Garcia-Alfaro, Jean-Pierre Corriveau. Searching for a black hole in interconnected networks using mobile agents and tokens. <i>Journal of Parallel and Distributed Computing<\/i>, 2014, 74 (1), pp.1945 - 1958. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jpdc.2013.08.009\">&#x27E8;10.1016\/j.jpdc.2013.08.009&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255466v1\">&#x27E8;hal-01255466&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255466v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Yannick Chevalier, Fr\u00e9d\u00e9ric Cuppens. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2014, 39, pp.152 - 166. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2013.06.002\">&#x27E8;10.1016\/j.jnca.2013.06.002&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00845810v1\">&#x27E8;hal-00845810&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00845810\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00845810\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00845810\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00845810v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Onion routing circuit construction via latency graphs. <i>Computers & Security<\/i>, 2013, 37, pp.197-214. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2013.03.003\">&#x27E8;10.1016\/j.cose.2013.03.003&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00846345v1\">&#x27E8;hal-00846345&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00846345v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2013, 36 (2), pp.744 - 755. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2012.12.013\">&#x27E8;10.1016\/j.jnca.2012.12.013&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00846121v1\">&#x27E8;hal-00846121&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00846121v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Ernesto Damiani, Radu State, Joaquin Garcia-Alfaro, et al.. SETOP'2012 and FPS'2012 special issue. <i>Journal of information security and applications<\/i>, 2013, 18 (1), pp.1 - 96. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jisa.2013.08.004\">&#x27E8;10.1016\/j.jisa.2013.08.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01260763v1\">&#x27E8;hal-01260763&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01260763v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Safaa Hachana, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Joaquin Garcia-Alfaro. Semantic Analysis of Role Mining Results and Shadowed Roles Detection. <i>Information Security Technical Report<\/i>, 2013, 17 (4), pp.131 - 147. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01213882v1\">&#x27E8;hal-01213882&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01213882v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Garc\u00eda-Alfaro Joaquin, Cuppens Fr\u00e9d\u00e9ric, Nora Cuppens-Boulahia, Salvador Martinez Perez, Jordi Cabot. Management of stateful firewall misconfiguration. <i>Computers & Security<\/i>, 2013, 39 (11), pp.64-85. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2013.01.004\">&#x27E8;10.1016\/j.cose.2013.01.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00869328v1\">&#x27E8;hal-00869328&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-00869328v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. J3Gen : a PRNG for low-cost passive RFID. <i>Sensors<\/i>, 2013, 13 (3), pp.3816-3830. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s130303816\">&#x27E8;10.3390\/s130303816&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00846567v1\">&#x27E8;hal-00846567&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00846567v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A Privacy-Aware Access Control Model for Distributed Network Monitoring. <i>Computers and Electrical Engineering<\/i>, 2013, 39 (7), pp.2263-2281. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2012.08.003\">&#x27E8;10.1016\/j.compeleceng.2012.08.003&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00949776v1\">&#x27E8;hal-00949776&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00949776\/file\/A_Privacy-Aware_Access_Control_Model_for_Distributed_Network_Monitoring.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00949776\/file\/A_Privacy-Aware_Access_Control_Model_for_Distributed_Network_Monitoring.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00949776\/file\/A_Privacy-Aware_Access_Control_Model_for_Distributed_Network_Monitoring.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00949776v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Patrick Battistello, Joaquin Garcia Alfaro, Cyril Del\u00e9tr\u00e9. Transaction-based authentication and key agreement protocol for inter-domain VoIP. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2012, 35 (5), pp.1579 - 1597. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2012.02.010\">&#x27E8;10.1016\/j.jnca.2012.02.010&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02135194v1\">&#x27E8;hal-02135194&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02135194v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Preventing the cluster formation attack against the hierarchical OLSR protocol. <i>Lecture Notes in Computer Science<\/i>, 2012, 6888 (1), pp.118-131. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00724742v1\">&#x27E8;hal-00724742&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00724742\/file\/preprint-fps2011cervera.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00724742\/file\/preprint-fps2011cervera.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00724742\/file\/preprint-fps2011cervera.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00724742v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra I. Kaklamani, et al.. A contextual privacy-aware access control model for network monitoring workflows: work in progress. <i>Lecture Notes in Computer Science<\/i>, 2012, 6888 (1), pp.208-217. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00704149v1\">&#x27E8;hal-00704149&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00704149\/file\/preprint-fps2011-EIP.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00704149\/file\/preprint-fps2011-EIP.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00704149\/file\/preprint-fps2011-EIP.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00704149v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wei Shi, Michel Barbeau, Joaquin Garcia Alfaro, Jean-Pierre Corriveau. Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. <i>Ad Hoc & Sensor Wireless Networks<\/i>, 2012, 17 (1), pp.87-102. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00945359v1\">&#x27E8;hal-00945359&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00945359\/file\/preprint-ahwsn2012.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00945359\/file\/preprint-ahwsn2012.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00945359\/file\/preprint-ahwsn2012.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00945359v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress. <i>Lecture Notes in Computer Science<\/i>, 2012, 6888 (1), pp.242-252. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-27901-0\">&#x27E8;10.1007\/978-3-642-27901-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00704144v1\">&#x27E8;hal-00704144&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00704144\/file\/preprint-fps2011tounsi.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00704144\/file\/preprint-fps2011tounsi.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00704144\/file\/preprint-fps2011tounsi.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00704144v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2011, 66 (9-10), pp.535 - 552. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-010-0221-z\">&#x27E8;10.1007\/s12243-010-0221-z&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02135370v1\">&#x27E8;hal-02135370&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02135370v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Proactive threshold cryptosystem for EPC tags. <i>Ad Hoc & Sensor Wireless Networks<\/i>, 2011, 12 (3-4), pp.187-208. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623637v1\">&#x27E8;hal-00623637&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00623637\/file\/preprint-proactive-tcepc-2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00623637\/file\/preprint-proactive-tcepc-2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00623637\/file\/preprint-proactive-tcepc-2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00623637v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags. <i>Wireless Personal Communications<\/i>, 2011, 59 (1), pp.27-42. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11277-010-0187-1\">&#x27E8;10.1007\/s11277-010-0187-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623631v1\">&#x27E8;hal-00623631&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00623631\/file\/wpc2010_rev.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00623631\/file\/wpc2010_rev.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00623631\/file\/wpc2010_rev.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00623631v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pere Montolio-Aranda, Joaquin Garcia Alfaro, David Megias. Improved flooding of broadcast messages using extended multipoint relaying. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2011, 34 (2), pp.542-550. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2010.12.011\">&#x27E8;10.1016\/j.jnca.2010.12.011&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00704242v1\">&#x27E8;hal-00704242&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00704242v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Laurent Toutain. Dynamic deployment of context-aware access control policies for constrained security devices. <i>Journal of Systems and Software<\/i>, 2011, 84 (7), pp.1144 - 1159. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jss.2011.02.005\">&#x27E8;10.1016\/j.jss.2011.02.005&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00609526v1\">&#x27E8;hal-00609526&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00609526v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. <i>International Journal of Information Security<\/i>, 2008, 7 (2), pp.103 - 122. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-007-0045-7\">&#x27E8;10.1007\/s10207-007-0045-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01207771v1\">&#x27E8;hal-01207771&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01207771v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, N. Boulahia-Cuppens, F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. <i>International Journal of Information Security<\/i>, 2008, 7 (2), pp.103-122. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-007-0045-7\">&#x27E8;10.1007\/s10207-007-0045-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628752v1\">&#x27E8;hal-03628752&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628752v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Fabien Autrel, Yacine Bouzida, Sylvain Gombault, Thierry Sans, et al.. L'anti-corr\u00e9lation comme crit\u00e8re de s\u00e9lection de contre-mesures dans le contexte de la d\u00e9tection d'intrusion. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2006, 61 (1-2), pp.197 - 217. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01923573v1\">&#x27E8;hal-01923573&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01923573v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquin Garcia\u2010alfaro, Sylvain Gombault, et al.. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2006, 61 (1-2), pp.197-217. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/BF03219974\">&#x27E8;10.1007\/BF03219974&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03646855v1\">&#x27E8;hal-03646855&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03646855\/file\/annales06-JGA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03646855\/file\/annales06-JGA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03646855\/file\/annales06-JGA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03646855v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2005<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Sergio Castillo, Guillermo Navarro-Arribas, Joan Borrell. ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System. <i>International Journal of Computer Science and Network Security<\/i>, 2005, 5 (11), pp.87-94. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628711v1\">&#x27E8;hal-03628711&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628711v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jamil Ahmad Kassem, Helena Rif\u00e0-Pous, Joaquin Garcia\u2010alfaro. Revisiting a probabilistic moving target defense strategy to handle attacks against network nodes with multiple resources. <i>Future of Information and Communication Conference (FICC)<\/i>, Apr 2025, Berlin (Germany), Germany. pp.536-554, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-85363-0_34\">&#x27E8;10.1007\/978-3-031-85363-0_34&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05033577v1\">&#x27E8;hal-05033577&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05033577\/file\/preprint-FICC2025.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05033577\/file\/preprint-FICC2025.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05033577\/file\/preprint-FICC2025.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05033577v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Luis Ibanez-Lissen, Lorena Gonzalez-Manzano, Jose Maria de Fuentes, Nicolas Anciaux, Joaquin Garcia-Alfaro. LUMIA: linear probing for unimodal and multiModal membership inference attacks leveraging internal LLM states. <i>30th European Symposium on Research in Computer Security (ESORICS)<\/i>, Sep 2025, Toulouse, France. pp.186-206, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2411.19876\">&#x27E8;10.48550\/arXiv.2411.19876&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-05202765v1\">&#x27E8;hal-05202765&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-05202765\/file\/ESORICS_2025___LUMIA-8.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05202765\/file\/ESORICS_2025___LUMIA-8.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05202765\/file\/ESORICS_2025___LUMIA-8.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05202765v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alessandro Palma, Nikolaos Papadakis, Georgios Bouloukakis, Joaquin Garcia-Alfaro, Mattia Sospetti, et al.. SHIELD : assessing security-by-design in federated data spaces using attack graphs. <i>The 40th ACM\/SIGAPP Symposium On Applied Computing ( SAC)<\/i>, Mar 2025, Catania, Italy. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3672608.3707797\">&#x27E8;10.1145\/3672608.3707797&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-04832442v2\">&#x27E8;hal-04832442v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-04832442\/file\/SAC25_SHIELD.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04832442\/file\/SAC25_SHIELD.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04832442\/file\/SAC25_SHIELD.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04832442v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis. Optimal UAV-trajectory design in a dynamic environment using NOMA and deep reinforcement learning. <i>IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)<\/i>, Aug 2024, Kingston, France. pp.277-282, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCECE59415.2024.10667252\">&#x27E8;10.1109\/CCECE59415.2024.10667252&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04762084v1\">&#x27E8;hal-04762084&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04762084\/file\/1571000942-final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04762084\/file\/1571000942-final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04762084\/file\/1571000942-final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04762084v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romain Dagnas, Michel Barbeau, Joaquin Garcia\u2010alfaro, Reda Yaich. Resilience assessment of multi-layered cyber-physical systems. <i>IFIP Networking 2024 - IOCRCI<\/i>, Jun 2024, Thessaloniki, Greece. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04559568v2\">&#x27E8;hal-04559568v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04559568\/file\/Resilience_Assessment_of_Multi_Layered_Cyber_Physical_Systems___VF.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04559568\/file\/Resilience_Assessment_of_Multi_Layered_Cyber_Physical_Systems___VF.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04559568\/file\/Resilience_Assessment_of_Multi_Layered_Cyber_Physical_Systems___VF.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04559568v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omair Faraj, David Megias, Joaquin Garcia\u2010alfaro. ZW-IDS: zero-watermarking-based network intrusion detection system using data provenance. <i>The 19th International Conference on Availability, Reliability and Security(ARES)<\/i>, Jul 2024, Vienna, Austria. pp.1-11, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3670933\">&#x27E8;10.1145\/3664476.3670933&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913404v1\">&#x27E8;hal-04913404&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913404\/file\/preprint-ares2024.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913404\/file\/preprint-ares2024.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913404\/file\/preprint-ares2024.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913404v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mario Fernandez-Tarraga, Alejandro-David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia-Alfaro, F\u00e9lix G\u00f3mez M\u00e1rmol. Training on social media cybersecurity skills in the healthcare context. <i>2024 13th International Conference on Communications, Circuits and Systems (ICCCAS)<\/i>, May 2024, Stavanger, Norway. pp.3-20, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-55829-0_1\">&#x27E8;10.1007\/978-3-031-55829-0_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913424v1\">&#x27E8;hal-04913424&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913424\/file\/preprint_sunriseA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913424\/file\/preprint_sunriseA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913424\/file\/preprint_sunriseA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913424v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pravallika Katragunta, Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis, Venkata Srinivas Kothapalli. Location optimization for tethered aerial base station serving mmWave high altitude UAVs. <i>IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)<\/i>, Aug 2024, Kingston, France. pp.271-276, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCECE59415.2024.10667117\">&#x27E8;10.1109\/CCECE59415.2024.10667117&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04762101v1\">&#x27E8;hal-04762101&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04762101\/file\/1571012068-final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04762101\/file\/1571012068-final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04762101\/file\/1571012068-final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04762101v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pravallika Katragunta, Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis. TBS joint optimization to serve mmWave high altitude UAVs: a counterfactual MAB approach. <i>13th International Conference on Communications, Circuits and Systems (ICCCAS)<\/i>, May 2024, Xiamen, France. pp.424-429, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICCCAS62034.2024.10652678\">&#x27E8;10.1109\/ICCCAS62034.2024.10652678&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04762130v1\">&#x27E8;hal-04762130&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04762130\/file\/ICCCAS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04762130\/file\/ICCCAS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04762130\/file\/ICCCAS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04762130v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Iain Burge, Michel Barbeau, Joaquin Garcia\u2010alfaro. Quantum algorithms for shapley value calculation. <i>2023 IEEE International Conference on Quantum Computing and Engineering (QCE)<\/i>, Sep 2023, Bellevue, United States. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QCE57702.2023.00024\">&#x27E8;10.1109\/QCE57702.2023.00024&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04386997v1\">&#x27E8;hal-04386997&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04386997v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia\u2010alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. <i>2023 IFIP Networking Conference (IFIP Networking)<\/i>, Jun 2023, Barcelone, Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.23919\/IFIPNetworking57963.2023.10186355\">&#x27E8;10.23919\/IFIPNetworking57963.2023.10186355&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04083180v1\">&#x27E8;hal-04083180&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04083180\/file\/Exploring_the_Quantitative_Resilience_Analysis_of_Cyber_Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04083180\/file\/Exploring_the_Quantitative_Resilience_Analysis_of_Cyber_Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04083180\/file\/Exploring_the_Quantitative_Resilience_Analysis_of_Cyber_Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04083180v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mario Fern\u00e1ndez-T\u00e1rraga, Alejandro David Cayuela-Tudela, Pantaleone Nespoli, Joaquin Garcia\u2010alfaro, F\u00e9lix G\u00f3mez M\u00e1rmol. Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. <i>VIII National Conference on Cybersecurity Research (JNIC)<\/i>, Universidad de la Rioja, Jun 2023, Vigo, Espa\u00f1a. pp.469--476. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04198177v1\">&#x27E8;hal-04198177&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04198177\/file\/preprint_jnic-B.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04198177\/file\/preprint_jnic-B.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04198177\/file\/preprint_jnic-B.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04198177v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Sandrine Bayle. Gestion des menaces biologiques et technologiques pour la s\u00e9curit\u00e9 urbaine (Projet H2020 IMPETUS). <i>Colloque IMT 2023 : \u00ab S\u00e9curit\u00e9 et R\u00e9silience \u00bb<\/i>, Apr 2023, Palaiseau, France. <a target=\"_blank\" href=\"https:\/\/imt-mines-ales.hal.science\/hal-04098069v1\">&#x27E8;hal-04098069&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/imt-mines-ales.hal.science\/hal-04098069v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Grimaldi, Julien Ribiollet, Pantaleone Nespoli, Joaquin Garcia\u2010alfaro. Toward next-generation cyber range: a comparative study of\u00a0training platforms. <i>28th European Symposium on Research in Computer Security (ESORICS 2023)<\/i>, Sep 2023, The Hague, Netherlands. pp.271-290, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-54129-2_16\">&#x27E8;10.1007\/978-3-031-54129-2_16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913448v1\">&#x27E8;hal-04913448&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913448\/file\/SecAssure.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913448\/file\/SecAssure.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913448\/file\/SecAssure.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913448v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pablo Mart\u00ednez-Sanchez, Pantaleone Nespoli, Joaquin Garcia\u2010alfaro, F\u00e9lix G\u00f3mez M\u00e1rmol. Metodolog\u00eda para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. <i>2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023<\/i>, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04198175v1\">&#x27E8;hal-04198175&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04198175\/file\/preprint_jnic-A.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04198175\/file\/preprint_jnic-A.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04198175\/file\/preprint_jnic-A.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04198175v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">K\u00e9ren Saint-Hilaire, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens, Joaquin Garcia\u2010alfaro. Automated enrichment of\u00a0logical attack graphs via\u00a0formal ontologies. <i>ICT Systems Security and Privacy Protection (SEC)<\/i>, Jun 2023, Poznan, Poland. pp.59-72, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-56326-3_5\">&#x27E8;10.1007\/978-3-031-56326-3_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04563448v1\">&#x27E8;hal-04563448&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04563448\/file\/548810_1_En_5_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf_embargo.png\" border=\"0\" title=\"Le fichier est sous embargo jusqu'au 2027-01-01\" \/>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04563448v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pablo Mart\u00ednez S\u00e1nchez, Pantaleone Nespoli, Joaqu\u00edn Garc\u00eda Alfaro, F\u00e9lix G\u00f3mez M\u00e1rmol. Methodology for automating attacking agents in cyber range training platforms. <i>35th Norwegian ICT Conference for Research and Education(NIKT)<\/i>, University of Stavanger, Nov 2023, Stavanger, Norway. pp.90-109, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-55829-0_6\">&#x27E8;10.1007\/978-3-031-55829-0_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913438v1\">&#x27E8;hal-04913438&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913438\/file\/preprint_sunriseB.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913438\/file\/preprint_sunriseB.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913438\/file\/preprint_sunriseB.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913438v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia\u2010alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA. <i>2022 IEEE Latin-American Conference on Communications (LATINCOM)<\/i>, Nov 2022, Rio de Janeiro, Brazil. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LATINCOM56090.2022.10000584\">&#x27E8;10.1109\/LATINCOM56090.2022.10000584&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04006345v1\">&#x27E8;hal-04006345&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04006345\/file\/preprint-latincom.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04006345\/file\/preprint-latincom.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04006345\/file\/preprint-latincom.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04006345v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro, Christian L\u00fcbben, Marc-Oliver Pahl, W\u00fcstrich Lars. Resilience via blackbox self-piloting plants. <i>ECW 2022: European Cyber Week<\/i>, P\u00f4le d\u2019Excellence Cyber, Nov 2022, Rennes, France. pp.35-46. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04006320v1\">&#x27E8;hal-04006320&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04006320\/file\/preprint-cessar2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04006320\/file\/preprint-cessar2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04006320\/file\/preprint-cessar2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04006320v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sandrine Bayle, Joaquin Garcia\u2010alfaro. Plateforme de s\u00e9curisation des villes: le projet europ\u00e9en IMPETUS. <i>Colloque IMT - Gestion de crise et num\u00e9rique : nouvelles menaces et nouvelles solutions<\/i>, Mar 2022, Palaiseau, France. <a target=\"_blank\" href=\"https:\/\/hal-emse.ccsd.cnrs.fr\/emse-03624167v1\">&#x27E8;emse-03624167&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal-emse.ccsd.cnrs.fr\/emse-03624167v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. Switched-based control testbed to assure cyber-physical resilience by design. <i>SECRYPT 2022 : 19th International Conference on Security and Cryptography<\/i>, Jul 2022, Lisbon, Portugal. pp.681-686, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011327300003283\">&#x27E8;10.5220\/0011327300003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843016v1\">&#x27E8;hal-03843016&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03843016v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">S. Seng, Joaquin Garcia\u2010alfaro, Y. Laarouci. Implementation of a stateful network protocol intrusion detection systems. <i>SECRYPT 2022 : 19th International Conference on Security and Cryptography<\/i>, Jul 2022, Lisbon, Portugal. pp.398-405, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011327400003283\">&#x27E8;10.5220\/0011327400003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843013v1\">&#x27E8;hal-03843013&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03843013\/file\/secrypt2022b-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03843013\/file\/secrypt2022b-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03843013\/file\/secrypt2022b-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03843013v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis, Tao Wan. Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks. <i>MEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking<\/i>, Sep 2021, Athens, Greece. pp.479-484, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MeditCom49071.2021.9647674\">&#x27E8;10.1109\/MeditCom49071.2021.9647674&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628454v1\">&#x27E8;hal-03628454&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628454\/file\/pre-print-meditcom2021.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628454\/file\/pre-print-meditcom2021.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628454\/file\/pre-print-meditcom2021.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628454v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis. Risky zone avoidance strategies for drones. <i>CCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering<\/i>, Sep 2021, Online, France. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCECE53047.2021.9569172\">&#x27E8;10.1109\/CCECE53047.2021.9569172&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628452v1\">&#x27E8;hal-03628452&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628452\/file\/preprint-ccece2021.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628452\/file\/preprint-ccece2021.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628452\/file\/preprint-ccece2021.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628452v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">K\u00e9ren Saint-Hilaire, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens, Joaquin Garcia\u2010alfaro. Ontology-based attack graph enrichment. <i>TIEMS 2021: 28th International Emergency Management Society annual conference<\/i>, Dec 2021, Online, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628443v1\">&#x27E8;hal-03628443&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628443\/file\/preprint-tiems2021a.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628443\/file\/preprint-tiems2021a.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628443\/file\/preprint-tiems2021a.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628443v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia\u2010alfaro, Evangelos Kranakis. Geocaching-inspired navigation for micro aerial vehicles with fallible place recognition. <i>ADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless<\/i>, Oct 2020, Bari (online), Italy. pp.55-70, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-61746-2_5\">&#x27E8;10.1007\/978-3-030-61746-2_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125760v1\">&#x27E8;hal-03125760&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125760v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Capacity requirements in networks of quantum repeaters and terminals. <i>QCE 2020: IEEE International Conference on Quantum Computing and Engineering<\/i>, Oct 2020, Denver (online), United States. pp.148-157, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QCE49297.2020.00028\">&#x27E8;10.1109\/QCE49297.2020.00028&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125753v1\">&#x27E8;hal-03125753&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125753v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Frederic Cuppens, Nora Cuppens, Dagnas, Romain, Joaquin Garcia\u2010alfaro. Metrics to enhance the resilience of cyber-physical systems. <i>TRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Dec 2020, Guangzhou (online), China. pp.1167-1172, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom50675.2020.00156\">&#x27E8;10.1109\/TrustCom50675.2020.00156&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125741v1\">&#x27E8;hal-03125741&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03125741\/file\/Metrics_to_Enhance_the_Resilience_of_Cyber-Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03125741\/file\/Metrics_to_Enhance_the_Resilience_of_Cyber-Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03125741\/file\/Metrics_to_Enhance_the_Resilience_of_Cyber-Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03125741v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omair Faraj, David Megias, Abdel-Mehsen Ahmad, Joaquin Garcia\u2010alfaro. Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. <i>ARES 2020: 15th international conference on Availability, Reliability and Security<\/i>, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3407023.3407048\">&#x27E8;10.1145\/3407023.3407048&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125767v1\">&#x27E8;hal-03125767&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125767v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cristina P\u00e9rez-Sol\u00e0, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Joaquin Garcia\u2010alfaro. LockDown: balance availability attack against lightning network channels. <i>FC 2020: 24th international conference on Financial Cryptography and Data Security<\/i>, Feb 2020, Sabah, Malaysia. pp.245-263, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-51280-4_14\">&#x27E8;10.1007\/978-3-030-51280-4_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125777v1\">&#x27E8;hal-03125777&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125777v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. <i>International Symposium on Network Computing and Applications<\/i>, Nov 2020, Cambridge, MA (online), United States. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA51143.2020.9306741\">&#x27E8;10.1109\/NCA51143.2020.9306741&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03115317v1\">&#x27E8;hal-03115317&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03115317v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Neetu Sharma, Rajeev Anand-Sahu, Vishal Saraswat, Joaquin Garcia\u2010alfaro. Anonymous proof-of-asset transactions using designated blind signatures. <i>FPS 2020: 13th International Symposium on Foundations & Practice of Security<\/i>, Dec 2020, Montreal, Canada. pp.137-146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-70881-8_9\">&#x27E8;10.1007\/978-3-030-70881-8_9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125748v1\">&#x27E8;hal-03125748&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03125748\/file\/2009.13978.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03125748\/file\/2009.13978.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03125748\/file\/2009.13978.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03125748v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Geocaching-inspired resilient path planning for drone swarms. <i>MISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking<\/i>, Apr 2019, Paris, France. pp.620 - 625, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/INFCOMW.2019.8845318\">&#x27E8;10.1109\/INFCOMW.2019.8845318&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02127604v1\">&#x27E8;hal-02127604&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02127604\/file\/preprint-misarn2019.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02127604\/file\/preprint-misarn2019.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02127604\/file\/preprint-misarn2019.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02127604v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia-Alfaro. Faking and discriminating the navigation data of a micro aerial vehicle using quantum generative adversarial networks. <i>GLOBECOM 2019: IEEE Global Communications Workshops<\/i>, Dec 2019, Waikoloa, United States. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/GCWkshps45667.2019.9024550\">&#x27E8;10.1109\/GCWkshps45667.2019.9024550&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125799v1\">&#x27E8;hal-03125799&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125799v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos. Quality amplification of error prone navigation for swarms of micro aerial vehicles. <i>GLOBECOM 2019: IEEE Global Communications workshops<\/i>, Dec 2019, Waikoloa, United States. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/GCWkshps45667.2019.9024394\">&#x27E8;10.1109\/GCWkshps45667.2019.9024394&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125798v1\">&#x27E8;hal-03125798&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125798v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina P\u00e9rez-Sol\u00e0, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. <i>ASIACCS 2019: 14th ASIA Conference on Computer and Communications Security<\/i>, Jul 2019, Auckland, New Zealand. pp.602-612, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3321705.3329812\">&#x27E8;10.1145\/3321705.3329812&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02390275v1\">&#x27E8;hal-02390275&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02390275v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. <i>CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems<\/i>, Sep 2019, Luxembourg, Luxembourg. pp.19-34, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-42048-2_2\">&#x27E8;10.1007\/978-3-030-42048-2_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02434486v1\">&#x27E8;hal-02434486&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02434486v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vicen\u00e7 Torra, Joaquin Garcia-Alfaro. Towards an adaptive defuzzification: using numerical Choquet integral. <i>MDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence<\/i>, Sep 2019, Milan, Italy. pp.113-125, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-26773-5_11\">&#x27E8;10.1007\/978-3-030-26773-5_11&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02393562v1\">&#x27E8;hal-02393562&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02393562v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassem, Evangelos Kranakis, et al.. Low frequency mobile communications in underwater networks. <i>ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless<\/i>, Sep 2018, Saint Malo, France. pp.239 - 251, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-00247-3_22\">&#x27E8;10.1007\/978-3-030-00247-3_22&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013548v1\">&#x27E8;hal-02013548&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013548v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A pyramidal-based model to compute the impact of cyber security events. <i>ARES 2018 : 13th International Conference on Availability, Reliability and Security<\/i>, Aug 2018, Hamburg, Germany. pp.Article n\u00b0 19 -, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3230833.3230847\">&#x27E8;10.1145\/3230833.3230847&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01885053v1\">&#x27E8;hal-01885053&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01885053v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications. <i>GRCON 2018: 8th Annual GNU Radio Conference<\/i>, Sep 2018, Henderson, United States. pp.1 - 8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013656v1\">&#x27E8;hal-02013656&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013656v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. GNU radio blocks for long-lasting frames in mobile underwater acoustic communications. <i>French GNU Radio days 2018<\/i>, Jul 2018, Lyon, France. pp.1 - 2. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013632v1\">&#x27E8;hal-02013632&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013632v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. <i>DPM 2018: 13th International Workshop on Data Privacy Management<\/i>, Sep 2018, Barcelona, Spain. pp.431 - 440, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-00305-0_31\">&#x27E8;10.1007\/978-3-030-00305-0_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991849v1\">&#x27E8;hal-01991849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01991849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. <i>FPS 2018: 11th International Symposium on Foundations & Practice of Security<\/i>, Nov 2018, Montreal, Canada. pp.257 - 264, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-18419-3_17\">&#x27E8;10.1007\/978-3-030-18419-3_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02014254v1\">&#x27E8;hal-02014254&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02014254v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassen, Evangelos Kranakis, et al.. Doppler effect in the underwater acoustic ultra low frequency band. <i>ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks<\/i>, Sep 2017, Niagara Falls, Canada. pp.3 - 12, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-74439-1_1\">&#x27E8;10.1007\/978-3-319-74439-1_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699512v1\">&#x27E8;hal-01699512&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699512\/file\/18679.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699512\/file\/18679.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699512\/file\/18679.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699512v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Steven Porretta. The sound of communication in underwater acoustic sensor networks. <i>ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks<\/i>, Sep 2017, Niagara Falls, Canada. pp.13 - 23, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-74439-1_2\">&#x27E8;10.1007\/978-3-319-74439-1_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699521v1\">&#x27E8;hal-01699521&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699521\/file\/18680.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699521\/file\/18680.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699521\/file\/18680.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699521v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack graph-based countermeasure selection using a stateful return on investment metric. <i>FPS 2017: 10th International Symposium on Foundations and Practice of Security<\/i>, Oct 2017, Nancy, France. pp.293 - 302, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-75650-9_19\">&#x27E8;10.1007\/978-3-319-75650-9_19&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01740860v1\">&#x27E8;hal-01740860&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01740860v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Gonzalez-Granadillo, Jos\u00e9 Rubio-Hern\u00e1n, Joaquin Garcia\u2010alfaro. Towards a security event data taxonomy. <i>International Conference on Risks and Security of Internet and Systems (CRISIS)<\/i>, Sep 2017, Dinard, France. pp.29-45, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-76687-4_3\">&#x27E8;10.1007\/978-3-319-76687-4_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04308618v1\">&#x27E8;hal-04308618&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04308618v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. pp.239 - 256, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67816-0_14\">&#x27E8;10.1007\/978-3-319-67816-0_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593430v1\">&#x27E8;hal-01593430&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593430v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01702450v1\">&#x27E8;hal-01702450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01702450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. <i>NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems<\/i>, Nov 2017, Tartu, Estonia. pp.70 - 85, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-70290-2_5\">&#x27E8;10.1007\/978-3-319-70290-2_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699347v1\">&#x27E8;hal-01699347&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699347v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana Durcheva, et al.. Security challenges in e-assessment and technical solutions. <i>IV 2017 : 21st International Conference on Information Visualization<\/i>, Jul 2017, Londres, United Kingdom. pp.366 - 371, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/iV.2017.70\">&#x27E8;10.1109\/iV.2017.70&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699388v1\">&#x27E8;hal-01699388&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699388v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Steven Porretta, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Learning to communicate underwater: an exploration of limited mobility agents. <i>WUWNET 2017 :12th International Conference on Underwater Networks & Systems<\/i>, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3148675.3148709\">&#x27E8;10.1145\/3148675.3148709&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01740876v1\">&#x27E8;hal-01740876&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01740876v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam-Mann, Noel Crespi, Joaquin Garcia-Alfaro, et al.. CACEV: a Cost and CArbon Emission-Efficient Virtual machine placement method for green distributed clouds. <i>SCC 2016 : 13th IEEE International Conference on Services Computing <\/i>, Jun 2016, San Francisco, United States. pp.275 - 282, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SCC.2016.43\">&#x27E8;10.1109\/SCC.2016.43&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01359868v1\">&#x27E8;hal-01359868&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01359868v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Selection of mitigation actions based on financial and operational impact assessments. <i>ARES 2016 : 11th International Conference on Availability, Reliability and Security<\/i>, Aug 2016, Salzburg, Austria. pp.137 - 146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2016.3\">&#x27E8;10.1109\/ARES.2016.3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450193v1\">&#x27E8;hal-01450193&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450193v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. <i>NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems<\/i>, Nov 2016, Oulu, Finland. pp.37 - 53, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_3\">&#x27E8;10.1007\/978-3-319-47560-8_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450282v1\">&#x27E8;hal-01450282&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450282v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. An n-sided polygonal model to calculate the impact of cyber security events. <i>CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems<\/i>, Sep 2016, Roscoff, France. pp.87 - 102, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-54876-0_7\">&#x27E8;10.1007\/978-3-319-54876-0_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01487752v1\">&#x27E8;hal-01487752&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01487752v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. <i>TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Aug 2016, Tianjin, China. pp.340 - 348, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2016.0082\">&#x27E8;10.1109\/TrustCom.2016.0082&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01468032v1\">&#x27E8;hal-01468032&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01468032v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of cyber-physical systems : from theory to testbeds and validation. <i>CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems<\/i>, Sep 2016, Heraklion, Greece. pp.3 - 18, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-61437-3_1\">&#x27E8;10.1007\/978-3-319-61437-3_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01543262v1\">&#x27E8;hal-01543262&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01543262v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a watermark-based detection scheme to handle cyber-physical attacks. <i>11th International Conference on Availability, Reliability and Security (ARES 2016)<\/i>, Aug 2016, Salzbourg, Austria. pp.21 - 28, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2016.2\">&#x27E8;10.1109\/ARES.2016.2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01449821v1\">&#x27E8;hal-01449821&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01449821v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered watermarking control to handle cyber-physical integrity attacks. <i>NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems<\/i>, Nov 2016, Oulu, Finland. pp.3 - 19, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_1\">&#x27E8;10.1007\/978-3-319-47560-8_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450276v1\">&#x27E8;hal-01450276&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450276v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ehsan Ahvar, Shohreh Ahvar, Noel Crespi, Joaquin Garcia-Alfaro, Zoltan Adam-Mann. NACER : a network-aware cost-efficient resource allocation method for processing-intensive tasks in distributed clouds. <i>NCA 2015 : 14th International Symposium on Network Computing and Applications<\/i>, Nov 2015, Cambridge, Ma, United States. pp.90 - 97, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2015.37\">&#x27E8;10.1109\/NCA.2015.37&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263401v1\">&#x27E8;hal-01263401&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263401v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro, Bita Hasannezhad, et al.. Simulation of underwater communications with a colored noise approximation and mobility. <i>CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering<\/i>, May 2015, Halifax, Canada. pp.1532 - 1537, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCECE.2015.7129508\">&#x27E8;10.1109\/CCECE.2015.7129508&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263406v1\">&#x27E8;hal-01263406&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263406\/file\/preprint-ccece-sim.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263406\/file\/preprint-ccece-sim.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263406\/file\/preprint-ccece-sim.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263406v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Stephane Blouin, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Location-free link state routing for underwater acoustic sensor networks. <i>CCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering<\/i>, May 2015, Halifax, Canada. pp.1544 - 1549, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCECE.2015.7129510\">&#x27E8;10.1109\/CCECE.2015.7129510&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263407v1\">&#x27E8;hal-01263407&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263407\/file\/preprint-ccece-routing.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263407\/file\/preprint-ccece-routing.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263407\/file\/preprint-ccece-routing.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263407v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Malek Belhaouane, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. On the isofunctionality of network access control lists. <i>ARES 2015: 10th International Conference on Availability, Reliability and Security<\/i>, Aug 2015, Toulouse, France. pp.168 - 173, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2015.78\">&#x27E8;10.1109\/ARES.2015.78&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332029v1\">&#x27E8;hal-01332029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332029v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Malek Belhaouane, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. <i>SECRYPT 2015 : 12th International Conference on Security and Cryptography<\/i>, Jul 2015, Colmar, France. pp.53 - 64, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005544100530064\">&#x27E8;10.5220\/0005544100530064&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332331v1\">&#x27E8;hal-01332331&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332331v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. <i>11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015)<\/i>, Oct 2015, Dallas, TX, United States. pp.538-555, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-28865-9_29\">&#x27E8;10.1007\/978-3-319-28865-9_29&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332277v1\">&#x27E8;hal-01332277&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332277v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. <i>NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security<\/i>, Jul 2015, Paris, France. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2015.7266480\">&#x27E8;10.1109\/NTMS.2015.7266480&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263402v2\">&#x27E8;hal-01263402v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263402v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. <i> 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection<\/i>, May 2015, Hamburg, Germany. pp.252 - 266, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-18467-8_17\">&#x27E8;10.1007\/978-3-319-18467-8_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255089v1\">&#x27E8;hal-01255089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01255089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Salvador Mart\u00ednez, Joaquin Garcia-Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Jordi Cabot. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. <i>30th IFIP International Information Security Conference (SEC)<\/i>, May 2015, Hamburg, Germany. pp.218-233, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-18467-8_15\">&#x27E8;10.1007\/978-3-319-18467-8_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01152528v1\">&#x27E8;hal-01152528&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01152528\/file\/SEC2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01152528\/file\/SEC2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01152528\/file\/SEC2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01152528v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model. <i>ICC 2014 : IEEE International Conference on Communications<\/i>, Jun 2014, Sidney, Australia. pp.1590 - 1595, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICC.2014.6883549\">&#x27E8;10.1109\/ICC.2014.6883549&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264809v1\">&#x27E8;hal-01264809&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01264809\/file\/preprint-ICC14.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01264809\/file\/preprint-ICC14.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01264809\/file\/preprint-ICC14.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01264809v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. The bidirectional algorithm for channel selection using a two-radio model. <i>VTC Fall 2014 : IEEE 80th Vehicular Technology Conference<\/i>, Sep 2014, Vancouver, Canada. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/VTCFall.2014.6966200\">&#x27E8;10.1109\/VTCFall.2014.6966200&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264783v1\">&#x27E8;hal-01264783&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01264783\/file\/preprint_vtc2014.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01264783\/file\/preprint_vtc2014.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01264783\/file\/preprint_vtc2014.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01264783v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks. <i>ADHOC-NOW 2014 : 13th International Conference on Ad-Hoc Networks and Wireless <\/i>, Jun 2014, Benidorm, Spain. pp.197 - 208, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-07425-2_15\">&#x27E8;10.1007\/978-3-319-07425-2_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264803v1\">&#x27E8;hal-01264803&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01264803\/file\/preprint_adhocnow14.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01264803\/file\/preprint_adhocnow14.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01264803\/file\/preprint_adhocnow14.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01264803v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Cristina Romero-Tris, Jose Rubio-Hernan. Simulaciones software para el estudio de amenazas contra sistemas SCADA. <i>RECSI 2014 : XIII Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n<\/i>, Sep 2014, Alicante, Espa\u00f1a. pp.151 - 156. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264800v1\">&#x27E8;hal-01264800&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01264800v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. <i>BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security<\/i>, Sep 2014, Wroclaw, Poland. pp.30 - 39, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BADGERS.2014.10\">&#x27E8;10.1109\/BADGERS.2014.10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332339v1\">&#x27E8;hal-01332339&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332339v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. <i>Digital trust : 1st Symposium on Digital Trust in Auvergne<\/i>, Dec 2014, Clermont-Ferrand, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01281994v1\">&#x27E8;hal-01281994&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01281994v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Benjamin Justus, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. <i>SERE-C 2014 : IEEE 8th International Conference on Software Security and Reliability<\/i>, Jun 2014, San Francisco, United States. pp.113 - 120, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SERE-C.2014.29\">&#x27E8;10.1109\/SERE-C.2014.29&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01073179v1\">&#x27E8;hal-01073179&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01073179v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. A new analytic model for the cognitive radio jump-stay algorithm. <i>WD 2013 : IFIP Wireless Days<\/i>, Nov 2013, Valencia, Spain. pp.1 - 3, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WD.2013.6686443\">&#x27E8;10.1109\/WD.2013.6686443&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01260581v1\">&#x27E8;hal-01260581&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01260581\/file\/preprint_WDCR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01260581\/file\/preprint_WDCR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01260581\/file\/preprint_WDCR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01260581v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. QoS and security in Link State Routing protocols for MANETs. <i>WD 2013 : IFIP Wireless Days<\/i>, Nov 2013, Valencia, Spain. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WD.2013.6686442\">&#x27E8;10.1109\/WD.2013.6686442&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01260585v1\">&#x27E8;hal-01260585&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01260585\/file\/preprint_WDQOLSR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01260585\/file\/preprint_WDQOLSR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01260585\/file\/preprint_WDQOLSR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01260585v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nabil Hachem, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. <i>NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems<\/i>, Oct 2013, Ilulissat, Greenland. pp.297 - 312, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-41488-6_20\">&#x27E8;10.1007\/978-3-642-41488-6_20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01269681v1\">&#x27E8;hal-01269681&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01269681v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Salvador Martinez Perez, Garc\u00eda-Alfaro Joaquin, Cuppens Fr\u00e9d\u00e9ric, Nora Cuppens-Boulahia, Jordi Cabot. Model-Driven Extraction and Analysis of Network Security Policies. <i>Model-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013<\/i>, Sep 2013, Miami, United States. pp.52-68. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00869319v1\">&#x27E8;hal-00869319&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-00869319v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Salvador Martinez Perez, Garc\u00eda-Alfaro Joaquin, Cuppens Fr\u00e9d\u00e9ric, Nora Cuppens-Boulahia, Jordi Cabot. Towards an Access-Control Metamodel for Web Content Management Systems. <i>ICWE 2013: the International Conference on Web Engineering - MDWE 2013: Model-Driven Web Engineering<\/i>, Jul 2013, Aalborg, Denmark. pp 148-155. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00869324v1\">&#x27E8;hal-00869324&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-00869324v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Real-time malicious fast-flux detection using DNS and bot related features. <i>PST 2013 : 11th International Conference on Privacy, Security and Trust<\/i>, Jul 2013, Tarragona, Spain. pp.369 - 372, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PST.2013.6596093\">&#x27E8;10.1109\/PST.2013.6596093&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275014v1\">&#x27E8;hal-01275014&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275014v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos Dellas, Joaquin Garcia-Alfaro, et al.. Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. <i>FPS 2013 : the sixth international symposium on foundations & practice of security<\/i>, Oct 2013, La Rochelle, France. pp.209 - 226, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-05302-8_13\">&#x27E8;10.1007\/978-3-319-05302-8_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01161938v1\">&#x27E8;hal-01161938&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01161938v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks. <i>MEDES 2013 : 5th ACM Conference on Management of Emergent Digital EcoSystems <\/i>, Oct 2013, Neum\u00fcnster Abbey, Luxembourg. pp.60 - 67. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00944940v1\">&#x27E8;hal-00944940&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00944940v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Privacy-enhanced Filtering and Collection Middleware in EPCglobal Networks. <i>CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems<\/i>, Oct 2013, La Rochelle, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00944945v1\">&#x27E8;hal-00944945&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00944945v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ahmad Samer Wazan, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. <i>TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Jul 2013, Melbourne, Australia. pp.421 - 430, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2013.53\">&#x27E8;10.1109\/TrustCom.2013.53&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275020v1\">&#x27E8;hal-01275020&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275020v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz, St\u00e9phane Morucci, et al.. Detection des anomalies dans les pare-feux de nouvelles generations. <i>SAR-SII 2012 : 7th Conference on Network and Information Systems Security<\/i>, May 2012, Cabourg, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01865228v1\">&#x27E8;hal-01865228&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01865228\/file\/sarssi2012-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01865228\/file\/sarssi2012-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01865228\/file\/sarssi2012-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01865228v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz, Xavier Rimasson. Handling Stateful Firewall Anomalies. <i>27th Information Security and Privacy Conference (SEC)<\/i>, Jun 2012, Heraklion, Greece. pp.174-186, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-30436-1_15\">&#x27E8;10.1007\/978-3-642-30436-1_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00737170v1\">&#x27E8;hal-00737170&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00737170\/file\/sec12-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00737170\/file\/sec12-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00737170\/file\/sec12-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00737170v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Safaa Hachana, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Joaquin Garcia Alfaro. Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. <i>ARES 2012 : 7th International Conference on Availability, Reliability and Security<\/i>, Aug 2012, Prague, Czech Republic. pp.123 - 132, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2012.61\">&#x27E8;10.1109\/ARES.2012.61&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01213900v1\">&#x27E8;hal-01213900&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01213900v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nabil Hachem, Herv\u00e9 Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. <i>IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference<\/i>, Dec 2012, Austin, United States. pp.171-180, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PCCC.2012.6407750\">&#x27E8;10.1109\/PCCC.2012.6407750&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00813393v1\">&#x27E8;hal-00813393&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00813393v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Salvador Mart\u00ednez, Garc\u00eda-Alfaro Joaquin, Cuppens Fr\u00e9d\u00e9ric, Nora Cuppens-Boulahia, Jordi Cabot. A model-driven approach for the extraction of network access-control policies. <i>Model-Driven Security Workshop<\/i>, Nora Koch, Alexander Knapp, Geri Georg, Marina Egea, Benoit Baudry, Oct 2012, Innsbruck, Austria. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00734230v1\">&#x27E8;hal-00734230&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-00734230v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Mitigation of flooding disruption attacks in hierarchical OLSR networks. <i>CNSR 2011: 9th Annual Communication Networks and Services Research Conference<\/i>, May 2011, Ottawa, Canada. pp.167-174, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CNSR.2011.32\">&#x27E8;10.1109\/CNSR.2011.32&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623195v1\">&#x27E8;hal-00623195&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00623195\/file\/cnsr2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00623195\/file\/cnsr2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00623195\/file\/cnsr2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00623195v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags. <i>IECON 2011: 37th Annual Conference of the IEEE Industrial Electronics Society<\/i>, Nov 2011, Melbourne, Australia. pp.3820 - 3825, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IECON.2011.6119932\">&#x27E8;10.1109\/IECON.2011.6119932&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00725612v1\">&#x27E8;hal-00725612&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00725612v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress. <i>FPS 2011: 4th Canada-France MITACS Workshop on Foundations & Practice of Security<\/i>, May 2011, Paris, France. pp.242-252. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00668166v1\">&#x27E8;hal-00668166&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00668166v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia Alfaro, Evangelos Kranakis. Mitigation of topology control traffic attacks in OLSR networks. <i>5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010)<\/i>, Oct 2010, Montr\u00e9al, Canada. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CRISIS.2010.5764920\">&#x27E8;10.1109\/CRISIS.2010.5764920&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623629v1\">&#x27E8;hal-00623629&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00623629\/file\/crisis2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00623629\/file\/crisis2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00623629\/file\/crisis2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00623629v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Jordi Herrera Joancomarti, Joan Melia Segui. A multiple-polynomial LFSR based pseudorandom number generator design for EPC gen2 systems. <i>Mitacs Workshop on Network Security & Cryptography<\/i>, Jun 2010, Toronto, Canada. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00527573v1\">&#x27E8;hal-00527573&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00527573v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Stere Preda. MIRAGE: a management tool for the analysis and deployment of network security policies. <i>3rd SETOP International Workshop on Autonomous and Spontaneous Security (Co-located with ESORICS 2010)<\/i>, Sep 2010, Athens, Greece. pp.203-215, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-19348-4_15\">&#x27E8;10.1007\/978-3-642-19348-4_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623634v1\">&#x27E8;hal-00623634&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00623634\/file\/setop2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00623634\/file\/setop2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00623634\/file\/setop2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00623634v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joan Melia Segui, Joaquin Garcia Alfaro, Jordi Herrera Joancomarti. Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags. <i>FC 2010 Workshops and 14th Financial Cryptograpy and Data Security International Conference<\/i>, Jan 2010, T\u00e9n\u00e9n\u00e9rife, Spain. pp.34-56. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00527593v1\">&#x27E8;hal-00527593&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00527593v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro, Laurent Toutain. Model-driven security policy deployment: property oriented approach. <i>ESSos 2010 : second International symposium on Engineering Secure Software and Systems<\/i>, Feb 2010, Pise, Italy. pp.123-139, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-11747-3_10\">&#x27E8;10.1007\/978-3-642-11747-3_10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540842v1\">&#x27E8;hal-00540842&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00540842\/file\/essos2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00540842\/file\/essos2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00540842\/file\/essos2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00540842v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens. Securing the communications of home health care systems based on RFID Sensor networks. <i>Conference on Communications Networks and Services Research<\/i>, May 2010, Montr\u00e9al, Canada. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00484511v1\">&#x27E8;hal-00484511&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00484511v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens. S\u00e9curiser les communications dans les syst\u00e8mes de surveillance m\u00e9dicale - Protocoles appliqu\u00e9s aux \u00e9tiquettes \u00e0 faible co\u00fbt. <i>INFORSID 2010 : XXIIIe congr\u00e8s INFORSID<\/i>, May 2010, Marseille, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00565842v1\">&#x27E8;hal-00565842&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00565842v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wiem Tounsi, Joaquin Garcia Alfaro, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens. Protocoles d'\u00e9change de cl\u00e9s pour des syst\u00e8mes de surveillance \u00e0 base de radio-\u00e9tiquettes. <i>5th Conference on Network Architectures and Information Systems<\/i>, May 2010, Rocquebrune Cap-Martin, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00609294v1\">&#x27E8;hal-00609294&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00609294\/file\/sarssi_short_v4.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00609294\/file\/sarssi_short_v4.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00609294\/file\/sarssi_short_v4.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00609294v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sergio Castillo-Perez, Joaquin Garcia\u2010alfaro. Evaluation of Two Privacy-Preserving Protocols for the DNS. <i>2009 Sixth International Conference on Information Technology: New Generations<\/i>, Apr 2009, Las Vegas, United States. pp.411-416, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ITNG.2009.195\">&#x27E8;10.1109\/ITNG.2009.195&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628760v1\">&#x27E8;hal-03628760&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628760v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sergio Castillo-Perez, Joaquin Garcia Alfaro. Spyware-based menaces against web applications. <i>International Conference on Intelligent Networking and Collaborative Systems<\/i>, Nov 2009, Barcelone, Spain. pp.409-412, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/INCOS.2009.31\">&#x27E8;10.1109\/INCOS.2009.31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00527605v1\">&#x27E8;hal-00527605&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00527605\/file\/SCP2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00527605\/file\/SCP2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00527605\/file\/SCP2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00527605v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Security threat mitigation trends in low-cost RFID systems. <i>DPM-SETOP 2009 : 4th International Workshop on Data Privacy Management and Second International Workshop on Autonomous and Spontaneous Security<\/i>, Sep 2009, Saint Malo, France. pp.193-207. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540876v1\">&#x27E8;hal-00540876&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00540876\/file\/setop09.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00540876\/file\/setop09.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00540876\/file\/setop09.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00540876v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, M. Barbeau, E. Kranakis. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. <i>2009 Seventh Annual Communication Networks and Services Research Conference (CNSR)<\/i>, May 2009, Moncton, Canada. pp.86-93, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CNSR.2009.23\">&#x27E8;10.1109\/CNSR.2009.23&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628765v1\">&#x27E8;hal-03628765&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628765v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Guillermo Navarro-Arribas, Joaquin Garcia\u2010alfaro. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. <i>24th IFIP TC-11 International Information Security Conference (IFIPsec2009)<\/i>, May 2009, Pafos, Cyprus. pp.164-175, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-01244-0_15\">&#x27E8;10.1007\/978-3-642-01244-0_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628762v1\">&#x27E8;hal-03628762&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628762v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. <i>ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security<\/i>, Mar 2009, Sydney, Australia. pp.251 - 261, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1533057.1533092\">&#x27E8;10.1145\/1533057.1533092&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02369624v1\">&#x27E8;hal-02369624&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02369624v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. A secured delegation of remote services on IPv6 home networks. <i>The 4th International Conference on Risks and Security of Internet and Systems<\/i>, Oct 2009, Toulouse, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02369611v1\">&#x27E8;hal-02369611&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02369611v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia\u2010alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. <i>the 4th International Symposium<\/i>, Mar 2009, Sydney, France. pp.251, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1533057.1533092\">&#x27E8;10.1145\/1533057.1533092&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628758v1\">&#x27E8;hal-03628758&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628758v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sergio Castillo-Perez, Joaquin Garcia\u2010alfaro. Anonymous Resolution of DNS Queries. <i>International Workshop on Information Security (IS'08), International OTM Conference<\/i>, Nov 2008, Monterrey, Mexico. pp.987-1000, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-88873-4_5\">&#x27E8;10.1007\/978-3-540-88873-4_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628757v1\">&#x27E8;hal-03628757&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628757v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Michel Barbeau, Evangelos Kranakis. Analysis of Threats to the Security of EPC Networks. <i>2008 6th Annual Communication Networks and Services Research Conference (CNSR)<\/i>, May 2008, Halifax, Canada. pp.67-74, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CNSR.2008.69\">&#x27E8;10.1109\/CNSR.2008.69&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628754v1\">&#x27E8;hal-03628754&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628754v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, M. Jaeger, G. Muhl, I. Barrera, J. Borrell. Distributed Exchange of Alerts for the Detection of Coordinated Attacks. <i>2008 6th Annual Communication Networks and Services Research Conference (CNSR '08)<\/i>, May 2008, Halifax, Canada. pp.96-103, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CNSR.2008.70\">&#x27E8;10.1109\/CNSR.2008.70&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628753v1\">&#x27E8;hal-03628753&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628753v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Michel Barbeau, Evangelos Kranakis. Security Threats on EPC Based RFID Systems. <i>2008 Fifth International Conference on Information Technology: New Generations (ITNG)<\/i>, Apr 2008, Las Vegas, United States. pp.1242-1244, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ITNG.2008.206\">&#x27E8;10.1109\/ITNG.2008.206&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628751v1\">&#x27E8;hal-03628751&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628751v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Michel Barbeau, Evangelos Kranakis. Evaluation of Anonymized ONS Queries. <i>Workshop on Security of Autonomous and Spontaneous Networks (SETOP 2008)<\/i>, Oct 2008, Loctudy, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628755v1\">&#x27E8;hal-03628755&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628755\/file\/setop08.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628755\/file\/setop08.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628755\/file\/setop08.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628755v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Frederic Cuppens, Nora Cuppens-Boulahia. Aggregating and Deploying Network Access Control Policies. <i>The Second International Conference on Availability, Reliability and Security (ARES'07)<\/i>, Apr 2007, Vienna, France. pp.532-542, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2007.34\">&#x27E8;10.1109\/ARES.2007.34&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628743v1\">&#x27E8;hal-03628743&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628743v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Guillermo Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. <i>2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007)<\/i>, Nov 2007, Vilamoura, Portugal. pp.1770-1784, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-76843-2_45\">&#x27E8;10.1007\/978-3-540-76843-2_45&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628749v1\">&#x27E8;hal-03628749&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628749v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Guillermo Navarro-Arribas. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. <i>IFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security<\/i>, Oct 2007, Malaga, Spain. pp.287-298, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-89173-4_24\">&#x27E8;10.1007\/978-3-540-89173-4_24&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628748v1\">&#x27E8;hal-03628748&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628748v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro, Laurent Toutain. Reliable process for security policy deployment. <i>SECRYPT 2007 : international conference on security and cryptography<\/i>, Jul 2007, Barcelone, Spain. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02368751v1\">&#x27E8;hal-02368751&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02368751v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia\u2010alfaro, Laurent Toutain. Reliable Process for Security Policy Deployment. <i>International Conference on Security and Cryptography<\/i>, Jul 2007, Barcelona, France. pp.5-15, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0002119200050015\">&#x27E8;10.5220\/0002119200050015&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628747v1\">&#x27E8;hal-03628747&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628747v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia\u2010alfaro. Detection of Network Security Component Misconfiguration by Rewriting and Correlation. <i>5th Conference on Security and Network Architectures (SAR-SSI2006)<\/i>, Jun 2006, Seignose, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628721v1\">&#x27E8;hal-03628721&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628721\/file\/sar06.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628721\/file\/sar06.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628721\/file\/sar06.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628721v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia. Towards filtering and alerting rule rewriting on single-component policies. <i>Proceedings of the 25th International Conference, SAFECOMP 2006<\/i>, Jun 2006, Gdansk, Poland. pp.182-194. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540448v1\">&#x27E8;hal-00540448&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00540448\/file\/safecomp06.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00540448\/file\/safecomp06.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00540448\/file\/safecomp06.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00540448v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia. Analysis of policy anomalies on distributed network security setups. <i>ESORICS 2006 : 11th European Symposium on Research in Computer Security<\/i>, Sep 2006, Hamburg, Germany. pp.496-511. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540450v1\">&#x27E8;hal-00540450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00540450\/file\/esorics06.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00540450\/file\/esorics06.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00540450\/file\/esorics06.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00540450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2005<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">J. Castella-Roca, G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia\u2010alfaro. Digital chips for an on-line casino. <i>International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II<\/i>, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ITCC.2005.130\">&#x27E8;10.1109\/ITCC.2005.130&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628687v1\">&#x27E8;hal-03628687&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628687v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia\u2010alfaro. Misconfiguration Management of Network Security Components. <i>7th International Symposium on System and Information Security (SSI 2005)<\/i>, Nov 2005, Sao Paolo, Brazil. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628705v1\">&#x27E8;hal-03628705&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/1912.07283\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/1912.07283\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628705v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia\u2010alfaro. Detection and Removal of Firewall Misconfiguration. <i>2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 )<\/i>, Nov 2005, Phoenix, United States. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628708v1\">&#x27E8;hal-03628708&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03628708\/file\/cnis05.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03628708\/file\/cnis05.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03628708\/file\/cnis05.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03628708v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fr\u00e9d\u00e9ric Cuppens, Fabien Autrel, Jordi Castella-Roca, Joan Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. <i>ITCC 2005 : IEEE international conference on information technology <\/i>, Apr 2005, Las Vegas, United States. pp.500 - 505, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ITCC.2005.232\">&#x27E8;10.1109\/ITCC.2005.232&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540862v1\">&#x27E8;hal-00540862&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00540862v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, S. Castillo, G. Navarro, J. Borrell. Mechanisms for attack protection on a prevention framework. <i>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology<\/i>, Oct 2005, Las Palmas, France. pp.137-140, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCST.2005.1594872\">&#x27E8;10.1109\/CCST.2005.1594872&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628695v1\">&#x27E8;hal-03628695&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628695v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, F. Cuppens, F. Autrel, J. Castella-Roca, J. Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. <i>International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II<\/i>, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ITCC.2005.232\">&#x27E8;10.1109\/ITCC.2005.232&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628680v1\">&#x27E8;hal-03628680&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628680v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, J. Borrell, M.A. Jaeger, G. Muhl. An alert communication infrastructure for a decentralized attack prevention framework. <i>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology<\/i>, Oct 2005, Las Palmas, France. pp.234-237, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCST.2005.1594878\">&#x27E8;10.1109\/CCST.2005.1594878&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628691v1\">&#x27E8;hal-03628691&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628691v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia\u2010alfaro, S. Robles. Secure agent-based management for pervasive environments. <i>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology<\/i>, Oct 2005, Las Palmas, France. pp.133-136, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCST.2005.1594864\">&#x27E8;10.1109\/CCST.2005.1594864&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628681v1\">&#x27E8;hal-03628681&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628681v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2004<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Fr\u00e9d\u00e9ric Cuppens, et al.. Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. <i>ICICS 2004: 6th International Conference on Informa- tion and Communications Security<\/i>, Oct 2004, Malaga, Spain. pp.223 - 235, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-30191-2_18\">&#x27E8;10.1007\/978-3-540-30191-2_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00540841v1\">&#x27E8;hal-00540841&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00540841\/file\/Garcia2004.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00540841\/file\/Garcia2004.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00540841\/file\/Garcia2004.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00540841v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Chapitre d'ouvrage<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marwan Lazrag, Christophe Kiennert, Joaquin Garcia\u2010alfaro. Quantifying the\u00a0impact propagation of\u00a0cyber attacks using business logic modeling. <i>Security and Privacy in Smart Environments<\/i>, 14800, Springer Nature Switzerland, pp.49-71, 2025, Lecture Notes in Computer Science, 978-3-031-66708-4. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-66708-4_3\">&#x27E8;10.1007\/978-3-031-66708-4_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913285v1\">&#x27E8;hal-04913285&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913285v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia\u2010alfaro, Reda Yaich. Methodological resilience assessment of smart cyber infrastructures. <i>Security and Privacy in Smart Environments. Lecture Notes in Computer Science<\/i>, 2024, 978-3-031-66707-7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04656303v1\">&#x27E8;hal-04656303&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04656303\/file\/Springer_Book_Chapter__Methodological_Assessment_of_Cyber_Resilience__ISX_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04656303\/file\/Springer_Book_Chapter__Methodological_Assessment_of_Cyber_Resilience__ISX_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04656303\/file\/Springer_Book_Chapter__Methodological_Assessment_of_Cyber_Resilience__ISX_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04656303v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. <i>Emerging Trends in Cybersecurity Applications<\/i>, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-09640-2_16\">&#x27E8;10.1007\/978-3-031-09640-2_16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03958379v1\">&#x27E8;hal-03958379&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03958379v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. <i>Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions<\/i>, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-29326-0_5\">&#x27E8;10.1007\/978-3-030-29326-0_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02393547v1\">&#x27E8;hal-02393547&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02393547v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Joan Melia-Segui. Security and privacy concerns about the RFID layer of EPC Gen2 networks. <i>Advanced research in data privacy<\/i>, 567, Springer international publishing, pp.303 - 324, 2014, Studies in Computational Intelligence 978-3-319-09884-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-09885-2_17\">&#x27E8;10.1007\/978-3-319-09885-2_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264797v1\">&#x27E8;hal-01264797&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01264797\/file\/preprint_ares-book-chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01264797\/file\/preprint_ares-book-chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01264797\/file\/preprint_ares-book-chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01264797v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Security issues in link state routing protocols for MANETs. <i>Advances in network analysis and its applications network security and cryptography<\/i>, Springer, pp.117-148, 2013, Mathematics in Industry, 978-3-642-30903-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-30904-5_6\">&#x27E8;10.1007\/978-3-642-30904-5_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00949321v1\">&#x27E8;hal-00949321&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00949321\/file\/preprint-ch69783.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00949321\/file\/preprint-ch69783.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00949321\/file\/preprint-ch69783.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00949321v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Michel Barbeau, Evangelos Kranakis. Handling security threats to the RFID system of EPC networks. <i>Security of Self-Organizing Networks: MANET, WSN, WMN, VANET<\/i>, Auerbach Publications, Taylor & Francis Group, pp.45-64, 2010. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00623632v1\">&#x27E8;hal-00623632&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00623632v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, F. Cuppens, N. Cuppens-Boulahia. Management of Exceptions on Access Control Policies. <i>New Approaches for Security, Privacy and Trust in Complex Environments<\/i>, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-0-387-72367-9_9\">&#x27E8;10.1007\/978-0-387-72367-9_9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628745v1\">&#x27E8;hal-03628745&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628745v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. <i>Computer Safety, Reliability, and Security<\/i>, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11875567_14\">&#x27E8;10.1007\/11875567_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628725v1\">&#x27E8;hal-03628725&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628725v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Sergio Castillo, Jordi Castell\u00e0-Roca, Guillermo Navarro, Joan Borrell. Protection of Components Based on a Smart-Card Enhanced Security Module. <i>Critical Information Infrastructures Security<\/i>, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11962977_11\">&#x27E8;10.1007\/11962977_11&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628730v1\">&#x27E8;hal-03628730&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628730v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Sergio Castillo, Jordi Castell\u00e0-Roca, Guillermo Navarro, Joan Borrell. SMARTCOP \u2013 A Smart Card Based Access Control for the Protection of Network Security Components. <i>On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops<\/i>, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11915034_65\">&#x27E8;10.1007\/11915034_65&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628734v1\">&#x27E8;hal-03628734&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628734v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2005<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Michael Jaeger, Gero M\u00fchl, Joan Borrell. Decoupling Components of an Attack Prevention System Using Publish\/Subscribe. <i>Intelligence in Communication Systems<\/i>, Springer-Verlag, pp.87-97, 2005, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/0-387-32015-6_9\">&#x27E8;10.1007\/0-387-32015-6_9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628700v1\">&#x27E8;hal-03628700&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628700v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">G. Navarro, J. Pe\u00f1alver, J.A. Ortega-Ruiz, J. Ametller, Joaquin Garcia\u2010alfaro, et al.. Amapola: a simple infrastructure for ubiquitous computing. Roch Glitho; Ahmed Karmouch; Samuel Pierre. <i>Intelligence in Communication Systems<\/i>, 190, Springer-Verlag, pp.77-86, 2005, IFIP \u2014 The International Federation for Information Processing book series (IFIPAICT), <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/0-387-32015-6_8\">&#x27E8;10.1007\/0-387-32015-6_8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628697v1\">&#x27E8;hal-03628697&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628697v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2004<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, et al.. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. <i>Information and Communications Security<\/i>, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-30191-2_18\">&#x27E8;10.1007\/978-3-540-30191-2_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628684v1\">&#x27E8;hal-03628684&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628684v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>HDR<\/p>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro. Contributions to the security of EPC\/RFID wireless technologies. Cryptography and Security [cs.CR]. Universit\u00e9 Pierre et Marie Curie, Paris VI; T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com), 2013. <a target=\"_blank\" href=\"https:\/\/hal.science\/tel-03646853v1\">&#x27E8;tel-03646853&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/tel-03646853\/file\/hdr-jga.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/tel-03646853\/file\/hdr-jga.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/tel-03646853\/file\/hdr-jga.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/tel-03646853v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>N\u00b0sp\u00e9cial de revue\/special issue<\/p>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro. Foundations and practice of security. <i>Lecture Notes in Computer Science<\/i>, 12056, 408 p., 2020, Lecture Notes in Computer Science book series (LNCS), <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-45371-8\">&#x27E8;10.1007\/978-3-030-45371-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03001571v1\">&#x27E8;hal-03001571&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03001571v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Abdessamad Imine, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro. Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers. <i>FPS 2017 - 10th International Symposium on Foundations and Practice of Security<\/i>, Oct 2017, Nancy, France. <i>Lecture Notes in Computer Science<\/i>, 10723, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-75650-9\">&#x27E8;10.1007\/978-3-319-75650-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01869014v1\">&#x27E8;hal-01869014&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01869014v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio L\u00f3pez Mart\u00ednez, Montassar Naghmouchi, Maryline Laurent, Joaquin Garcia\u2010alfaro, Manuel Gil P\u00e9rez, et al.. Empower healthcare through a self-sovereign identity infrastructure for secure electronic health data access. 2025, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2501.12229\">&#x27E8;10.48550\/arXiv.2501.12229&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04930967v1\">&#x27E8;hal-04930967&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2501.12229\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2501.12229\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04930967v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Michel Barbeau, Evangelos Kranakis. Les composants RFID, sont-ils vulnerables ?. 2009. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628767v1\">&#x27E8;hal-03628767&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628767v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Ouvrages<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Guillermo Navarro-Arribas, Nicola Dragoni (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer International Publishing, 13619, 2023, Lecture Notes in Computer Science, 978-3-031-25734-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-25734-6\">&#x27E8;10.1007\/978-3-031-25734-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04006291v1\">&#x27E8;hal-04006291&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04006291v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Esma A\u00efmeur, Maryline Laurent, Reda Yaich, Beno\u00eet Dupont, Joaquin Garcia\u2010alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-08147-7\">&#x27E8;10.1007\/978-3-031-08147-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843022v1\">&#x27E8;hal-03843022&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03843022v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Jose Luis Mu\u00f1oz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer, 13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS), 978-3-030-93943-4. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-93944-1\">&#x27E8;10.1007\/978-3-030-93944-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628440v1\">&#x27E8;hal-03628440&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628440v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Shujun Li, Radha Poovendran, Herv\u00e9 Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-90019-9\">&#x27E8;10.1007\/978-3-030-90019-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628450v1\">&#x27E8;hal-03628450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Shujun Li, Radha Poovendran, Herv\u00e9 Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-90022-9\">&#x27E8;10.1007\/978-3-030-90022-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628451v1\">&#x27E8;hal-03628451&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628451v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro (Dir.). Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers. Springer, 10694, pp.269, 2018, Lecture Notes in Computer Science, Lecture Notes in Computer Science (vol. 10694), 978-3-319-76686-7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01865019v1\">&#x27E8;hal-01865019&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01865019v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios (Dir.). Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, proceedings. Springer, pp.442, 2018, Lecture Notes in Computer Science book series (LNCS, volume 11025), Lecture Notes in Computer Science book series (LNCS, volume 11025), 978-3-030-00304-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02014097v1\">&#x27E8;hal-02014097&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02014097v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ali Miri, Xiaodai Dong, Masoud Ardakani, Joaquin Garcia-Alfaro (Dir.). 29th biennial symposium on communications : Toronto, Ontario, Canada, June 6-7, 2018. IEEE Computer Society, pp.128, 2018, Biennial Symposium on Communications proceedings, Biennial Symposium on Communications proceedings, 978-1-5386-5735-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02014409v1\">&#x27E8;hal-02014409&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02014409v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Lingyu Wang, Nora Cuppens-Bouhlahia, Nadia Tawbi, Joaquin Garcia-Alfaro (Dir.). Foundations and practice of security : 9th International Symposium, FPS 2016, Qu\u00e9bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Springer, 10128, pp.361, 2017, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-51965-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01449657v1\">&#x27E8;hal-01449657&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01449657v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomarti (Dir.). Data privacy management, cryptocurrencies and blockchain technology. Springer, 10436, pp.446, 2017, Lecture Notes in Computer Science, 978-3-319-67815-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67816-0\">&#x27E8;10.1007\/978-3-319-67816-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01740241v1\">&#x27E8;hal-01740241&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01740241v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Didier El Baz, Julien Bourgeois, Bruno Defude, Zhangbing Zhou, Guangjie Han, et al. (Dir.). ATC 2016 : 13th Annual International Conference on Advanced and Trusted Computing. IEEE Computer Society, pp.1242, 2016, 978-1-5090-2770-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01449669v1\">&#x27E8;hal-01449669&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01449669v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Dir.). Data privacy management, and security assurance : 10th international workshop, DPM 2015, and 4th international workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers. Springer International Publishing, 9481, pp.291, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-29882-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01333425v1\">&#x27E8;hal-01333425&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01333425v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (Dir.). Foundations and practice of security : 8th international symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers. Springer International Publishing, 9482, pp.323, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-30302-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01333422v1\">&#x27E8;hal-01333422&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01333422v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro (Dir.). Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450264v1\">&#x27E8;hal-01450264&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01450264v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro, A. Nur Zincir Heywood, Philip W. L. Fong (Dir.). FPS 2014 : 7th International Symposium on Foundations and Practice of Security : revised selected papers. 8930, pp.375, 2015, LNCS (Lecture Notes in Computer Science), 978-3-319-17039-8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01162133v1\">&#x27E8;hal-01162133&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01162133v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, et al. (Dir.). Data privacy management, autonomous spontaneous security, and security assurance : 9th international workshop, DPM 2014, 7th international workshop, SETOP 2014, and 3rd international workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014 : revised selected papers. Springer international publishing, 8872, pp.343, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-17015-2. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263419v1\">&#x27E8;hal-01263419&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263419v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ali Ghorbani, Vicen\u00e7 Torra, Huseyin Hisil, Ali Miri, Ahmet Koltuksuz, et al. (Dir.). 2015 Thirteenth annual conference on privacy, security and trust. IEEE, pp.200, 2015, 978-1-4673-7828-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332268v1\">&#x27E8;hal-01332268&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01332268v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood (Dir.). Foundations and practice of security : 6th international symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, revised selected papers. Springer, 8352, pp.444, 2014, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-05302-8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264784v1\">&#x27E8;hal-01264784&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01264784v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Georgios V. Lioudakis, Nora Cuppens-Bouhlahia, Simon N. Foley, William M. Fitzgerald (Dir.). Data Privacy Management and Autonomous Spontaneous Security : DPM 2013 : 8th International Workshop, SETOP 2013 : 6th International Workshop, Ehgam, UK, September 12-13, 2013 - Revised Selected Papers. Springer, 8247, pp.400, 2014, LNCS - Lecture Notes in Computer Science, 978-3-642-54567-2. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01174201v1\">&#x27E8;hal-01174201&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01174201v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, G\u00fcrkan G\u00fcr (Dir.). Proceedings 2014 : International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science, 165, pp.58, 2014. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01740931v1\">&#x27E8;hal-01740931&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01740931v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ali Miri, Urs Hengartner, Huang Nen-Fu, Audun Josang, Joaquin Garcia-Alfaro (Dir.). 2014 Twelfth annual conference on privacy, security and trust. IEEE, pp.426, 2014, 978-1-4799-3503-1. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264786v1\">&#x27E8;hal-01264786&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01264786v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jordi Castella-Roca, Josep Domingo-Ferrer, Joaquin Garcia-Alfaro, Ali Ghorbani, Christian Damsgaard Jensen, et al. (Dir.). 2013 Eleventh annual conference on privacy, security and trust. IEEE, pp.390, 2013, 978-1-4673-5839-2. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264789v1\">&#x27E8;hal-01264789&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01264789v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri, Nadia Tawbi (Dir.). FPS 2012 : 5th International Symposium on Foundations and Practice of Security. Springer, 7743, pp.381, 2013, LNCS (Lecture Notes in Computer Science), 978-3-642-37118-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01162190v1\">&#x27E8;hal-01162190&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01162190v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Bouhlahia, Ali Miri, Nadia Tawbi (Dir.). Foundations and practice of security. Springer, 2013, 978-3-642-37118-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00846997v1\">&#x27E8;hal-00846997&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00846997v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nora Cuppens-Bouhlahia, Philip Fong, Joaquin Garcia Alfaro, Stephen Marsh, Jan-Philipp Stegh\u00f6fer (Dir.). PST 2012 : tenth Annual International Conference on Privacy, Security and Trust Privacy, Security and Trust, Paris, July 16-18. IEEE, pp.262, 2012, 978-1-4673-2323-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164792v1\">&#x27E8;hal-01164792&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164792v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Joaquin Garcia Alfaro. Data and Applications Security and Privacy XXVI. Springer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-31540-4\">&#x27E8;10.1007\/978-3-642-31540-4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164720v1\">&#x27E8;hal-01164720&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164720v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Pascal Lafourcade (Dir.). Foundations and practice of security : 4th Canada-France MITACS workshop, FPS 2011, (Paris, May 12-13 2011). Springer Science, Business Media, 6888, pp.253, 2012, Lecture Notes in Computer Science, 978-3-642-27901-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00724727v1\">&#x27E8;hal-00724727&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00724727v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Guillermo Navarro, Nora Cuppens-Boulahia, Sabrina de Capitani Di Vimercati (Dir.). Data Privacy Management and Autonomous Spontaneus Security : DPM 2011 : 6th International Workshop and SETOP 2011 : 4th International Workshop, Leuven, September 15-16, Revised Selected Papers. Springer, 7122, pp.319, 2012, LNCS - Lecture Notes in Computer Science, LNCS - Lecture Notes in Computer Science, 978-3-642-28878-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164894v1\">&#x27E8;hal-01164894&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164894v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Bouhlahia, Yves Roudier (Dir.). Data Privacy Management and Autonomous Spontaneous Security : DPM 2009 : 4th International Workshop and SETOP 2009 : second International Workshop, St. Malo, France, September 24-25, 2009 - Revised Selected Papers. Springer, 5939, pp.265, 2010, LNCS (Lecture Notes in Computer Science), 978-3-642-11206-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164774v1\">&#x27E8;hal-01164774&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164774v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Brevet<\/p>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ehsan Ahvar, Shohreh Ahvar, Noel Crespi, Joaquin Garcia\u2010alfaro. Resource allocation method in distributed clouds. France, Patent n\u00b0 : EP 15 305749.2. 2016. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04386333v1\">&#x27E8;hal-04386333&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04386333v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed Mosbah, Florence S\u00e8des, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Part 1. <i>Foundations and Practice of Security<\/i>, Dec 2024, Montr\u00e9al, Canada. 14551, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57536-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-57537-2\">&#x27E8;10.1007\/978-3-031-57537-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04601607v1\">&#x27E8;hal-04601607&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04601607v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed Mosbah, Florence S\u00e8des, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, et al.. Foundations and practice of security. Part 2. <i>Foundations and Practice of Security<\/i>, Dec 2024, Montr\u00e9al, Canada. 14552, Springer Nature Switzerland, 2024, Lecture Notes in Computer Science, 978-3-031-57539-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-57540-2\">&#x27E8;10.1007\/978-3-031-57540-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04734288v1\">&#x27E8;hal-04734288&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04734288v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence S\u00e8des, Joaquin Garcia-Alfaro. Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12\u201314, 2022, Revised Selected Papers. <i>15th International Symposium, FPS<\/i>, <i>Lecture Notes in Computer Science<\/i>, 13877, Springer Nature Switzerland, pp.1-471, 2023, Lecture Notes in Computer Science (LNCS), 978-3-031-30121-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-30122-3\">&#x27E8;10.1007\/978-3-031-30122-3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04180387v1\">&#x27E8;hal-04180387&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04180387v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Megias, Roberto Di Pietro, Joaquin Garcia\u2010alfaro. EICC 2022: european interdisciplinary cybersecurity conference. ACM; ACM, 2022, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3528580\">&#x27E8;10.1145\/3528580&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04006360v1\">&#x27E8;hal-04006360&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04006360v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich. Risks and security of internet and systems. <i>CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems<\/i>, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-68887-5\">&#x27E8;10.1007\/978-3-030-68887-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628457v1\">&#x27E8;hal-03628457&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628457v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Apostolos Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, et al.. Computer security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26\u201327, 2019, revised selected papers. <i>ESORICS 2019: European Symposium on Research in Computer Security<\/i>, Sep 2019, Luxembourg, Luxembourg. 11981, Springer, pp.279, 2020, Lecture Notes in Computer Science(LNCS), 978-3-030-42050-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-42051-2\">&#x27E8;10.1007\/978-3-030-42051-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125783v1\">&#x27E8;hal-03125783&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125783v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Solange Ghernaouti-H\u00e9lie, Abdelmalek Benzekri, Romain Laborde, Nadjib Aitsaadi, Joaquin Garcia\u2010alfaro. 2020 4th Cyber Security in Networking Conference (CSNet). <i>4th Cyber Security in Networking Conference: Cyber Security in Networking (CSNet 2020)<\/i>, IEEE: Institute of Electrical and Electronics Engineers, 2020, 978-0-7381-4292-0. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSNet50428.2020\">&#x27E8;10.1109\/CSNet50428.2020&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03184958v1\">&#x27E8;hal-03184958&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03184958v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, et al.. Computer security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26\u201327, 2019 revised selected papers. <i>ESORICS 2019: European Symposium on Research in Computer Security<\/i>, Sep 2019, Luxembourg, Luxembourg. 11980, Springer, pp.440, 2020, Lecture Notes in Computer Science (LNCS), 978-3-030-42047-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-42048-2\">&#x27E8;10.1007\/978-3-030-42048-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03125793v1\">&#x27E8;hal-03125793&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03125793v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquin Garcia-Alfaro. Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papers. <i>ESORICS 2018 international workshops (ISSA 2018) and (CSITS 2018)<\/i>, Sep 2018, Barcelonne, Spain. <i>Lecture Notes in Computer Science<\/i>, LNCS 11552, Springer International Publishing, pp.1--173, 2019, Security and Cryptology, LNCS, 978-3-030-16873-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-16874-2\">&#x27E8;10.1007\/978-3-030-16874-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02086531v1\">&#x27E8;hal-02086531&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02086531v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cristina P\u00e9rez-Sol\u00e0, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia Alfaro. Data privacy management, cryptocurrencies and blockchain technology. <i>ESORICS 2019, DPM 2019 and CBT 2019 : Data Privacy Management, Cryptocurrencies and Blockchain Technology<\/i>, Sep 2019, Luxembourg, Luxembourg. 11737, Springer, 400 p., 2019, Lecture Notes in Computer Science book series: Security and Cryptology book sub series, 978-3-030-31499-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-31500-9\">&#x27E8;10.1007\/978-3-030-31500-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02390284v1\">&#x27E8;hal-02390284&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02390284v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia\u2010alfaro. Cyber-resilience approaches for cyber-physical systems. T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com). 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04495662v1\">&#x27E8;hal-04495662&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2302.05402\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2302.05402\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04495662v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal Pedrosa, Perez-Sola Cristina, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. [Research Report] D\u00e9pt. R\u00e9seaux et Service de T\u00e9l\u00e9com (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS); Department of Information and Communications Engineering (Autonomous University of Barcelona). 2019, pp.13. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02086536v1\">&#x27E8;hal-02086536&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02086536\/file\/preprint-iacr2019.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02086536\/file\/preprint-iacr2019.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02086536\/file\/preprint-iacr2019.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02086536v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Barbeau, Steve R. Cloutier, Joaquin Garcia-Alfaro. Quantum computing assisted medium access control for multiple client station networks. [Research Report] D\u00e9pt. R\u00e9seaux et Service de T\u00e9l\u00e9com (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS); School of Computer Science [Ottawa] (Carleton University). 2015, pp.18. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263388v1\">&#x27E8;hal-01263388&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263388\/file\/preprint-arxiv1507.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263388\/file\/preprint-arxiv1507.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263388\/file\/preprint-arxiv1507.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263388v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Th\u00e8se<\/p>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro. Platform of intrusion management : design and implementation. Cryptography and Security [cs.CR]. Telecom Bretagne; Universitat Aut\u00f2noma de Barcelona, 2006. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/\">&#x27E8;NNT : &#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/tel-03628739v1\">&#x27E8;tel-03628739&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/tel-03628739v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Pr\u00e9-publication, Document de travail<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romain Dagnas, Michel Barbeau, Joaquin Garcia\u2010alfaro, Reda Yaich. Graph analytics for cyber-physical system resilience quantification. 2025. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05339150v1\">&#x27E8;hal-05339150&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2504.02120\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2504.02120\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05339150v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Quentin Michaud, Sara Ramezanian, Dhouha Ayed, Olivier Levillain, Joaquin Garcia-Alfaro. Abstraction of Trusted Execution Environments as the Missing Layer for Broad Confidential Computing Adoption: A Systematization of Knowledge. 2025. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05447165v1\">&#x27E8;hal-05447165&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05447165\/file\/2512.22090v1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05447165\/file\/2512.22090v1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05447165\/file\/2512.22090v1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05447165v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4478,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3560","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3560"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3560\/revisions"}],"predecessor-version":[{"id":3561,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3560\/revisions\/3561"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4478"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}