{"id":3616,"date":"2022-04-14T17:39:50","date_gmt":"2022-04-14T15:39:50","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/jose-manuel-rubio-hernan\/"},"modified":"2022-04-14T17:39:50","modified_gmt":"2022-04-14T15:39:50","slug":"jose-manuel-rubio-hernan","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/jose-manuel-rubio-hernan\/","title":{"rendered":"Jose Manuel RUBIO HERNAN"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/07\/Jose-Rubio-Hernan.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Jose Manuel <span class=\"MonLabo-lastname\">RUBIO HERNAN<\/span><\/h1><div class=\"coordonnees\"><em>Ma\u00eetre de Conf\u00e9rences<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=2455\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">ISTeC<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">jose.rubio_hernan[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><div class=\"external_url\"><h1 style=\"text-align: center;\"><a href=\"http:\/\/www-public.imtbs-tsp.eu\/~rubio_he\/\"><button class=\"btn btn-oldstyle\" type=\"button\">Site personnel<\/button><\/a><\/h1><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. A survey on cyber-resilience approaches for cyber-physical systems. <i>ACM Computing Surveys<\/i>, 2024, 56 (8), pp.1-37. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3652953\">&#x27E8;10.1145\/3652953&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04562096v1\">&#x27E8;hal-04562096&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04562096v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Estefania Munoz Diaz, Jose Manuel Rubio Hernan, Francisco Jurado Romero, Aicha Karite, Alexandre Vervisch-Picois, et al.. Advanced smartphone-based identification of transport modes: resilience under GNSS-Based attacks. <i>Future Transportation<\/i>, 2023, 3 (2), pp.568-583. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/futuretransp3020033\">&#x27E8;10.3390\/futuretransp3020033&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04091479v1\">&#x27E8;hal-04091479&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04091479\/file\/futuretransp-03-00033.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04091479\/file\/futuretransp-03-00033.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04091479\/file\/futuretransp-03-00033.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04091479v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Victor, Le Hoang Truong, Alexandre Vervisch-Picois, Jose Rubio Hernan, Nel Samama. Characterization of the ability of low-cost GNSS receiver to detect spoofing using clock bias. <i>Sensors<\/i>, 2023, 23 (5), pp.2735. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s23052735\">&#x27E8;10.3390\/s23052735&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04091492v1\">&#x27E8;hal-04091492&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04091492\/file\/sensors-23-02735%20%282%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04091492\/file\/sensors-23-02735%20%282%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04091492\/file\/sensors-23-02735%20%282%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04091492v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia\u2010alfaro. Switched-based resilient control of cyber-physical systems. <i>IEEE Access<\/i>, 2020, 8 (3), pp.212194 - 212208. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2020.3039879\">&#x27E8;10.1109\/ACCESS.2020.3039879&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03113904v1\">&#x27E8;hal-03113904&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03113904v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Using an event data taxonomy to represent the impact of cyber events as geometrical instances. <i>IEEE Access<\/i>, 2018, 6, pp.8810 - 8828. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2017.2740402\">&#x27E8;10.1109\/ACCESS.2017.2740402&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01729364v1\">&#x27E8;hal-01729364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01729364\/file\/18686.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01729364v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. <i>Transactions on emerging telecommunications technologies<\/i>, 2018, 29 (7), pp.e3209-1 - e3209-17. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.3209\">&#x27E8;10.1002\/ett.3209&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01823618v1\">&#x27E8;hal-01823618&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01823618\/file\/18687.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01823618v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro. Cyber\u2010physical architecture assisted by programmable networking. <i>Internet technology letters<\/i>, 2018, 1 (4), pp.e44-1 - e44-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/itl2.44\">&#x27E8;10.1002\/itl2.44&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01869475v1\">&#x27E8;hal-01869475&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01869475v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of watermark-based schemes to detect cyber-physical attacks. <i>EURASIP Journal on Information Security<\/i>, 2017, 2017, pp.8-1 - 8-25. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13635-017-0060-9\">&#x27E8;10.1186\/s13635-017-0060-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01701167v1\">&#x27E8;hal-01701167&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01701167\/file\/18688.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01701167v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Christian Gentner, Alexandre Vervisch-Picois, Nel Samama. Clock drift monitoring to discriminate GNSS signal after prolonged signal loss. <i>2025 IEEE\/ION Position, Location and Navigation Symposium (PLANS)<\/i>, Apr 2025, Salt Lake City, France. pp.1521-1526, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PLANS61210.2025.11028211\">&#x27E8;10.1109\/PLANS61210.2025.11028211&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05416851v1\">&#x27E8;hal-05416851&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05416851v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nel Samama, Jose Rubio-Hernan, Alexandre Vervisch-Picois, Thierry Taillandier-Loize. Antenna structures for resolving ambiguities in the dual-antenna approach and measuring phase differences. <i>Intelligent Computing - Proceedings of the Computing Conference (CompCom)<\/i>, Jun 2025, London, United Kingdom. pp.618-630, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-92611-2_41\">&#x27E8;10.1007\/978-3-031-92611-2_41&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05416802v1\">&#x27E8;hal-05416802&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05416802\/file\/DualAntenna.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05416802\/file\/DualAntenna.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05416802\/file\/DualAntenna.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05416802v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Victor Vince, Dominique Heurguier, Alexandre Vervisch-Picois, Jose Rubio-Hernan. Optimization and performance of multi-criteria collaborative integrity control in degraded GNSS environments. <i>Work-in-Progress in Hardware and Software for Location Computation (WIPHAL\u201925)<\/i>, Jun 2025, Rome, Italy. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05466314v1\">&#x27E8;hal-05466314&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05466314v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Victor Vince, Dominique Heurguier, Alexandre Vervisch-Picois, Jose Rubio-Hernan. Optimization and performance of multi-criteria collaborative integrity control in degraded GNSS environments. <i>Work-in-Progress in Hardware and Software for Location Computation (WIPHAL)<\/i>, Jun 2025, Rome, Italy. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05423732v1\">&#x27E8;hal-05423732&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05423732\/file\/Vince_multi-criteria_WiP_Rome_25.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05423732\/file\/Vince_multi-criteria_WiP_Rome_25.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05423732\/file\/Vince_multi-criteria_WiP_Rome_25.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05423732v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Victor Vince, Alexandre Vervisch-Picois, Jose Rubio-Hernan, Dominique Heurguier. Optimizing covariance estimation model for collaborative integrity monitoring in heterogeneous receiver satellite environments. <i>Proceedings of the 37th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2024)<\/i>, Institut of navigation, Sep 2024, BALTIMORE, MD, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.33012\/2024.19910\">&#x27E8;10.33012\/2024.19910&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04769640v1\">&#x27E8;hal-04769640&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04769640\/file\/article_Vince_HAL_2024.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04769640\/file\/article_Vince_HAL_2024.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04769640\/file\/article_Vince_HAL_2024.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04769640v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Yannick Dongue, Alexandre Vervisch-Picois, Nel Samama. Software defined radio implementation of a non-synchronized indoor positioning system using dual-antenna pseudolites. <i>POSNAV 2022 : Positioning and navigation for intelligent transport systems<\/i>, DGON e.V., Nov 2022, Berlin, Germany. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03912260v1\">&#x27E8;hal-03912260&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03912260\/file\/POSNAV_paper_1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03912260\/file\/POSNAV_paper_1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03912260\/file\/POSNAV_paper_1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03912260v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. Switched-based control testbed to assure cyber-physical resilience by design. <i>SECRYPT 2022 : 19th International Conference on Security and Cryptography<\/i>, Jul 2022, Lisbon, Portugal. pp.681-686, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011327300003283\">&#x27E8;10.5220\/0011327300003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843016v1\">&#x27E8;hal-03843016&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03843016v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. <i>International Symposium on Network Computing and Applications<\/i>, Nov 2020, Cambridge, MA (online), United States. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA51143.2020.9306741\">&#x27E8;10.1109\/NCA51143.2020.9306741&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03115317v1\">&#x27E8;hal-03115317&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03115317v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Charbel Nicolas, Abdel-Mehsen Ahmad, Jose Rubio-Hernan, Gilbert Habib. Hybrid duty cycle algorithm for industrial WSNs using machine learning. <i>SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications<\/i>, Dec 2019, Trivandrum, India. pp.1-15, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-981-15-4301-2_1\">&#x27E8;10.1007\/978-981-15-4301-2_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02962613v1\">&#x27E8;hal-02962613&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02962613v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. <i>CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems<\/i>, Sep 2019, Luxembourg, Luxembourg. pp.19-34, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-42048-2_2\">&#x27E8;10.1007\/978-3-030-42048-2_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02434486v1\">&#x27E8;hal-02434486&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02434486v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Simon Foley, Fabien Autrel, Edwin Bourget, Thomas Cledel, St\u00e9phane Grunenwald, et al.. Science hackathons for cyberphysical system security research: putting CPS tesdbed platforms to good use. <i>CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy<\/i>, Oct 2018, Toronto, Canada. pp.102 - 107, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3564888.3264.897\">&#x27E8;10.1145\/3564888.3264.897&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01911182v1\">&#x27E8;hal-01911182&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01911182v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A pyramidal-based model to compute the impact of cyber security events. <i>ARES 2018 : 13th International Conference on Availability, Reliability and Security<\/i>, Aug 2018, Hamburg, Germany. pp.Article n\u00b0 19 -, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3230833.3230847\">&#x27E8;10.1145\/3230833.3230847&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01885053v1\">&#x27E8;hal-01885053&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01885053v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Gonzalez-Granadillo, Jos\u00e9 Rubio-Hern\u00e1n, Joaquin Garcia\u2010alfaro. Towards a security event data taxonomy. <i>International Conference on Risks and Security of Internet and Systems (CRISIS)<\/i>, Sep 2017, Dinard, France. pp.29-45, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-76687-4_3\">&#x27E8;10.1007\/978-3-319-76687-4_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04308618v1\">&#x27E8;hal-04308618&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04308618v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. <i>TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Aug 2016, Tianjin, China. pp.340 - 348, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2016.0082\">&#x27E8;10.1109\/TrustCom.2016.0082&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01468032v1\">&#x27E8;hal-01468032&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01468032v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of cyber-physical systems : from theory to testbeds and validation. <i>CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems<\/i>, Sep 2016, Heraklion, Greece. pp.3 - 18, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-61437-3_1\">&#x27E8;10.1007\/978-3-319-61437-3_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01543262v1\">&#x27E8;hal-01543262&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01543262v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a watermark-based detection scheme to handle cyber-physical attacks. <i>11th International Conference on Availability, Reliability and Security (ARES 2016)<\/i>, Aug 2016, Salzbourg, Austria. pp.21 - 28, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2016.2\">&#x27E8;10.1109\/ARES.2016.2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01449821v1\">&#x27E8;hal-01449821&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01449821\/file\/preprint-ares-2016-rw.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01449821v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered watermarking control to handle cyber-physical integrity attacks. <i>NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems<\/i>, Nov 2016, Oulu, Finland. pp.3 - 19, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_1\">&#x27E8;10.1007\/978-3-319-47560-8_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450276v1\">&#x27E8;hal-01450276&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450276\/file\/preprint-nordsec-2016-A.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450276v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia-Alfaro, Cristina Romero-Tris, Jose Rubio-Hernan. Simulaciones software para el estudio de amenazas contra sistemas SCADA. <i>RECSI 2014 : XIII Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n<\/i>, Sep 2014, Alicante, Espa\u00f1a. pp.151 - 156. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264800v1\">&#x27E8;hal-01264800&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01264800v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. <i>Digital trust : 1st Symposium on Digital Trust in Auvergne<\/i>, Dec 2014, Clermont-Ferrand, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01281994v1\">&#x27E8;hal-01281994&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01281994v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Chapitre d'ouvrage<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro. Non-stationary watermark-based attack detection to protect cyber-physical control systems. <i>Emerging Trends in Cybersecurity Applications<\/i>, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-09640-2_16\">&#x27E8;10.1007\/978-3-031-09640-2_16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03958379v1\">&#x27E8;hal-03958379&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03958379\/file\/preprint-bcs2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03958379v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia\u2010alfaro. Cyber-resilience approaches for cyber-physical systems. T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com). 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04495662v1\">&#x27E8;hal-04495662&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2302.05402\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2302.05402\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04495662v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Th\u00e8se<\/p>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Rubio-Hernan. Detection of attacks against cyber-physical industrial systems. Networking and Internet Architecture [cs.NI]. Institut National des T\u00e9l\u00e9communications, 2017. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2017TELE0015\">&#x27E8;NNT : 2017TELE0015&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/theses.hal.science\/tel-01810321v1\">&#x27E8;tel-01810321&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/theses.hal.science\/tel-01810321\/file\/Thesis-JM-Rubio-Hernan_2017TELE0015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-01810321\/file\/Thesis-JM-Rubio-Hernan_2017TELE0015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-01810321\/file\/Thesis-JM-Rubio-Hernan_2017TELE0015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-01810321v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4227,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3616","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3616"}],"version-history":[{"count":0,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3616\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4227"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}