Joaquin Garcia-Alfaro
237
Documents
Publications
Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS)Colloque IMT 2023 : « Sécurité et Résilience », Apr 2023, Palaiseau, France
Communication dans un congrès
hal-04098069v1
|
|
|
Entrenamiento bajo demanda en competencias de ciberseguridad en redes socialesVIII National Conference on Cybersecurity Research (JNIC), Universidad de la Rioja, Jun 2023, Vigo, España. pp.469--476
Communication dans un congrès
hal-04198177v1
|
|
Exploring the quantitative resilience analysis of cyber-physical systems2023 IFIP Networking Conference (IFIP Networking), Jun 2023, Barcelone, Spain. ⟨10.23919/IFIPNetworking57963.2023.10186355⟩
Communication dans un congrès
hal-04083180v1
|
|
Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range2023 JNIC Cybersecurity Conference, Vigo, Spain, June 2023, Universidad de La Rioja, Jun 2023, Vigo, Spain. pp.437--444
Communication dans un congrès
hal-04198175v1
|
Quantum algorithms for shapley value calculation2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep 2023, Bellevue, United States. pp.1-9, ⟨10.1109/QCE57702.2023.00024⟩
Communication dans un congrès
hal-04386997v1
|
|
Plateforme de sécurisation des villes: le projet européen IMPETUSColloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France
Communication dans un congrès
emse-03624167v1
|
|
|
Switched-based control testbed to assure cyber-physical resilience by designSECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩
Communication dans un congrès
hal-03843016v1
|
|
Implementation of a stateful network protocol intrusion detection systemsSECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.398-405, ⟨10.5220/0011327400003283⟩
Communication dans un congrès
hal-03843013v1
|
|
Resilience via blackbox self-piloting plantsECW 2022: European Cyber Week, Pôle d’Excellence Cyber, Nov 2022, Rennes, France. pp.35-46
Communication dans un congrès
hal-04006320v1
|
|
Uplink interference management in cellular-Connected UAV networks using multi-armed bandit and NOMA2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩
Communication dans un congrès
hal-04006345v1
|
|
Risky zone avoidance strategies for dronesCCECE 2021: IEEE Canadian Conference on Electrical and Computer Engineering, Sep 2021, Online, France. pp.1-6, ⟨10.1109/CCECE53047.2021.9569172⟩
Communication dans un congrès
hal-03628452v1
|
|
Ontology-based attack graph enrichmentTIEMS 2021: 28th International Emergency Management Society annual conference, Dec 2021, Online, France
Communication dans un congrès
hal-03628443v1
|
|
Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networksMEDITCOM 2021: IEEE International Mediterranean Conference on Communications and Networking, Sep 2021, Athens, Greece. pp.479-484, ⟨10.1109/MeditCom49071.2021.9647674⟩
Communication dans un congrès
hal-03628454v1
|
Cyber-resilience evaluation of Cyber-Physical SystemsInternational Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩
Communication dans un congrès
hal-03115317v1
|
|
|
Anonymous proof-of-asset transactions using designated blind signaturesFPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩
Communication dans un congrès
hal-03125748v1
|
|
Metrics to enhance the resilience of cyber-physical systemsTRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Dec 2020, Guangzhou (online), China. pp.1167-1172, ⟨10.1109/TrustCom50675.2020.00156⟩
Communication dans un congrès
hal-03125741v1
|
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of thingsARES 2020: 15th international conference on Availability, Reliability and Security, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, ⟨10.1145/3407023.3407048⟩
Communication dans un congrès
hal-03125767v1
|
|
Capacity requirements in networks of quantum repeaters and terminalsQCE 2020: IEEE International Conference on Quantum Computing and Engineering, Oct 2020, Denver (online), United States. pp.148-157, ⟨10.1109/QCE49297.2020.00028⟩
Communication dans un congrès
hal-03125753v1
|
|
Geocaching-inspired navigation for micro aerial vehicles with fallible place recognitionADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless, Oct 2020, Bari (online), Italy. pp.55-70, ⟨10.1007/978-3-030-61746-2_5⟩
Communication dans un congrès
hal-03125760v1
|
|
LockDown: balance availability attack against lightning network channelsFC 2020: 24th international conference on Financial Cryptography and Data Security, Feb 2020, Sabah, Malaysia. pp.245-263, ⟨10.1007/978-3-030-51280-4_14⟩
Communication dans un congrès
hal-03125777v1
|
|
Towards an adaptive defuzzification: using numerical Choquet integralMDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence, Sep 2019, Milan, Italy. pp.113-125, ⟨10.1007/978-3-030-26773-5_11⟩
Communication dans un congrès
hal-02393562v1
|
|
|
Geocaching-inspired resilient path planning for drone swarmsMISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking, Apr 2019, Paris, France. pp.620 - 625, ⟨10.1109/INFCOMW.2019.8845318⟩
Communication dans un congrès
hal-02127604v1
|
Faking and discriminating the navigation data of a micro aerial vehicle using quantum generative adversarial networksGLOBECOM 2019: IEEE Global Communications Workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024550⟩
Communication dans un congrès
hal-03125799v1
|
|
Reflective attenuation of cyber-physical attacksCyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩
Communication dans un congrès
hal-02434486v1
|
|
Quality amplification of error prone navigation for swarms of micro aerial vehiclesGLOBECOM 2019: IEEE Global Communications workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024394⟩
Communication dans un congrès
hal-03125798v1
|
|
On the difficulty of hiding the balance of lightning network channelsASIACCS 2019: 14th ASIA Conference on Computer and Communications Security, Jul 2019, Auckland, New Zealand. pp.602-612, ⟨10.1145/3321705.3329812⟩
Communication dans un congrès
hal-02390275v1
|
|
|
Lifelogging protection scheme for internet-based personal assistantsDPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩
Communication dans un congrès
hal-01991849v1
|
The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communicationsGRCON 2018: 8th Annual GNU Radio Conference, Sep 2018, Henderson, United States. pp.1 - 8
Communication dans un congrès
hal-02013656v1
|
|
Low frequency mobile communications in underwater networksADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.239 - 251, ⟨10.1007/978-3-030-00247-3_22⟩
Communication dans un congrès
hal-02013548v1
|
|
GNU radio blocks for long-lasting frames in mobile underwater acoustic communicationsFrench GNU Radio days 2018, Jul 2018, Lyon, France. pp.1 - 2
Communication dans un congrès
hal-02013632v1
|
|
A pyramidal-based model to compute the impact of cyber security eventsARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19 -, ⟨10.1145/3230833.3230847⟩
Communication dans un congrès
hal-01885053v1
|
|
A study on mitigation techniques for SCADA-driven cyber-physical systemsFPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩
Communication dans un congrès
hal-02014254v1
|
|
|
Security challenges in e-assessment and technical solutionsIV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩
Communication dans un congrès
hal-01699388v1
|
|
The sound of communication in underwater acoustic sensor networksADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.13 - 23, ⟨10.1007/978-3-319-74439-1_2⟩
Communication dans un congrès
hal-01699521v1
|
Learning to communicate underwater: an exploration of limited mobility agentsWUWNET 2017 :12th International Conference on Underwater Networks & Systems, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, ⟨10.1145/3148675.3148709⟩
Communication dans un congrès
hal-01740876v1
|
|
|
Doppler effect in the underwater acoustic ultra low frequency bandADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.3 - 12, ⟨10.1007/978-3-319-74439-1_1⟩
Communication dans un congrès
hal-01699512v1
|
Towards a security event data taxonomyInternational Conference on Risks and Security of Internet and Systems (CRISIS), Sep 2017, Dinard, France. pp.29-45, ⟨10.1007/978-3-319-76687-4_3⟩
Communication dans un congrès
hal-04308618v1
|
|
|
Anonymous certification for an e-assessment frameworkNORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩
Communication dans un congrès
hal-01699347v1
|
Attack graph-based countermeasure selection using a stateful return on investment metricFPS 2017: 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. pp.293 - 302, ⟨10.1007/978-3-319-75650-9_19⟩
Communication dans un congrès
hal-01740860v1
|
|
PCS, a privacy-preserving certification schemeDPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway
Communication dans un congrès
hal-01702450v1
|
|
|
PCS, a privacy-preserving certification schemeDPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩
Communication dans un congrès
hal-01593430v1
|
|
Selection of mitigation actions based on financial and operational impact assessmentsARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩
Communication dans un congrès
hal-01450193v1
|
CACEV: a Cost and CArbon Emission-Efficient Virtual machine placement method for green distributed cloudsSCC 2016 : 13th IEEE International Conference on Services Computing , Jun 2016, San Francisco, United States. pp.275 - 282, ⟨10.1109/SCC.2016.43⟩
Communication dans un congrès
hal-01359868v1
|
|
Security of cyber-physical systems : from theory to testbeds and validationCYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Sep 2016, Heraklion, Greece. pp.3 - 18, ⟨10.1007/978-3-319-61437-3_1⟩
Communication dans un congrès
hal-01543262v1
|
|
|
Revisiting a watermark-based detection scheme to handle cyber-physical attacks11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzbourg, Austria. pp.21 - 28, ⟨10.1109/ARES.2016.2⟩
Communication dans un congrès
hal-01449821v1
|
|
Towards an automated and dynamic risk management response systemNORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩
Communication dans un congrès
hal-01450282v1
|
|
An n-sided polygonal model to calculate the impact of cyber security eventsCRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩
Communication dans un congrès
hal-01487752v1
|
|
Event-triggered watermarking control to handle cyber-physical integrity attacksNORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.3 - 19, ⟨10.1007/978-3-319-47560-8_1⟩
Communication dans un congrès
hal-01450276v1
|
|
Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prismsTRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩
Communication dans un congrès
hal-01468032v1
|
|
Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩
Communication dans un congrès
hal-01332277v1
|
|
On the isofunctionality of network access control listsARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩
Communication dans un congrès
hal-01332029v1
|
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Communication dans un congrès
hal-01255089v1
|
|
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent ThreatsNTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩
Communication dans un congrès
hal-01263402v2
|
|
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩
Communication dans un congrès
hal-01152528v1
|
|
Simulation of underwater communications with a colored noise approximation and mobilityCCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1532 - 1537, ⟨10.1109/CCECE.2015.7129508⟩
Communication dans un congrès
hal-01263406v1
|
NACER : a network-aware cost-efficient resource allocation method for processing-intensive tasks in distributed cloudsNCA 2015 : 14th International Symposium on Network Computing and Applications, Nov 2015, Cambridge, Ma, United States. pp.90 - 97, ⟨10.1109/NCA.2015.37⟩
Communication dans un congrès
hal-01263401v1
|
|
|
Location-free link state routing for underwater acoustic sensor networksCCECE 2015 : 28th Canadian Conference on Electrical and Computer Engineering, May 2015, Halifax, Canada. pp.1544 - 1549, ⟨10.1109/CCECE.2015.7129510⟩
Communication dans un congrès
hal-01263407v1
|
|
Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metricsSECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩
Communication dans un congrès
hal-01332331v1
|
Probabilistic Cycle Detection for Schneier's Solitaire Keystream AlgorithmSERE-C 2014 : IEEE 8th International Conference on Software Security and Reliability, Jun 2014, San Francisco, United States. pp.113 - 120, ⟨10.1109/SERE-C.2014.29⟩
Communication dans un congrès
hal-01073179v1
|
|
Simulaciones software para el estudio de amenazas contra sistemas SCADARECSI 2014 : XIII Reunión Española sobre Criptología y Seguridad de la Información, Sep 2014, Alicante, España. pp.151 - 156
Communication dans un congrès
hal-01264800v1
|
|
|
The bidirectional algorithm for channel selection using a two-radio modelVTC Fall 2014 : IEEE 80th Vehicular Technology Conference, Sep 2014, Vancouver, Canada. pp.1 - 5, ⟨10.1109/VTCFall.2014.6966200⟩
Communication dans un congrès
hal-01264783v1
|
|
A new analysis of the cognitive radio jump-stay algorithm under the asymmetric modelICC 2014 : IEEE International Conference on Communications, Jun 2014, Sidney, Australia. pp.1590 - 1595, ⟨10.1109/ICC.2014.6883549⟩
Communication dans un congrès
hal-01264809v1
|
On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systemsDigital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France
Communication dans un congrès
hal-01281994v1
|
|
|
Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networksADHOC-NOW 2014 : 13th International Conference on Ad-Hoc Networks and Wireless , Jun 2014, Benidorm, Spain. pp.197 - 208, ⟨10.1007/978-3-319-07425-2_15⟩
Communication dans un congrès
hal-01264803v1
|
|
Classification of SSL servers based on their SSL handshake for automated security assessmentBADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩
Communication dans un congrès
hal-01332339v1
|
Towards an Access-Control Metamodel for Web Content Management SystemsICWE 2013: the International Conference on Web Engineering - MDWE 2013: Model-Driven Web Engineering, Jul 2013, Aalborg, Denmark. pp 148-155
Communication dans un congrès
hal-00869324v1
|
|
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control ModelFPS 2013 : the sixth international symposium on foundations & practice of security, Oct 2013, La Rochelle, France. pp.209 - 226, ⟨10.1007/978-3-319-05302-8_13⟩
Communication dans un congrès
hal-01161938v1
|
|
|
A new analytic model for the cognitive radio jump-stay algorithmWD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 3, ⟨10.1109/WD.2013.6686443⟩
Communication dans un congrès
hal-01260581v1
|
Privacy-enhanced Filtering and Collection Middleware in EPCglobal NetworksCRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France
Communication dans un congrès
hal-00944945v1
|
|
Attribute-based mining process for the organization-based access control modelTRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩
Communication dans un congrès
hal-01275020v1
|
|
|
QoS and security in Link State Routing protocols for MANETsWD 2013 : IFIP Wireless Days, Nov 2013, Valencia, Spain. pp.1 - 6, ⟨10.1109/WD.2013.6686442⟩
Communication dans un congrès
hal-01260585v1
|
Real-time malicious fast-flux detection using DNS and bot related featuresPST 2013 : 11th International Conference on Privacy, Security and Trust, Jul 2013, Tarragona, Spain. pp.369 - 372, ⟨10.1109/PST.2013.6596093⟩
Communication dans un congrès
hal-01275014v1
|
|
Model-Driven Extraction and Analysis of Network Security PoliciesModel-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013, Sep 2013, Miami, United States. pp.52-68
Communication dans un congrès
hal-00869319v1
|
|
An adaptive mitigation framework for handling suspicious network flows via MPLS policiesNORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩
Communication dans un congrès
hal-01269681v1
|
|
Fine-Grained Privacy Control for the RFID Middleware of EPCglobal NetworksMEDES 2013 : 5th ACM Conference on Management of Emergent Digital EcoSystems , Oct 2013, Neumünster Abbey, Luxembourg. pp.60 - 67
Communication dans un congrès
hal-00944940v1
|
|
Towards Automated Assistance for Mined Roles Analysis in Role Mining ApplicationsARES 2012 : 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.123 - 132, ⟨10.1109/ARES.2012.61⟩
Communication dans un congrès
hal-01213900v1
|
|
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Communication dans un congrès
hal-00737170v1
|
HADEGA : a novel MPLS-based mitigation solution to handle network attacksIPCCC '12 : IEEE 31st International Performance Computing and Communications Conference, Dec 2012, Austin, United States. pp.171-180, ⟨10.1109/PCCC.2012.6407750⟩
Communication dans un congrès
hal-00813393v1
|
|
|
Detection des anomalies dans les pare-feux de nouvelles generationsSAR-SII 2012 : 7th Conference on Network and Information Systems Security, May 2012, Cabourg, France
Communication dans un congrès
hal-01865228v1
|
A model-driven approach for the extraction of network access-control policiesModel-Driven Security Workshop, Nora Koch, Alexander Knapp, Geri Georg, Marina Egea, Benoit Baudry, Oct 2012, Innsbruck, Austria
Communication dans un congrès
hal-00734230v1
|
|
Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progressFPS 2011: 4th Canada-France MITACS Workshop on Foundations & Practice of Security, May 2011, Paris, France. pp.242-252
Communication dans un congrès
hal-00668166v1
|
|
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tagsIECON 2011: 37th Annual Conference of the IEEE Industrial Electronics Society, Nov 2011, Melbourne, Australia. pp.3820 - 3825, ⟨10.1109/IECON.2011.6119932⟩
Communication dans un congrès
hal-00725612v1
|
|
|
Mitigation of flooding disruption attacks in hierarchical OLSR networksCNSR 2011: 9th Annual Communication Networks and Services Research Conference, May 2011, Ottawa, Canada. pp.167-174, ⟨10.1109/CNSR.2011.32⟩
Communication dans un congrès
hal-00623195v1
|
Sécuriser les communications dans les systèmes de surveillance médicale - Protocoles appliqués aux étiquettes à faible coûtINFORSID 2010 : XXIIIe congrès INFORSID, May 2010, Marseille, France
Communication dans un congrès
hal-00565842v1
|
|
|
Model-driven security policy deployment: property oriented approachESSos 2010 : second International symposium on Engineering Secure Software and Systems, Feb 2010, Pise, Italy. pp.123-139, ⟨10.1007/978-3-642-11747-3_10⟩
Communication dans un congrès
hal-00540842v1
|
|
Mitigation of topology control traffic attacks in OLSR networks5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Oct 2010, Montréal, Canada. pp.1-8, ⟨10.1109/CRISIS.2010.5764920⟩
Communication dans un congrès
hal-00623629v1
|
Securing the communications of home health care systems based on RFID Sensor networksConference on Communications Networks and Services Research, May 2010, Montréal, Canada
Communication dans un congrès
hal-00484511v1
|
|
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tagsFC 2010 Workshops and 14th Financial Cryptograpy and Data Security International Conference, Jan 2010, Ténénérife, Spain. pp.34-56
Communication dans un congrès
hal-00527593v1
|
|
|
MIRAGE: a management tool for the analysis and deployment of network security policies3rd SETOP International Workshop on Autonomous and Spontaneous Security (Co-located with ESORICS 2010), Sep 2010, Athens, Greece. pp.203-215, ⟨10.1007/978-3-642-19348-4_15⟩
Communication dans un congrès
hal-00623634v1
|
A multiple-polynomial LFSR based pseudorandom number generator design for EPC gen2 systemsMitacs Workshop on Network Security & Cryptography, Jun 2010, Toronto, Canada
Communication dans un congrès
hal-00527573v1
|
|
|
Protocoles d'échange de clés pour des systèmes de surveillance à base de radio-étiquettes5th Conference on Network Architectures and Information Systems, May 2010, Rocquebrune Cap-Martin, France
Communication dans un congrès
hal-00609294v1
|
Evaluation of Two Privacy-Preserving Protocols for the DNS2009 Sixth International Conference on Information Technology: New Generations, Apr 2009, Las Vegas, United States. pp.411-416, ⟨10.1109/ITNG.2009.195⟩
Communication dans un congrès
hal-03628760v1
|
|
Semantic context aware security policy deploymentthe 4th International Symposium, Mar 2009, Sydney, France. pp.251, ⟨10.1145/1533057.1533092⟩
Communication dans un congrès
hal-03628758v1
|
|
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers2009 Seventh Annual Communication Networks and Services Research Conference (CNSR), May 2009, Moncton, Canada. pp.86-93, ⟨10.1109/CNSR.2009.23⟩
Communication dans un congrès
hal-03628765v1
|
|
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor24th IFIP TC-11 International Information Security Conference (IFIPsec2009), May 2009, Pafos, Cyprus. pp.164-175, ⟨10.1007/978-3-642-01244-0_15⟩
Communication dans un congrès
hal-03628762v1
|
|
|
Spyware-based menaces against web applicationsInternational Conference on Intelligent Networking and Collaborative Systems, Nov 2009, Barcelone, Spain. pp.409-412, ⟨10.1109/INCOS.2009.31⟩
Communication dans un congrès
hal-00527605v1
|
|
Security threat mitigation trends in low-cost RFID systemsDPM-SETOP 2009 : 4th International Workshop on Data Privacy Management and Second International Workshop on Autonomous and Spontaneous Security, Sep 2009, Saint Malo, France. pp.193-207
Communication dans un congrès
hal-00540876v1
|
A secured delegation of remote services on IPv6 home networksThe 4th International Conference on Risks and Security of Internet and Systems, Oct 2009, Toulouse, France
Communication dans un congrès
hal-02369611v1
|
|
Semantic context aware security policy deploymentASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Mar 2009, Sydney, Australia. pp.251 - 261, ⟨10.1145/1533057.1533092⟩
Communication dans un congrès
hal-02369624v1
|
|
Anonymous Resolution of DNS QueriesInternational Workshop on Information Security (IS'08), International OTM Conference, Nov 2008, Monterrey, Mexico. pp.987-1000, ⟨10.1007/978-3-540-88873-4_5⟩
Communication dans un congrès
hal-03628757v1
|
|
Analysis of Threats to the Security of EPC Networks2008 6th Annual Communication Networks and Services Research Conference (CNSR), May 2008, Halifax, Canada. pp.67-74, ⟨10.1109/CNSR.2008.69⟩
Communication dans un congrès
hal-03628754v1
|
|
Security Threats on EPC Based RFID Systems2008 Fifth International Conference on Information Technology: New Generations (ITNG), Apr 2008, Las Vegas, United States. pp.1242-1244, ⟨10.1109/ITNG.2008.206⟩
Communication dans un congrès
hal-03628751v1
|
|
Distributed Exchange of Alerts for the Detection of Coordinated Attacks2008 6th Annual Communication Networks and Services Research Conference (CNSR '08), May 2008, Halifax, Canada. pp.96-103, ⟨10.1109/CNSR.2008.70⟩
Communication dans un congrès
hal-03628753v1
|
|
|
Evaluation of Anonymized ONS QueriesWorkshop on Security of Autonomous and Spontaneous Networks (SETOP 2008), Oct 2008, Loctudy, France
Communication dans un congrès
hal-03628755v1
|
Prevention of Cross-Site Scripting Attacks on Current Web Applications2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007), Nov 2007, Vilamoura, Portugal. pp.1770-1784, ⟨10.1007/978-3-540-76843-2_45⟩
Communication dans un congrès
hal-03628749v1
|
|
Aggregating and Deploying Network Access Control PoliciesThe Second International Conference on Availability, Reliability and Security (ARES'07), Apr 2007, Vienna, France. pp.532-542, ⟨10.1109/ARES.2007.34⟩
Communication dans un congrès
hal-03628743v1
|
|
Reliable Process for Security Policy DeploymentInternational Conference on Security and Cryptography, Jul 2007, Barcelona, France. pp.5-15, ⟨10.5220/0002119200050015⟩
Communication dans un congrès
hal-03628747v1
|
|
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web ApplicationsIFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security, Oct 2007, Malaga, Spain. pp.287-298, ⟨10.1007/978-3-540-89173-4_24⟩
Communication dans un congrès
hal-03628748v1
|
|
Reliable process for security policy deploymentSECRYPT 2007 : international conference on security and cryptography, Jul 2007, Barcelone, Spain
Communication dans un congrès
hal-02368751v1
|
|
|
Analysis of policy anomalies on distributed network security setupsESORICS 2006 : 11th European Symposium on Research in Computer Security, Sep 2006, Hamburg, Germany. pp.496-511
Communication dans un congrès
hal-00540450v1
|
|
Detection of Network Security Component Misconfiguration by Rewriting and Correlation5th Conference on Security and Network Architectures (SAR-SSI2006), Jun 2006, Seignose, France
Communication dans un congrès
hal-03628721v1
|
|
Towards filtering and alerting rule rewriting on single-component policiesProceedings of the 25th International Conference, SAFECOMP 2006, Jun 2006, Gdansk, Poland. pp.182-194
Communication dans un congrès
hal-00540448v1
|
Protecting on-line casinos against fraudulent player drop-outInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, ⟨10.1109/ITCC.2005.232⟩
Communication dans un congrès
hal-03628680v1
|
|
|
Detection and Removal of Firewall Misconfiguration2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 ), Nov 2005, Phoenix, United States
Communication dans un congrès
hal-03628708v1
|
Secure agent-based management for pervasive environmentsProceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.133-136, ⟨10.1109/CCST.2005.1594864⟩
Communication dans un congrès
hal-03628681v1
|
|
Digital chips for an on-line casinoInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, ⟨10.1109/ITCC.2005.130⟩
Communication dans un congrès
hal-03628687v1
|
|
Misconfiguration Management of Network Security Components7th International Symposium on System and Information Security (SSI 2005), Nov 2005, Sao Paolo, Brazil
Communication dans un congrès
hal-03628705v1
|
|
Mechanisms for attack protection on a prevention frameworkProceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.137-140, ⟨10.1109/CCST.2005.1594872⟩
Communication dans un congrès
hal-03628695v1
|
|
Protecting on-line casinos against fraudulent player drop-outITCC 2005 : IEEE international conference on information technology , Apr 2005, Las Vegas, United States. pp.500 - 505, ⟨10.1109/ITCC.2005.232⟩
Communication dans un congrès
hal-00540862v1
|
|
An alert communication infrastructure for a decentralized attack prevention frameworkProceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.234-237, ⟨10.1109/CCST.2005.1594878⟩
Communication dans un congrès
hal-03628691v1
|
|
|
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlationICICS 2004: 6th International Conference on Informa- tion and Communications Security, Oct 2004, Malaga, Spain. pp.223 - 235, ⟨10.1007/978-3-540-30191-2_18⟩
Communication dans un congrès
hal-00540841v1
|
|
Non-stationary watermark-based attack detection to protect cyber-physical control systemsEmerging Trends in Cybersecurity Applications, Springer International Publishing, pp.347-370, 2022, 978-3-031-09640-2. ⟨10.1007/978-3-031-09640-2_16⟩
Chapitre d'ouvrage
hal-03958379v1
|
Security and privacy in the TeSLA architectureEngineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩
Chapitre d'ouvrage
hal-02393547v1
|
|
|
Security and privacy concerns about the RFID layer of EPC Gen2 networksAdvanced research in data privacy, 567, Springer international publishing, pp.303 - 324, 2014, Studies in Computational Intelligence 978-3-319-09884-5. ⟨10.1007/978-3-319-09885-2_17⟩
Chapitre d'ouvrage
hal-01264797v1
|
|
Security issues in link state routing protocols for MANETsAdvances in network analysis and its applications network security and cryptography, Springer, pp.117-148, 2013, Mathematics in Industry, 978-3-642-30903-8. ⟨10.1007/978-3-642-30904-5_6⟩
Chapitre d'ouvrage
hal-00949321v1
|
Handling security threats to the RFID system of EPC networksSecurity of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, Taylor & Francis Group, pp.45-64, 2010
Chapitre d'ouvrage
hal-00623632v1
|
|
Management of Exceptions on Access Control PoliciesNew Approaches for Security, Privacy and Trust in Complex Environments, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, ⟨10.1007/978-0-387-72367-9_9⟩
Chapitre d'ouvrage
hal-03628745v1
|
|
Protection of Components Based on a Smart-Card Enhanced Security ModuleCritical Information Infrastructures Security, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, ⟨10.1007/11962977_11⟩
Chapitre d'ouvrage
hal-03628730v1
|
|
SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security ComponentsOn the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, ⟨10.1007/11915034_65⟩
Chapitre d'ouvrage
hal-03628734v1
|
|
Towards Filtering and Alerting Rule Rewriting on Single-Component PoliciesComputer Safety, Reliability, and Security, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, ⟨10.1007/11875567_14⟩
Chapitre d'ouvrage
hal-03628725v1
|
|
Decoupling Components of an Attack Prevention System Using Publish/SubscribeIntelligence in Communication Systems, Springer-Verlag, pp.87-97, 2005, ⟨10.1007/0-387-32015-6_9⟩
Chapitre d'ouvrage
hal-03628700v1
|
|
Amapola: a simple infrastructure for ubiquitous computingRoch Glitho; Ahmed Karmouch; Samuel Pierre. Intelligence in Communication Systems, 190, Springer-Verlag, pp.77-86, 2005, IFIP — The International Federation for Information Processing book series (IFIPAICT), ⟨10.1007/0-387-32015-6_8⟩
Chapitre d'ouvrage
hal-03628697v1
|
|
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert CorrelationInformation and Communications Security, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-30191-2_18⟩
Chapitre d'ouvrage
hal-03628684v1
|
|
Contributions to the security of EPC/RFID wireless technologiesCryptography and Security [cs.CR]. Université Pierre et Marie Curie, Paris VI; Télécom SudParis (Institut Mines-Télécom), 2013
HDR
tel-03646853v1
|
Cyber-resilience approaches for cyber-physical systemsTélécom SudParis (Institut Mines-Télécom). 2023
Rapport
hal-04495662v1
|
|
|
On the difficulty of hiding the balance of lightning network channels[Research Report] Dépt. Réseaux et Service de Télécom (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Department of Information and Communications Engineering (Autonomous University of Barcelona). 2019, pp.13
Rapport
hal-02086536v1
|
|
Quantum computing assisted medium access control for multiple client station networks[Research Report] Dépt. Réseaux et Service de Télécom (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); School of Computer Science [Ottawa] (Carleton University). 2015, pp.18
Rapport
hal-01263388v1
|
Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected PapersLecture Notes in Computer Science, 13877, Springer Nature Switzerland, pp.1-471, 2023, Lecture Notes in Computer Science (LNCS), 978-3-031-30121-6. ⟨10.1007/978-3-031-30122-3⟩
Proceedings/Recueil des communications
hal-04180387v1
|
|
EICC 2022: european interdisciplinary cybersecurity conferenceACM; ACM, 2022, ⟨10.1145/3528580⟩
Proceedings/Recueil des communications
hal-04006360v1
|
|
Risks and security of internet and systemsCRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩
Proceedings/Recueil des communications
hal-03628457v1
|
|
Computer security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 revised selected papersESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11980, Springer, pp.440, 2020, Lecture Notes in Computer Science (LNCS), 978-3-030-42047-5. ⟨10.1007/978-3-030-42048-2⟩
Proceedings/Recueil des communications
hal-03125793v1
|
|
2020 4th Cyber Security in Networking Conference (CSNet)Solange Ghernaouti-Hélie; Abdelmalek Benzekri; Romain Laborde; Nadjib Aitsaadi; Joaquin Garcia‐Alfaro. 4th Cyber Security in Networking Conference: Cyber Security in Networking (CSNet 2020), Oct 2020, Lausanne, Switzerland. IEEE: Institute of Electrical and Electronics Engineers, 2020, 978-0-7381-4292-0. ⟨10.1109/CSNet50428.2020⟩
Proceedings/Recueil des communications
hal-03184958v1
|
|
Computer security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, revised selected papersESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11981, Springer, pp.279, 2020, Lecture Notes in Computer Science(LNCS), 978-3-030-42050-5. ⟨10.1007/978-3-030-42051-2⟩
Proceedings/Recueil des communications
hal-03125783v1
|
|
Data privacy management, cryptocurrencies and blockchain technologyESORICS 2019, DPM 2019 and CBT 2019 : Data Privacy Management, Cryptocurrencies and Blockchain Technology, Sep 2019, Luxembourg, Luxembourg. 11737, Springer, 400 p., 2019, Lecture Notes in Computer Science book series: Security and Cryptology book sub series, 978-3-030-31499-6. ⟨10.1007/978-3-030-31500-9⟩
Proceedings/Recueil des communications
hal-02390284v1
|
|
Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papersESORICS 2018 international workshops (ISSA 2018) and (CSITS 2018), Lecture Notes in Computer Science, LNCS 11552, Springer International Publishing, pp.1--173, 2019, Security and Cryptology, LNCS, 978-3-030-16873-5. ⟨10.1007/978-3-030-16874-2⟩
Proceedings/Recueil des communications
hal-02086531v1
|
Foundations and practice of securityBenzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin. FPS 2019: 12th International Symposium on Foundations and Practice of Security, Nov 2019, Toulouse, France. Lecture Notes in Computer Science, 12056, 408 p., 2020, Lecture Notes in Computer Science book series (LNCS), 978-3-030-45370-1. ⟨10.1007/978-3-030-45371-8⟩
N°spécial de revue/special issue
hal-03001571v1
|
|
Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papersFPS 2017 - 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. Lecture Notes in Computer Science, 10723, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. ⟨10.1007/978-3-319-75650-9⟩
N°spécial de revue/special issue
hal-01869014v1
|
Les composants RFID, sont-ils vulnerables ?2009
Autre publication scientifique
hal-03628767v1
|
Platform of intrusion management : design and implementationCryptography and Security [cs.CR]. Telecom Bretagne; Universitat Autònoma de Barcelona, 2006. English. ⟨NNT : ⟩
Thèse
tel-03628739v1
|
Resource allocation method in distributed cloudsFrance, Patent n° : EP 15 305749.2. 2016
Brevet
hal-04386333v1
|