DAMMAK, Maissa Senouci, Sidi-Mohammed Messous, Mohamed Ayoub Elhdhili, Mohamed Houcine Gransart, Christophe
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to en...
HASRATYAN, Nina OLESEN, Nina Becue, Adrien SELDESLACHTS, Ulrich BÂ, Sadio CHIAPPETTA, Andrea COSTIN, Andrei DOBELMANN, Janine HENNY, Christopher KHODASHENAS, Pouria Sayyad
...
Cybersecurity is a real challenge on many levels for the transportation sector and its sub-sectors (air, maritime, ports, road...). While some aspects remain sub-sector specific, thereby making cy- bersecurity issues difficult to address, this report aims to understand the landscape and come up with a horizontal and holistic understanding of the cy...
Hosteins, Pierre SCATAMACCHIA, Rosario
We tackle a stochastic version of the Critical Node Problem (CNP) where the goal is to minimize the pairwise connectivity of a graph by attacking a subset of its nodes. In the stochastic setting considered, the outcome of attacks on nodes is uncertain. In our work, we focus on trees and demonstrate that over trees the stochastic CNP actually genera...
Tran, Le Hung Hoang, Tien Forêt, Gilles Duhamel, Denis Messad, Samir Loaec, Arnaud
The monitoring of railway tracks can be performed through several measurement techniques. Recently, a method of diagnosing the railway track has been proposed using fiber Bragg gratings integrated inside the railway sleeper. An analytical model for the dynamics of railway sleepers has been developed allowing calculation of the sleeper responses. In...
HOSTEINS, Pierre SCATAMACCHIA, Rosario
We tackle a stochastic version of the Critical Node Problem (CNP) where the goal is to minimize the pairwise connectivity of a graph by attacking a subset of its nodes. In the stochastic setting considered, the outcome of attacks on nodes is uncertain. In our work, we focus on trees and demonstrate that over trees the stochastic CNP actually genera...
HASRATYAN, Nina OLESEN, Nina BECUE, Adrien SELDESLACHTS, Ulrich BÂ, Sadio CHIAPPETTA, Andrea COSTIN, Andrei DOBELMANN, Janine HENNY, Christopher KHODASHENAS, Pouria Sayyad
...
Cybersecurity is a real challenge on many levels for the transportation sector and its sub-sectors (air, maritime, ports, road...). While some aspects remain sub-sector specific, thereby making cy- bersecurity issues difficult to address, this report aims to understand the landscape and come up with a horizontal and holistic understanding of the cy...
AMOORDON, Andy Gransart, Christophe Deniau, Virginie GESNOT, Corentin
URSI Benelux Forum, Bruxelles, BELGIQUE, 03-/12/2019 - 03/12/2019
DE ALMEIDA PEREIRA, Dalay Israel DEBBECH, Sana Perin, Matthieu Bon, Philippe Collart-Dutilleul, Simon
ER 2019, 38th International Conference on Conceptual Modeling, Salvador, BRESIL, 04-/11/2019 - 07/11/2019
KRAIBI, Kenza BEN-AYED, Rahma Rehm, Joris Collart-Dutilleul, Simon Bon, Philippe Petit, Dorian
ICSOFT 2019, 14th International Conference on Software Technologies, Prague, TCHÈQUE, RÉPUBLIQUE, 26-/07/2019 - 28/07/2019
DEBBECH, Sana Bon, Philippe Collart-Dutilleul, Simon
ICSOFT 2019, 14th International Conference on Software Technologies, Prague, TCHÈQUE, RÉPUBLIQUE, 26-/07/2019 - 28/07/2019