selected publications
-
academic article
- Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications. 77:727-729. 2022
- Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications. 77:789-812. 2022
- Towards security-Aware 5G slice embedding. Computers & Security. 100:102075-102075. 2020
- Solving security constraints for 5G slice embedding: A proof-of-concept. Computers & Security. 89:101662-101662. 2019
- An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access. 7:130758-130771. 2019
- ArOMA: An SDN based autonomic DDoS mitigation framework. Computers & Security. 70:482-499. 2017
- Combining Technical and Financial Impacts for Countermeasure Selection. arXiv (Cornell University). 165:1-14. 2014
-
book
- Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings 2018
- Information and Communications Security 2018
- Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings 2018
- Research in Attacks, Intrusions, and Defenses 2016
-
chapter
- Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework. Lecture notes in computer science. 142-157. 2023
- Industry and Standardization Aspects. Studies in big data. 99-124. 2020
- Introduction. Studies in big data. 1-2. 2020
- Legal and Policy Aspects. Studies in big data. 3-35. 2020
- Research and Innovation Aspects. Studies in big data. 37-97. 2020
- Summary. Studies in big data. 125-127. 2020
- Siamese Network Based Feature Learning for Improved Intrusion Detection. Lecture notes in computer science. 377-389. 2019
- Hybrid Risk Assessment Model Based on Bayesian Networks. Lecture notes in computer science. 21-40. 2016
- ML: DDoS Damage Control with MPLS. Lecture notes in computer science. 101-116. 2016
- Automated Classification of C&C Connections Through Malware URL Clustering. IFIP advances in information and communication technology. 252-266. 2015
- Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification. Lecture notes in computer science. 223-232. 2015
- Policy Enforcement Point Model. Springer eBooks. 278-286. 2015
-
conference paper
- Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux. . 2023
- Survey on intrusion detection systems in 5G. . 2023
- Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. HAL (Le Centre pour la Communication Scientifique Directe). 2022
- Automated Saturation Mitigation Controlled by Deep Reinforcement Learning. . 1-6. 2020
- Machine learning for IoT network monitoring. HAL (Le Centre pour la Communication Scientifique Directe). 2019
- IoT Devices Recognition Through Network Traffic Analysis. 2021 IEEE International Conference on Big Data (Big Data). 2018
- Network visibility-aware blacklist generation. . 2018
- On automatic network environment cloning for facilitating cybersecurity training and testing. . 2018
- Secure migration of virtual SDN topologies. . 2018
- Multi-Provider Secure Virtual Network Embedding. . 1-5. 2018
- Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. . 1-5. 2017
- Adaptive Policy-driven Attack Mitigation in SDN. . 1-6. 2017
- Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case. . 578-585. 2016
- AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. . 74-84. 2015
- Towards Autonomic DDoS Mitigation using Software Defined Networking. . 2015
- Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. . 30-39. 2014
- EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. . 56-65. 2014
- Attribute-Based Mining Process for the Organization-Based Access Control Model. . 421-430. 2013
-
document
- REWIRE -Cybersecurity skills alliance: a new vision for Europe. . 2023
- Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense). HAL (Le Centre pour la Communication Scientifique Directe). 2021
-
proceedings