selected publications
-
academic article
- Solving security constraints for 5G slice embedding: A proof-of-concept. Computers & Security. 89:101662-101662. 2019
- Evaluating security products: formal model and requirements of a new approach. . 2019
- ArOMA: An SDN based autonomic DDoS mitigation framework. Computers & Security. 70:482-499. 2017
- A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences. 83:3-21. 2016
- Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Computers & Electrical Engineering. 47:13-34. 2015
- Combining Technical and Financial Impacts for Countermeasure Selection. arXiv (Cornell University). 165:1-14. 2014
- RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security. 13:63-79. 2013
- An ontology-driven approach to model SIEM information and operations using the SWRL formalism. International Journal of Electronic Security and Digital Forensics. 4:104-104. 2012
- An ontology-based approach to react to network attacks. International Journal of Information and Computer Security. 3:280-280. 2009
-
book
-
chapter
- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks. Lecture notes in computer science. 637-657. 2022
- An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. Lecture notes in computer science. 87-102. 2017
- Choosing Models for Security Metrics Visualization. Lecture notes in computer science. 75-87. 2017
- Attack Volume Model: Geometrical Approach and Application. Lecture notes in computer science. 242-257. 2016
- Hybrid Risk Assessment Model Based on Bayesian Networks. Lecture notes in computer science. 21-40. 2016
- ML: DDoS Damage Control with MPLS. Lecture notes in computer science. 101-116. 2016
- Towards an Automated and Dynamic Risk Management Response System. Lecture notes in computer science. 37-53. 2016
- Automated Classification of C&C Connections Through Malware URL Clustering. IFIP advances in information and communication technology. 252-266. 2015
- Policy Enforcement Point Model. Springer eBooks. 278-286. 2015
- Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. Security and Privacy in Communication Networks. 538-555. 2015
- Challenges for Advanced Security Monitoring – The MASSIF Project. Lecture notes in computer science. 222-223. 2012
- Individual Countermeasure Selection Based on the Return On Response Investment Index. Lecture notes in computer science. 156-170. 2012
- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Lecture notes in computer science. 203-217. 2012
- Challenges for Cloud Networking Security. Mobile Networks and Management. 298-313. 2011
- A Service Dependency Model for Cost-Sensitive Intrusion Response. Lecture notes in computer science. 626-642. 2010
-
conference paper
- CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA). 1600-1607. 2021
- Automated Saturation Mitigation Controlled by Deep Reinforcement Learning. . 1-6. 2020
- Machine learning for IoT network monitoring. HAL (Le Centre pour la Communication Scientifique Directe). 2019
- IoT Devices Recognition Through Network Traffic Analysis. 2021 IEEE International Conference on Big Data (Big Data). 2018
- A new approach of network simulation for data generation in evaluating security products. . 2018
- On automatic network environment cloning for facilitating cybersecurity training and testing. . 2018
- Multi-Provider Secure Virtual Network Embedding. . 1-5. 2018
- Adaptive Policy-driven Attack Mitigation in SDN. . 1-6. 2017
- Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. 2015 IEEE Trustcom/BigDataSE/ISPA. 340-348. 2016
- Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. . 137-146. 2016
- Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). . 1-6. 2015
- TLS Record Protocol. . 225-236. 2015
- Towards Autonomic DDoS Mitigation using Software Defined Networking. . 2015
- Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. . 30-39. 2014
- Attribute-Based Mining Process for the Organization-Based Access Control Model. . 421-430. 2013
- A TCP delay-based mechanism for detecting congestion in the Internet. . 141-145. 2013
- RetroVisor : nested virtualization for multi IaaS VM availability. HAL (Le Centre pour la Communication Scientifique Directe). 2013
- One Year of Internet SSL measurement. Annual Computer Security Applications Conference. 27. 2012
- Cross-domain vulnerabilities over social networks. . 8-13. 2012
- Formalization of Viruses and Malware Through Process Algebras. . 597-602. 2010
- Evaluation of P4P Based on Real Traffic Measurement. . 129-134. 2010
- An application of a recurrent network to an intrusion detection system. . 2003
-
document
- Alvolution - al and digital technologies in the European Union. . 2024
- REWIRE -Cybersecurity skills alliance: a new vision for Europe. . 2023
- Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense). HAL (Le Centre pour la Communication Scientifique Directe). 2021