Books and Publications
Cyber Deception, the Ultimate piece of a Defensive Strategy
Pages: 1-5 [PDF]
Publisher: IEEE
Click on the arrow for more information
What is Cyber Threat Intelligence and How is it Evolving?, 2019
Book: Cyber-Vigilance and Digital Trust
Pages: 1-49 [PDF]
Publisher: Wiley-ISTE
La Cyber Threat Intelligence et son Evolution, 2019
Book: Cyber-Vigilance et confiance numérique
Pages: 1-44
Publisher: ISTE- Editions
A survey on technical threat intelligence in the age of sophisticated cyber attacks, 2017
Journal: Computers & Security (CS)
Pages: 212-233 [PDF]
Publisher: Elsevier
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform, 2015
Journal: World Wide Web - Special Issue on Large-scale Web Virtualized Environment (WWW)
Pages: 41-68 [PDF]
Publisher: Springer
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems, 2014
Journal of Network and Computer Applications (JNCA)
Pages: 152-166 [PDF]
Publisher: Elsevier
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm, 2014
International Conference on Software Security and Reliability (SERE)
Pages: 113-120 [PDF]
Publisher: Elsevier
Location : Sans-Francisco - USA
Security and Privacy Controls in RFID Systems Applied to EPCglobal Networks, 2014
PhD Thesis: Telecom Bretagne
Pages: 1-164 [PDF]
Publisher: Institut Mines Telecom Atlantique
Fine-grained privacy control for the RFID middleware of EPCglobal network, 2013
International Conference on Management of Emergent Digital EcoSystems (MEDES)
Pages: 60-67 [PDF]
Publisher: ACM
Location : Luxembourg, Luxembourg
Privacy-enhanced filtering and collection middleware in EPCglobal networks, 2013
International Conference on Risks and Security of Internet and Systems (CRISIS)
Pages: 1-8 [PDF]
Publisher: IEEE
Location : La Rochelle, France
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress, 2011
International Symposium on Foundations and Practice of Security (FSP)
Pages: 242-251 [PDF]
Publisher: Springer
Location : Paris, France
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks, 2010
Conference on Communication Networks and Services Research (CNSR)
Pages: 284-291 [PDF]
Location :Â Montreal, Canada
A Distributed Multi-Level Anomalies Detection System using the Mobile Agent Aproach, 2009
Global Information Infrastructure Symposium (GIIS)
Pages: 284-291 [PDF]
Publisher: IEEE
Location : Hammamet, Tunisia