Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
PROTEAN: Federated Intrusion Detection in Non-IID Environments Through Prototype-Based Knowledge Sharing
Chennoufi, S., Han, Y., Blanc, G., De Cristofaro, E. & Kiennert, C., 1 Jan 2026, Computer Security – ESORICS 2025 - 30th European Symposium on Research in Computer Security, Proceedings. Nicomette, V., Benzekri, A., Boulahia-Cuppens, N. & Vaidya, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 103-125 23 p. (Lecture Notes in Computer Science; vol. 16053 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control
Sasada, T., Kiennert, C., Blanc, G., Taenaka, Y. & Kadobayashi, Y., 1 Jan 2025, Availability, Reliability and Security - ARES 2025 International Workshops, Proceedings. Coppens, B., Volckaert, B., De Sutter, B. & Naessens, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 324-341 18 p. (Lecture Notes in Computer Science; vol. 15995 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Quantifying the Impact Propagation of Cyber Attacks Using Business Logic Modeling
Lazrag, M., Kiennert, C. & Garcia-Alfaro, J., 1 Jan 2025, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Science and Business Media Deutschland GmbH, p. 49-71 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; vol. 14800 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
Open Access -
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect
Yuasa, J., Sasada, T., Kiennert, C., Blanc, G., Taenaka, Y. & Kadobayashi, Y., 1 Jan 2024, Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Di Vimercati, S. D. C. & Samarati, P. (eds.). Science and Technology Publications, Lda, p. 674-679 6 p. (Proceedings of the International Conference on Security and Cryptography).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges
Chennoufi, S., Blanc, G., Jmila, H. & Kiennert, C., 30 Jul 2024, ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery, 42. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Anonymous certification for E-assessment opinion polls
Kaaniche, N., Kiennert, C., Laurent, M. & Garcia-Alfaro, J., 1 Nov 2023, In: Journal of Ambient Intelligence and Humanized Computing. 14, 11, p. 14979-14993 15 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Security and privacy in the TeSLA architecture
Kiennert, C., Ivanova, M., Rozeva, A. & Garcia-Alfaro, J., 1 Jan 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 85-108 24 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 34).Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
-
A survey on game-theoretic approaches for intrusion detection and response optimization
Kiennert, C., Ismail, Z., Debar, H. & Leneutre, J., 30 Sept 2019, In: ACM Computing Surveys. 51, 5, 3232848.Research output: Contribution to journal › Article › peer-review
-
Methodology of. Network Simulation in the Context of an Evaluation: Application to an IDS
Bajan, P. M., Kiennert, C. & Debar, H., 1 Jan 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). Science and Technology Publications, Lda, p. 378-388 11 p. (International Conference on Information Systems Security and Privacy).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Methodology of a network simulation in the context of an evaluation: Application to an IDS
Bajan, P. M., Kiennert, C. & Debar, H., 1 Jan 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 378-388 11 p. (ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access