Publications

The Sotern team exists since January 1, 2023. As such the following publications are those which form the background of permanent researchers in the area of the team research scope over the recent years.

Journals and patents

  1. Navas, R. E., Cuppens, F., Cuppens, N. B., Toutain, L. and Papadopoulos, G. Z. 2020. MTD, where art thou? a systematic review of moving target defense techniques for IoT. In: IEEE internet of things journal 8.10.
  2. Navas, R. E., Cuppens, F., Cuppens, N. B., Toutain, L. and Papadopoulos, G. Z. 2021. Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. In: Computer Networks 187.
  3. Cogranne, R., Doyen, G., Ghadban, N. and Hammi, B. 2018. Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments. In: IEEE Transactions on Network and Service Management 15.1.
  4. Samba, A., Busnel, Y., Blanc, A., Dooze, P. and Simon, G. 2018. Predicting file downloading time in cellular network: Large-Scale analysis of machine learning approaches. In: Computer Networks 145.
  5. Alhadad, N., Serrano-Alvarado, P., Busnel, Y. and Lamarre, P. 2015. System Modeling and Trust Evaluation of Distributed Systems. In: Transactions on Large-Scale Data- and Knowledge-CenteredSystems 22.9430.
  6. Anceaume, E., Busnel, Y. and Sericola, B. 2021. Byzantine-tolerant Uniform Node Sampling Servicein Large-scale Networks. In: International Journal of Parallel, Emergent and Distributed Systems 36.5.
  7. Cuppens, F. Autrel, F. et al. 2006. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. In: Annales des télécommunications. Vol. 61. 1. Springer.
  8. Cailleux, l., Bouabdallah, A. and Gombault, S. 2014. Architecture de soumission différenciée. Brevet dépôt n° 1300752.
  9. Cailleux, L. and Bouabdallah, A. 2015. A correspondence model for a future military messaging handling system. In: IEEE Commun. Mag. 53.10.
  10. Szczerbak, M., Toutain, F., Bouabdallah, A. and Bonnin, J. 2014. KRAMER: New Social MediumBased on Collaborative Recognition of Important Situations. In: Comput. J. 57.9.
  11. Tidiane Sylla, Mohamed-Aymen Chalouf, Francine Krief, Karim Samaké, “SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things”, Security and Communications Networks, 2021.
  12. Amal Sammoud, Mohamed-Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue, “A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis”, in Computers & Security, COSE, Elsevier, Vol 96, September 2020.

Conferences

  1. Navas, R. E. et al. 2020. IANVS: A moving target defense framework for a resilient Internet of Things. In: Symposium on Computers and Communications. ISCC. IEEE.
  2. Letourneau, M., [. . .], Doyen, G. et al. 2021. Assessing the Threats Targeting Low Latency Traffic: the Case of L4S. In: 17th International Conference on Network and Service Management. Ed. by P. Chemouil, M. Ulema, S. Clayman, M. Sayit, C. C ̧ etinkaya and S. Secci. CNSM. IEEE. IEEE.
  3. Durand, A., Anceaume, E. and Ludinard, R. 2019. StakeCube: Combining Sharding and Proof-of- Stake to Build Fork-Free Secure Permissionless Distributed Ledgers. In: 7th International Conference on Networked Systems, Revised Selected Papers. NETYS.
  4. Anceaume, E., Guellier, A., Ludinard, R. and Sericola, B. 2018. Sycomore : a Permissionless Dis- tributed Ledger that self-adapts to Transactions Demand. In: 17th IEEE International Symposium on Network Computing and Applications. NCA.
  5. Anceaume, E., Busnel, Y., Rivetti, N. and Sericola, B. 2015. Identifying global icebergs in distributed streams. In: 34th Symposium on Reliable Distributed Systems. SRDS. IEEE.
  6. Mai, H. L., Doyen, G., Mallouli, W., de Oca, E. M. and Festor, O. 2019. Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. In: 15th International Conference on Network and Service Management. CNSM.
  7. Ghadban, N., Cogranne, R. and Doyen, G. 2017. A decentralized approach for adaptive workload estimation in virtualized environments. In: Symposium on Integrated Network and Service Management). IM. IFIP/IEEE.
  8. Anceaume, E., [. . .], Busnel, Y., [. . .], Ludinard, R. et al. 2014. Anomaly Characterization in Large Scale Networks. In: 44th Annual International Conference on Dependable Systems and Networks. DSN.IEEE/IFIP.
  9. Anceaume, E., Busnel, Y., Lajoie-Mazenc, P. and Texier, G. 2015. Reputation for Inter-Domain QoSRouting. In: 14th International Symposium on Network Computing and Applications. Ed. by D. R.Avresky and Y. Busnel. NCA. IEEE.
  10. Autrel, F., Cuppens-Boulahia, N. and Cuppens, F. 2012. Enabling dynamic security policy inthe Java security manager. In: International Symposium on Foundations and Practice of Security.Springer.
  11. Autrel, F., Cuppens, F., Cuppens-Boulahia, N. and Coma, C. 2008. MotOrBAC 2: a security policy tool. In: 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI2008), Loctudy, France.
  12. [19]  Smine, M., Espes, D. and Pahl, M.-O. 2022. Optimal Access Control Deployment in NetworkFunction Virtualization. In: Network Operations and Management Symposium. NOMS. IEEE/IFIP.
  13. Jiang, H., Bouabdallah, A., Aflatoonian, A., Bonnin, J. and Guillouard, K. 2016. A Secure Multi- Tenant Framework for SDN. In: Proceedings of the 9th International Conference on Security of Information and Networks. ACM.
  14. Kabil, A., Duval, T. and Pahl, M.-O. 2021. Training and Data Analysis use cases for Cybersecurity through Mixed Reality Applications. VR4Sec: 1st International Workshop on Security for XR and XRfor Security.
  15. Delcombel, N., Kabil, A., Duval, T. and Pahl, M.-O. 2021. CyberCopter: a 3D helical visualisationfor periodic signals of cyber attacks. VR4Sec: 1st International Workshop on Security for XR and XRfor Security.
  16. Pahl, M.-O., Kabil, A., Bourget, E., Gay, M. and Brun, P.-E. 2020. A Mixed-Interaction CriticalInfrastructure Honeypot. In: European Cyber Week CAESAR, 2020, Rennes, France.
  17. Léo Mendiboure, Mohamed-Aymen Chalouf, Francine Krief, “A scalable blockchain-based approach for authentication and access control in software defined vehicular networks”, The 29th International Conference on Computer Communications and Networks, ICCCN 2020, Honolulu, Hawai, USA, August 2020, IEEE, pp. 1-11

Comments are closed.