Publications

No picture
Vulnérabilités d'un système de fusion crédal à des sources corrompues : analyses et mesures de modèles d'attaque

Communication dans le cadre de la conférence Extraction & Gestion des Connaissances 2024 à Dijon.

2024-01-29 10:06:19 +0200 +0200
[Falsification d'information, fusion]

No picture
Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks

Publication de Robin Duraz lors de CoNEXT 2023: The 19th International Conference on emerging Networking EXperiments and Technologies.

2023-12-11 15:10:29 +0200 +0200
[detection, IDS, Machine Learning, XAI]

No picture
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems

Publication de Robin Duraz lors de European Interdisciplinary Cybersecurity Conference (EICC '23)

2023-06-07 14:10:29 +0200 CEST
[detection, IDS, Machine Learning, trust]

No picture
Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea

Communication lors de International Conference on Cybersecurity, Situational Awareness and Social Media

2023-04-03 16:10:29 +0200 CEST
[Maritime systems, GNSS, AIS, NMEA, Data collection]

No picture
Du concept de conflit cohérent en fusion d’informations vulnérables

Communication lors de la 28e édition du colloque GRETSI'22

2022-09-10 10:10:29 +0200 CEST
[Fusion d'information, classification]

No picture
Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea

Communication lors du congrès Cyber Science 2022, les 20 et 21 juin 2022 à Cardiff.

2022-06-21 10:10:29 +0200 CEST
[embedded system, Navigation, data]

No picture
Machine Learning and Visualization tools for Cyberattack Detection

Communication lors du congrès RESSI 2022 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information.

2022-05-10 10:10:29 +0200 CEST
[Machine Learning, cybersecurity, classification, visualization, data representation]

No picture
HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification

Communication lors de 26th International Conference on Engineering of Complex Computer Systems ( ICECCS 2022)

2022-03-26 10:15:30 +0200 +0200
[cybersecurity, human models, Human vulnerability, sociotechnical systems]

No picture
Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering

Communication lors de la 29e édition de l'IEEE 2021

2021-11-18 14:38:38 +0200 +0200
[Model-Based Systems Engineering, Security requirements, Risk assessment, System and security co-engineering]

No picture
Towards modeling of naval systems interdependencies for cybersecurity

Communication dans le cadre du congrès OCEANS 2021 à San Diego

2021-09-20 10:06:19 +0200 CEST
[Naval systems dependencies, cybersecurity, information technology, operational technology, graph representation]

No picture
Obérisk: Cybersecurity Requirements Elicitation through Agile Remote or Face-to-Face Risk Management Brainstorming Sessions

2021-08-27 14:17:36 +0200 CEST
[risk management; EBIOS; face-to-face; brainstorming; inter/cross-disciplinary; obeya; posters; sticky notes; cybersecurity requirements; naval/ship use case]

No picture
Impact Assessment of Anomaly Propagation in a Naval Water Distribution Cyber-Physical System

Communication lors du congrès CSR 2021: IEEE International Conference on Cyber Security and Resilience

2021-07-26 10:01:19 +0200 CEST
[]

No picture
Statistical Measurement of Production Environment Influence on Code Reuse Availability

Communication pour le congrès SECURWARE 2019

2019-10-27 17:11:22 +0200 +0200
[Code-reuse exploits, ROP, Return-Oriented-Programming]

No picture
Hierarchical majority-rule sorting models for temporal multi-criteria decision aiding

Communication pour le congrès ROADEF 2019

2019-02-19 17:05:07 +0200 +0200
[multi-criteria decision aiding, sorting, outranking relation, mixed-integer programming, times series]

No picture
The Challenge of Quality Evaluation in Fraud Detection

Papier publié dans Journal of data and information quality

2018-09-07 16:59:26 +0200 CEST
[Fraud life cycle, Cumulative indicators, Context, Data analytics, Quality meta-analysis]

No picture
Analysis of Quality Measurements to Categorize Anomalies in Sensor Systems

Communication dans le congrès 'Computing 2017 : Science and Information Conference'

2017-07-18 16:44:45 +0200 CEST
[Sensor, Anomaly categorization, Data quality, Information quality, Cyber-physical system]

No picture
Generating data sets as inputs of reference for cyber security issues and industrial control systems

Communication au congrès RCIS 2017

2017-05-10 16:26:43 +0200 CEST
[Marine vehicles, Context, Engines, Integrated circuits, Automata, Computer security]

No picture
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges

Communication lors du congrès C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security

2017-04-10 15:33:09 +0200 CEST
[Homomorphic encryption, Implementation]

No picture
Monitoring Approach of Cyber-physical Systems by Quality Measures

Communication à S-CUBE 2016 : 7th International Conference on Sensor Systems and Software

2016-12-31 14:23:30 +0200 +0200
[#Monitoring #sensor #data #system #network]

No picture
Survey and analysis of DNS infrastructures

Rapport de recherche effectué dans le cadre de REDOCS 2016 (Rencontres Entreprises DOCtorants Sécurité)

2016-06-01 10:22:09 +0200 CEST
[DNS, infrastructure]