Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation

    Intrusion Detection Systems (IDS) are essential tools to protect network security from malicious traffic. IDS have recently made significant advancements in their detection capabilities through deep learning a...

    Hassan Chaitou, Thomas Robert, Jean Leneutre in E-Business and Telecommunications (2023)

  2. No Access

    Chapter and Conference Paper

    COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment

    Due to the scalability limitations, the secure device pairing of Internet of Things objects cannot be efficiently conducted based on traditional cryptographic techniques using a pre-shared security knowledge. ...

    Sameh Khalfaoui, Jean Leneutre in Security and Privacy in Communication Netw… (2020)

  3. No Access

    Chapter

    Managing Security Risks Interdependencies Between ICT and Electric Infrastructures: A Game Theoretical Analysis

    The smart grid will increasingly rely on the communication infrastructure to ensure a reliable and secure delivery of electricity. The use of off-the-shelf operating systems in the communication infrastructure...

    Ziad Ismail, Jean Leneutre, David Bateman in Game Theory for Security and Risk Manageme… (2018)

  4. No Access

    Chapter and Conference Paper

    A Game Theoretical Model for Optimal Distribution of Network Security Resources

    Enforcing security in a network always comes with a tradeoff regarding budget constraints, entailing unavoidable choices for the deployment of security equipment over the network. Therefore, finding the optima...

    Ziad Ismail, Christophe Kiennert, Jean Leneutre in Decision and Game Theory for Security (2017)

  5. No Access

    Chapter and Conference Paper

    A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures

    In the last decade, the power grid has increasingly relied on the communication infrastructure for the management and control of grid operations. In a previous work, we proposed an analytical model for identif...

    Ziad Ismail, Jean Leneutre, David Bateman in Decision and Game Theory for Security (2016)

  6. No Access

    Chapter and Conference Paper

    An Attack Execution Model for Industrial Control Systems Security Assessment

    The improved communication and remote control capabilities of industrial control systems equipment have increased their attack surface. As a result, managing the security risk became a challenging task. The co...

    Ziad Ismail, Jean Leneutre, Alia Fourati in Security of Industrial Control Systems and… (2016)

  7. No Access

    Chapter and Conference Paper

    Data Integrity and Availability Verification Game in Untrusted Cloud Storage

    The recent trends towards outsourcing data to the Cloud as well as various concerns regarding data integrity and availability created an increasing interest in enabling secure Cloud data-centers. Many schemes ...

    Brahim Djebaili, Christophe Kiennert in Decision and Game Theory for Security (2014)

  8. No Access

    Article

    Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols

    This paper surveys protocols that verify remote data possession. These protocols have been proposed as a primitive for ensuring the long-term integrity and availability of data stored at remote untrusted hosts...

    Nouha Oualha, Jean Leneutre, Yves Roudier in Peer-to-Peer Networking and Applications (2012)

  9. No Access

    Book and Conference Proceedings

    Data Privacy Management and Autonomous Spontaneous Security

    5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

    Joaquin Garcia-Alfaro in Lecture Notes in Computer Science (2011)

  10. No Access

    Chapter and Conference Paper

    A DSL for Specifying Autonomic Security Management Strategies

    Existing self-protection frameworks so far hardly addressed the specification of autonomic security adaptation strategies which guide risk-aware selection or reconfiguration of security mechanisms. Domain-Specifi...

    Ruan He, Marc Lacoste, Jacques Pulou in Data Privacy Management and Autonomous Spo… (2011)

  11. No Access

    Chapter and Conference Paper

    ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)

    This article deals with access control in Mobile Autonomic Networks (MAutoNets), which are basically mobile ad-hoc networks. Our goal is to build an autonomic access control system. We define the Secure Relati...

    Mohamad Aljnidi, Jean Leneutre in Data Privacy Management and Autonomous Spo… (2010)

  12. Article

    Open Access

    On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff

    Routing amid malicious attackers in multihop wireless networks with unreliable links is a challenging task. In this paper, we address the fundamental problem of how to choose secure and reliable paths in such ...

    Lin Chen, Jean Leneutre in EURASIP Journal on Wireless Communications and Networking (2009)

  13. No Access

    Chapter and Conference Paper

    Brief Announcement: An OS Architecture for Device Self-protection

    By introducing context-awareness in the system layer, pervasive computing is a turning point in OS design. Device mobility and dynamicity of situations raise strong challenges for run-time adaptability of embe...

    Ruan He, Marc Lacoste, Jean Leneutre in Stabilization, Safety, and Security of Dis… (2009)

  14. No Access

    Chapter and Conference Paper

    Autonomic Security for Home Networks

    Home networks are becoming prevalent and interest in their security is increasing. We introduce in this paper an autonomic security model, in which we deal with a home network as an ad hoc network in general, ...

    Mohamad Aljnidi, Jean Leneutre in Self-Organizing Systems (2006)

  15. Chapter and Conference Paper

    A Trust-Based Routing Protocol for Ad Hoc Networks

    Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to their lack of infrastructure. A malicious node can easily disrupt both the routing discovery phase and the data forw...

    **aoyun Xue, Jean Leneutre, Jalel Ben-Othman in Mobile and Wireless Communication Networks (2005)