Publications

YearType of publicationAuteurKeyword
   

Journal article - peer reviewed (13)

BELGUITH Sana, KAANICHE Nesrine, LAURENT Maryline, JEMAI Abderrazak , ATTIA Rabah
PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer networks - The international journal of computer and telecommunications networking, march 2018, vol. 133, pp. 141-156
[PDF]
abstract

BRANDWAJN Alexandre, BEGIN Thomas, CASTEL-TALEB Hind, ATMACA Tülin
A study of systems with multiple operating levels, probabilistic thresholds and hysteresis. IEEE transactions on parallel and distributed systems, april 2018, vol. 29, n° 4, pp. 748-757
URL: https://hal.archives-ouvertes.fr/hal-01670974/document
abstract

DIEYE Mouhamad, AHVAR Shohreh, SAHOO Jagruti, AHVAR Ehsan, GLITHO Roch, ELBIAZE Halima, CRESPI Noel
CPVNF: Cost-efficient Proactive VNF placement and chaining for value-added services in content delivery networks. IEEE transactions on network and service management, june 2018, vol. 15, n° 2, pp. 774-786
abstract

GENSOLLEN Nicolas, GAUTHIER Vincent, BECKER Monique, MAROT Michel
Stability and performance of coalitions of prosumers through diversification in the smart grid. IEEE transactions on smart grid, march 2018, vol. 9, n° 2, pp. 963-970
[PDF]
abstract

GONZALEZ GRANADILLO Gustavo Daniel, DUBUS Samuel, MOTZEK Alexander, GARCIA-ALFARO Joaquin, ALVAREZ LOPEZ Ender Yesid, MERIALDO Matteo , PAPILLON Serge, DEBAR Hervé
Dynamic risk management response system to handle cyber threats. Future generation computer systems (FGCS), june 2018, vol. 83, pp. 535-552
abstract

GONZALEZ GRANADILLO Gustavo Daniel, RUBIO-HERNAN Jose, GARCIA-ALFARO Joaquin
Using an event data taxonomy to represent the impact of cyber events as geometrical instances. IEEE access, 2018, vol. 6, pp. 8810-8828
[PDF]
abstract

HASSINE Kawther, FRIKHA Mounir, CHAHED Tijani
Access point backhaul capacity aggregation as a matching game in the context of wireless local area networks. Computer networks - The international journal of computer and telecommunications networking, july 2018, vol. 139, pp. 92-108
abstract

LABIDI Wael, CHAHED Tijani, ELAYOUBI Salah-Eddine
Optimal battery management strategies in mobile networks powered by a smart grid. IEEE transactions on green communications and networking, september 2018, vol. 2, n° 3, pp. 859-867
abstract

MORCOS Mira, CHAHED Tijani, CHEN Lin, ELIAS Jocelyne, MARTIGNON Fabio
A two-level auction for resource allocation in multi-tenant C-RAN. Computer networks - The international journal of computer and telecommunications networking, april 2018, vol. 135, pp. 240-252
abstract

NGUYEN Kim Thuat, OUAHLA Nouha, LAURENT Maryline
Securely outsourcing the ciphertext-policy attribute-based encryption. World wide web, january 2018, vol. 21, n° 1, pp. 169-183
abstract

RUBIO-HERNAN Jose, SAHAY Rishikesh, DE CICCO Luca, GARCIA-ALFARO Joaquin
Cyber‐physical architecture assisted by programmable networking. Internet technology letters, july 2018, vol. 1, n° 4, pp. e44-1-e44-8
URL: https://arxiv.org/pdf/1802.02360v1.pdf
abstract

RUBIO-HERNAN Jose, DE CICCO Luca, GARCIA-ALFARO Joaquin
Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on emerging telecommunications technologies, july 2018, vol. 29, n° 7, pp. e3209-1-e3209-17
[PDF]
abstract

WANG Leye, GAUTHIER Vincent, CHEN Guanling,  MOREIRA‑MATIAS Luis
Special issue on extracting crowd intelligence from pervasive and social big data. Journal of ambient intelligence and humanized computing, 2018, pp. 1-2 (document in press - published online 15 Jan 2018)
abstract

Communication in a conference - peer reviewed (15)

ATMACA Tülin, KAMLI Amira, RATAJ Artur
Adaptation of N-GREEN architecture for a bursty traffic. CN 2018: 25th International Conference on Computer Networks , Cham : Springer, 19-22 june 2018, Gliwice, Poland, 2018, pp. 232-244, ISBN 978-3-319-92458-8
abstract

BOUTIGNY François, BETGE-BREZETZ Stephane, DEBAR Hervé, BLANC Gregory, LAVIGNOTTE Antoine, POPESCU Ion
Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Los Alamitos : IEEE Computer Society, 26-28 february 2018, Paris, France, 2018, pp. 1-5, ISBN 978-1-5386-3662-6
abstract

DHAMAL Swapnil Vilas, BEN-AMEUR Walid, CHAHED Tijani, ALTMAN Eitan
Resource allocation polytope games: uniqueness of equilibrium, price of stability, and price of anarchy. AAAI 2018 : 32nd AAAI conference on Artificial Intelligence, Palo Alto : Association for the Advancement of Artificial Intelligence, 02-07 february 2018, New Orleans, United States, 2018, pp. 997-1006
abstract

DIOP Aida, GHAROUT Said, LAURENT Maryline, LENEUTRE Jean, TRAORÉ Jacques
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York : ACM, 18-20 june 2018, Stockholm, Sweden, 2018, pp. 202-207, ISBN 978-1-4503-5731-9
[PDF]
abstract

DRAMÉ-MAIGNÉ Sophie, LAURENT Maryline, CASTILLO Laurent, GANEM Hervé
Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Cham : Springer, 08 september - 10 august 2018, Singapour, Singapore, 2018 (document in press)
[PDF]
abstract

GONZALEZ GRANADILLO Gustavo Daniel, DOYNIKOVA Elena, KOTENKO Igor, GARCIA-ALFARO Joaquin
Attack graph-based countermeasure selection using a stateful return on investment metric. FPS 2017: 10th International Symposium on Foundations and Practice of Security, Cham : Springer, 23-25 october 2017, Nancy, France, 2018, pp. 293-302, ISBN 978-3-319-75649-3
abstract

HAMMAMI Seif Eddine, MOUNGLA Hassine, AFIFI Hossam
Proactive anomaly detection model for eHealth-enabled data in next generation cellular networks. ICC 2018 : IEEE International Conference on Communications , Los Alamitos : IEEE Computer Society, 20-24 may 2018, Kansas City, United States, 2018, pp. 1-6, ISBN 978-1-5386-3180-5
abstract

IBN KHEDHER Mohamed, JMILA Houda, EL YACOUBI Mounim
Fusion of interest point/image based descriptors for efficient person re-identification. IJCNN 2018 : International Joint Conference on Neural Networks, Los Alamitos : IEEE Computer Society, 08-13 july 2018, Rio De Janeiro, Brazil, 2018 (document in press)
abstract

KAANICHE Nesrine, LAURENT Maryline
SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Setubal : Scitepress, 26-28 july 2018, Porto, Portugal, 2018, vol. 2, pp. 155-167, ISBN 978-989-758-319-3
[PDF]
abstract

KAANICHE Nesrine, LAURENT Maryline, LE Christian, VANDER PLAETSE Mathieu
A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Setubal : Scitepress, 26-28 july 2018, Porto, Portugal, 2018, vol. 2, pp. 168-176, ISBN 978-989-758-319-3
[PDF]
abstract

KAMLI Amira, ATMACA Tülin, LEPERS Catherine, RATAJ Artur, AMAR Djamel
Performance improvement of colored optical packet switching thanks to time slot sharing. AICT 2018 : 14th Advanced International Conference on Telecommunications , Wilmington : IARIA, 22-26 june 2018, Barcelonna, Spain, 2018, pp. 28-31, ISBN 978-1-61208-650-7
URL: http://www.thinkmind.org/index.php?view=article&articleid=aict_2018_2_40_10051
abstract

MARILLONNET Paul, ATES Mikaël, LAURENT Maryline
Etat de l'art des technologies de la gestion des données personnelles par l'usager . APVP 2018: Atelier sur la Protection de la Vie Privée, 03-06 juin 2018, Porquerolles, France, 2018
abstract

SALEM Fatma Ezzahra, ALTMAN Zwi, GATI Azeddine, CHAHED Tijani, ALTMAN Eitan
Reinforcement learning approach for Advanced Sleep Modes management in 5G networks. VTC-FALL 2018 : 88th Vehicular Technology Conference, Los Alamitos : IEEE Computer Society, 27-30 august 2018, Chicago, United States, 2018 (document in press)
abstract

YORO Wilfried, EL TABACH Mamdouh, EN-NAJJARY Taoufik, GATI Azeddine, CHAHED Tijani
Energy efficiency of a network equipment per service category. ICC 2018 : IEEE International Conference on Communications, Los Alamitos : IEEE Computer Society, 20-24 may 2018, Kansas City, United States, 2018, pp. 1-6, ISBN 978-1-5386-3180-5
abstract

YORO Wilfried, EL TABACH Mamdouh, EN-NAJJARY Taoufik, GATI Azeddine, CHAHED Tijani
Sharing the network end-to-end energy consumption among service categories. VTC-Spring 2018 : 87th Vehicular Technology Conference, Los Alamitos : IEEE Computer Society, 03-06 june 2018, Porto, Portugal, 2018, pp. 1-7, ISBN 978-1-5386-6355-4
abstract

Book chapter (3)

KHATCHATOUROV Armen, LEVALLOIS-BARTH Claire, LAURENT Maryline, WAELBROECK Patrick
Conclusion . Signes de confiance : l’impact des labels sur la gestion des données personnelles, [Paris] : Institut Mines-Télécom, 2018, pp. 199-202, ISBN 978-2-9557308-4-3
abstract

LAURENT Maryline
La blockchain est-elle une technologie de confiance. Signes de confiance : l’impact des labels sur la gestion des données personnelles , [Paris] : Institut Mines-Télécom, 2018, pp. 179-198, ISBN 978-2-9557308-4-3
[PDF]
abstract

LAURENT Maryline, KHATCHATOUROV Armen
La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des données personnelles, [Paris] : Institut Mines-Télécom, 2018, pp. 47-62, ISBN 978-2-9557308-4-3
abstract

Direction d'ouvrage (3)

CUPPENS-BOULAHIA Nora, CUPPENS Frédéric, LANET Jean-Louis, LEGAY Axel , GARCIA-ALFARO Joaquin
Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers. Cham : Springer, 2018, (Lecture Notes in Computer Science (vol. 10694)), ISBN 978-3-319-76686-7
abstract

GIUFFRIDA Cristiano, BARDIN Sébastien, BLANC Gregory
Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Cham : Springer, 2018, (Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885)), ISBN 978-3-319-93410-5
abstract

IMINE Abdessamad, FERNANDEZ José M., MARION Jean-Yves, LOGRIPPO Luigi, GARCIA-ALFARO Joaquin
Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers. Cham : Springer, 2018, (Lecture Notes in Computer Science book series (MNCS vol. 10723)), ISBN 978-3-319-75649-3
URL: 10.1007/978-3-319-75650-9
abstract