Books and Publications

Cyber Deception, the Ultimate piece of a Defensive Strategy


Click on the arrow for more information


What is Cyber Threat Intelligence and How is it Evolving?, 2019


La Cyber Threat Intelligence et son Evolution, 2019


A survey on technical threat intelligence in the age of sophisticated cyber attacks, 2017

Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform, 2015

KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems, 2014


Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm, 2014


Security and Privacy Controls in RFID Systems Applied to EPCglobal Networks, 2014

Fine-grained privacy control for the RFID middleware of EPCglobal network, 2013

Privacy-enhanced filtering and collection middleware in EPCglobal networks, 2013

Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress, 2011

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks, 2010


A Distributed Multi-Level Anomalies Detection System using the Mobile Agent Aproach, 2009