{"id":3568,"date":"2022-04-14T15:01:42","date_gmt":"2022-04-14T13:01:42","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/christophe-kiennert-2\/"},"modified":"2022-04-14T15:02:17","modified_gmt":"2022-04-14T13:02:17","slug":"christophe-kiennert-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/christophe-kiennert-2\/","title":{"rendered":"Christophe KIENNERT"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/kiennert-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Christophe <span class=\"MonLabo-lastname\">Kiennert<\/span><\/h1><div class=\"coordonnees\"><em>Ma\u00eetre de Conf\u00e9rences<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">Christophe.kiennert[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Pierre-Marie Bajan, Herv\u00e9 Debar. Evaluating security products: formal model and requirements of a new approach. <i>International Journal On Advances in Security<\/i>, 2019, 12 (1 & 2), pp.29-41. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02281230v1\">&#x27E8;hal-02281230&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02281230v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The influence of conception paradigms on data protection in e-learning platforms: a case study. <i>IEEE Access<\/i>, 2019, 7, pp.64110-64119. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2019.2915275\">&#x27E8;10.1109\/ACCESS.2019.2915275&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02281231v1\">&#x27E8;hal-02281231&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02281231\/file\/08708177.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02281231v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Xavier Bar\u00f3\u2010sol\u00e9, Ana E. Guerrero\u2010roldan, Josep Prieto\u2010bl\u00e1zquez, Anna Rozeva, Orlin Marinov, et al.. Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experience. <i>Internet technology letters<\/i>, 2018, 1 (4), pp.e56-1 - e56-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.56\">&#x27E8;10.1002\/itl2.56&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02013504v1\">&#x27E8;hal-02013504&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02013504v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Ismail Ziad, Herv\u00e9 Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. <i>ACM Computing Surveys<\/i>, 2018, 51 (5), pp.1-31. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3232848\">&#x27E8;10.1145\/3232848&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02009646v1\">&#x27E8;hal-02009646&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02009646v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ziad Ismail, Christophe Kiennert, Jean Leneutre, David Bateman, Lin Chen. Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis. <i>IEEE Transactions on Information Forensics and Security<\/i>, 2016, 11, pp.1685-1699. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/tifs.2016.2549002\">&#x27E8;10.1109\/tifs.2016.2549002&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01418390v1\">&#x27E8;hal-01418390&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01418390v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano de Cristofaro, Christophe Kiennert. PROTEAN: federated intrusion detection in\u00a0non-IID environments through prototype-based knowledge sharing. <i>30th European Symposium on Research in Computer Security (ESORICS )<\/i>, Sep 2025, Toulouse, France. pp.103-125, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-032-07884-1_6\">&#x27E8;10.1007\/978-3-032-07884-1_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05379203v1\">&#x27E8;hal-05379203&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05379203\/file\/paper_329-3.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05379203v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi. Dynamic transmission scheduling method for high-concurrent zero trust access control. <i>20th International Conference on Availability, Reliability and Security (ARES )<\/i>, Aug 2025, Ghent, Belgium. pp.324-341, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-032-00633-2_19\">&#x27E8;10.1007\/978-3-032-00633-2_19&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05446750v1\">&#x27E8;hal-05446750&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05446750\/file\/paper_300.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05446750v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. SoK: federated learning based network intrusion detection in 5G: context, state of the art and challenges. <i>The 19th International Conference on Availability, Reliability and Security (ARES)<\/i>, Jul 2024, Vienna, Austria. pp.1-13, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3664500\">&#x27E8;10.1145\/3664476.3664500&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04669287v1\">&#x27E8;hal-04669287&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04669287\/file\/SoK__Federated_Learning_based_Network_Intrusion_Detection_in_5G__Context__State_of_the_Art_and_Challenges-8.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04669287v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, et al.. OIPM: access control method to prevent ID\/session token abuse on openID connect. <i>21st International Conference on Security and Cryptography (SECRYPT 2024)<\/i>, Jul 2024, Dijon, France. pp.674-679, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0012757900003767\">&#x27E8;10.5220\/0012757900003767&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04719043v1\">&#x27E8;hal-04719043&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04719043v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. Survey on intrusion detection systems in 5G. <i>Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information (RESSI)<\/i>, LIFO, May 2023, Neuvy-sur-Barangeon, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04164470v1\">&#x27E8;hal-04164470&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04164470\/file\/Survey_on_intrusion_detection_systems_in_5G_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04164470v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Marie Bajan, Christophe Kiennert, Herv\u00e9 Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. <i>ICISSP 2019: 5th International Conference on Information Systems Security and Privacy<\/i>, Feb 2019, Prague, Czech Republic. pp.378-388, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0007378603780388\">&#x27E8;10.5220\/0007378603780388&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02176684v1\">&#x27E8;hal-02176684&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02176684v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource allocation for secure SDN-based virtual network migration. <i>NCA 2019: 18th International Symposium on Network Computing and Applications<\/i>, Sep 2019, Cambridge, MA, United States. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/nca.2019.8935027\">&#x27E8;10.1109\/nca.2019.8935027&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438632v1\">&#x27E8;hal-02438632&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438632\/file\/NCA_2019___Final_draft%20%281%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438632v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC s\u00e9curit\u00e9 des r\u00e9seaux : un apprentissage massif de la s\u00e9curit\u00e9 par la th\u00e9orie et la pratique. <i>RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, INRIA, May 2019, Erquy, France. pp.1-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754082v1\">&#x27E8;hal-03754082&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754082v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Marie Bajan, Herv\u00e9 Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. <i>ICIMP 2018: 13th International Conference on Internet Monitoring and Protection<\/i>, Jul 2018, Barcelone, Spain. pp.35-41. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01901017v1\">&#x27E8;hal-01901017&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01901017v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi. Preserving confidentiality during the migration of virtual SDN topologies: a formal approach. <i>NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications<\/i>, Oct 2017, Cambridge, United States. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2017.8171392\">&#x27E8;10.1109\/NCA.2017.8171392&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01666374v1\">&#x27E8;hal-01666374&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01666374v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen. A Game Theoretical Model for Optimal Distribution of Network Security Resources. <i>Gamesec<\/i>, Oct 2017, Vienna, Austria. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-68711-7_13\">&#x27E8;10.1007\/978-3-319-68711-7_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01688475v1\">&#x27E8;hal-01688475&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01688475v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. pp.239 - 256, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67816-0_14\">&#x27E8;10.1007\/978-3-319-67816-0_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593430v1\">&#x27E8;hal-01593430&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593430v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01702450v1\">&#x27E8;hal-01702450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01702450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. <i>NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems<\/i>, Nov 2017, Tartu, Estonia. pp.70 - 85, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-70290-2_5\">&#x27E8;10.1007\/978-3-319-70290-2_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699347v1\">&#x27E8;hal-01699347&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699347v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana Durcheva, et al.. Security challenges in e-assessment and technical solutions. <i>IV 2017 : 21st International Conference on Information Visualization<\/i>, Jul 2017, Londres, United Kingdom. pp.366 - 371, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/iV.2017.70\">&#x27E8;10.1109\/iV.2017.70&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699388v1\">&#x27E8;hal-01699388&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699388\/file\/18678.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699388v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen. Data Integrity and Availability Verification Game in Untrusted Cloud Storage. <i>GameSec 2014 Conference on Decision and Game Theory for Security<\/i>, Nov 2014, Los Angeles, United States. pp.287-306, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-12601-2_16\">&#x27E8;10.1007\/978-3-319-12601-2_16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01110522v1\">&#x27E8;hal-01110522&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01110522v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. <i>2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing<\/i>, Aug 2013, X, France. pp.2133-2135. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126288v1\">&#x27E8;hal-01126288&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126288v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pascal Urien, Marc Pasquet, Christophe Kiennert. A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards. <i>CTS<\/i>, 2011, United States. pp.476 - 483, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CTS.2011.5928726\">&#x27E8;10.1109\/CTS.2011.5928726&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00673667v1\">&#x27E8;hal-00673667&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00673667\/file\/05928726.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00673667\/file\/05928726.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00673667\/file\/05928726.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00673667v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pascal Urien, Estelle Marie, Christophe Kiennert. A New Convergent Identity System Based on EAP-TLS Smart Cards. <i>SAR-SSI<\/i>, 2011, France. pp.1-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00673666v1\">&#x27E8;hal-00673666&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00673666\/file\/05931373.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00673666\/file\/05931373.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00673666\/file\/05931373.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00673666v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pascal Urien, Estelle Marie, Christophe Kiennert. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards. <i>ICDT<\/i>, 2010, Greece. pp.22-27, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICDT.2010.12\">&#x27E8;10.1109\/ICDT.2010.12&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00673665v1\">&#x27E8;hal-00673665&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00673665\/file\/05532389.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00673665\/file\/05532389.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00673665\/file\/05532389.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00673665v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Chapitre d'ouvrage<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marwan Lazrag, Christophe Kiennert, Joaquin Garcia\u2010alfaro. Quantifying the\u00a0impact propagation of\u00a0cyber attacks using business logic modeling. <i>Security and Privacy in Smart Environments<\/i>, 14800, Springer Nature Switzerland, pp.49-71, 2025, Lecture Notes in Computer Science, 978-3-031-66708-4. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-66708-4_3\">&#x27E8;10.1007\/978-3-031-66708-4_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04913285v1\">&#x27E8;hal-04913285&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04913285\/file\/preprint-SPSE-Lazrag.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04913285v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. <i>Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions<\/i>, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-29326-0_5\">&#x27E8;10.1007\/978-3-030-29326-0_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02393547v1\">&#x27E8;hal-02393547&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02393547v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Samia Bouzefrane, Amira Benkara Mostefa. L?identit\u00e9 num\u00e9rique dans le Cloud Computing. ISTE. <i>La gestion des identit\u00e9s num\u00e9riques<\/i>, pp.340, 2014, \u00e0 para\u00eetre. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126447v1\">&#x27E8;hal-01126447&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126447v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Samia Bouzefrane, P. Thoniel. Syst\u00e8mes d?authentification. ISTE. <i>La gestion des identit\u00e9s num\u00e9riques<\/i>, pp.340, 2014, \u00e0 para\u00eetre. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126446v1\">&#x27E8;hal-01126446&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126446v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4484,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3568","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3568"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3568\/revisions"}],"predecessor-version":[{"id":3569,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3568\/revisions\/3569"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4484"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}