default search action
BibTeX records: Jean Leneutre
@inproceedings{DBLP:conf/IEEEares/CastroHBHBLP24, author = {Hugo Teixeira De Castro and Ahmed Hussain and Gregory Blanc and Jamal El Hachem and Dominique Blouin and Jean Leneutre and Panos Papadimitratos}, title = {A Model-based Approach for Assessing the Security of Cyber-Physical Systems}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {121:1--121:10}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670470}, doi = {10.1145/3664476.3670470}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastroHBHBLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/BallotMLL24, author = {Gabriel Ballot and Vadim Malvone and Jean Leneutre and Youssef Laarouchi}, editor = {Mehdi Dastani and Jaime Sim{\~{a}}o Sichman and Natasha Alechina and Virginia Dignum}, title = {Strategic Reasoning under Capacity-constrained Agents}, booktitle = {Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2024, Auckland, New Zealand, May 6-10, 2024}, pages = {123--131}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems / {ACM}}, year = {2024}, url = {https://dl.acm.org/doi/10.5555/3635637.3662859}, doi = {10.5555/3635637.3662859}, timestamp = {Wed, 26 Jun 2024 14:06:50 +0200}, biburl = {https://dblp.org/rec/conf/atal/BallotMLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/CattaLMM24, author = {Davide Catta and Jean Leneutre and Vadim Malvone and Aniello Murano}, editor = {Mehdi Dastani and Jaime Sim{\~{a}}o Sichman and Natasha Alechina and Virginia Dignum}, title = {Obstruction Alternating-time Temporal Logic: {A} Strategic Logic to Reason about Dynamic Models}, booktitle = {Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2024, Auckland, New Zealand, May 6-10, 2024}, pages = {271--280}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems / {ACM}}, year = {2024}, url = {https://dl.acm.org/doi/10.5555/3635637.3662875}, doi = {10.5555/3635637.3662875}, timestamp = {Fri, 03 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/CattaLMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaart/CattaLMUM24, author = {Davide Catta and Jean Leneutre and Antonina Mijatovic and Johanna Ulin and Vadim Malvone}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {A Formal Verification Approach to Handle Attack Graphs}, booktitle = {Proceedings of the 16th International Conference on Agents and Artificial Intelligence, {ICAART} 2024, Volume 3, Rome, Italy, February 24-26, 2024}, pages = {125--132}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012310000003636}, doi = {10.5220/0012310000003636}, timestamp = {Thu, 04 Apr 2024 15:53:27 +0200}, biburl = {https://dblp.org/rec/conf/icaart/CattaLMUM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ia/CattaLM23, author = {Davide Catta and Jean Leneutre and Vadim Malvone}, title = {Attack Graphs {\&} Subset Sabotage Games}, journal = {Intelligenza Artificiale}, volume = {17}, number = {1}, pages = {77--88}, year = {2023}, url = {https://doi.org/10.3233/IA-221080}, doi = {10.3233/IA-221080}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ia/CattaLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/CattaLM23, author = {Davide Catta and Jean Leneutre and Vadim Malvone}, editor = {Riccardo De Benedictis and Matteo Castiglioni and Diodato Ferraioli and Vadim Malvone and Marco Maratea and Enrico Scala and Luciano Serafini and Ivan Serina and Elisa Tosello and Alessandro Umbrico and Mauro Vallati}, title = {Reasoning About Dynamic Game Models Using Obstruction Logic (short paper)}, booktitle = {Proceedings of the the Italian Workshop on Planning and Scheduling, {RCRA} Workshop on Experimental evaluation of algorithms for solving problems with combinatorial explosion, and {SPIRIT} Workshop on Strategies, Prediction, Interaction, and Reasoning in Italy {(IPS-RCRA-SPIRIT} 2023) co-located with 22nd International Conference of the Italian Association for Artificial Intelligence AIxIA 2023, November 7-9th, 2023, Rome, Italy}, series = {{CEUR} Workshop Proceedings}, volume = {3585}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3585/paper13\_SPIRIT03.pdf}, timestamp = {Tue, 02 Jan 2024 17:44:44 +0100}, biburl = {https://dblp.org/rec/conf/aiia/CattaLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/CattaLM23, author = {Davide Catta and Jean Leneutre and Vadim Malvone}, editor = {Kobi Gal and Ann Now{\'{e}} and Grzegorz J. Nalepa and Roy Fairstein and Roxana Radulescu}, title = {Obstruction Logic: {A} Strategic Temporal Logic to Reason About Dynamic Game Models}, booktitle = {{ECAI} 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Krak{\'{o}}w, Poland - Including 12th Conference on Prestigious Applications of Intelligent Systems {(PAIS} 2023)}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {372}, pages = {365--372}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/FAIA230292}, doi = {10.3233/FAIA230292}, timestamp = {Wed, 18 Oct 2023 09:31:16 +0200}, biburl = {https://dblp.org/rec/conf/ecai/CattaLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaart/Catta0LMM23, author = {Davide Catta and Antonio Di Stasio and Jean Leneutre and Vadim Malvone and Aniello Murano}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {A Game Theoretic Approach to Attack Graphs}, booktitle = {Proceedings of the 15th International Conference on Agents and Artificial Intelligence, {ICAART} 2023, Volume 1, Lisbon, Portugal, February 22-24, 2023}, pages = {347--354}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011776900003393}, doi = {10.5220/0011776900003393}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaart/Catta0LMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-11039, author = {Gabriel Ballot and Vadim Malvone and Jean Leneutre and Youssef Laarouchi}, title = {Capacity {ATL}}, journal = {CoRR}, volume = {abs/2308.11039}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.11039}, doi = {10.48550/ARXIV.2308.11039}, eprinttype = {arXiv}, eprint = {2308.11039}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-11039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/CattaLM22, author = {Davide Catta and Jean Leneutre and Vadim Malvone}, editor = {Riccardo De Benedictis and Nicola Gatti and Marco Maratea and Andrea Micheli and Aniello Murano and Enrico Scala and Luciano Serafini and Ivan Serina and Alessandro Umbrico and Mauro Vallati}, title = {Towards a Formal Verification of Attack Graphs}, booktitle = {Proceedings of the 10th Italian workshop on Planning and Scheduling {(IPS} 2022), {RCRA} Incontri {E} Confronti (RiCeRcA 2022), and the workshop on Strategies, Prediction, Interaction, and Reasoning in Italy {(SPIRIT} 2022) co-located with 21st International Conference of the Italian Association for Artificial Intelligence (AIxIA 2022), November 28 - December 2, 2022, University of Udine, Udine, Italy}, series = {{CEUR} Workshop Proceedings}, volume = {3345}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3345/paper14\_Spirit3.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:01 +0100}, biburl = {https://dblp.org/rec/conf/aiia/CattaLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BallotMLB22, author = {Gabriel Ballot and Vadim Malvone and Jean Leneutre and Etienne Borde}, editor = {Hamed Okhravi and Cliff Wang}, title = {Reasoning about Moving Target Defense in Attack Modeling Formalisms}, booktitle = {Proceedings of the 9th {ACM} Workshop on Moving Target Defense, {MTD} 2022, Los Angeles, CA, USA, 7 November 2022}, pages = {55--65}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560828.3564009}, doi = {10.1145/3560828.3564009}, timestamp = {Tue, 08 Nov 2022 15:21:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BallotMLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/Chaitou0LP22, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {122--155}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_6}, doi = {10.1007/978-3-031-45137-9\_6}, timestamp = {Wed, 31 Jan 2024 07:42:55 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/Chaitou0LP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Chaitou0LP22, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Threats to Adversarial Training for IDSs and Mitigation}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {226--236}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277600003283}, doi = {10.5220/0011277600003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Chaitou0LP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woa/CattaLM22, author = {Davide Catta and Jean Leneutre and Vadim Malvone}, editor = {Angelo Ferrando and Viviana Mascardi}, title = {Subset sabotage games {\&} attack graphs}, booktitle = {Proceedings of the 23rd Workshop "From Objects to Agents", Genova, Italy, September 1-3, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3261}, pages = {209--218}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3261/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:40 +0100}, biburl = {https://dblp.org/rec/conf/woa/CattaLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14076, author = {Gabriel Ballot and Vadim Malvone and Jean Leneutre and Etienne Borde}, title = {Reasoning about Moving Target Defense in Attack Modeling Formalisms}, journal = {CoRR}, volume = {abs/2206.14076}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14076}, doi = {10.48550/ARXIV.2206.14076}, eprinttype = {arXiv}, eprint = {2206.14076}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhalfaouiLVGMU21, author = {Sameh Khalfaoui and Jean Leneutre and Arthur Villard and Ivan Gazeau and Jingxuan Ma and Pascal Urien}, title = {Security Analysis of Machine Learning-Based {PUF} Enrollment Protocols: {A} Review}, journal = {Sensors}, volume = {21}, number = {24}, pages = {8415}, year = {2021}, url = {https://doi.org/10.3390/s21248415}, doi = {10.3390/S21248415}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KhalfaouiLVGMU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/KhalfaouiLVMU21, author = {Sameh Khalfaoui and Jean Leneutre and Arthur Villard and Jingxuan Ma and Pascal Urien}, title = {Security Analysis of Out-of-Band Device Pairing Protocols: {A} Survey}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {8887472:1--8887472:30}, year = {2021}, url = {https://doi.org/10.1155/2021/8887472}, doi = {10.1155/2021/8887472}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/KhalfaouiLVMU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/Chaitou0LP21, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, title = {Assessing adversarial training effect on IDSs and GANs}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {543--550}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527949}, doi = {10.1109/CSR51186.2021.9527949}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/Chaitou0LP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KhalfaouiLVGMDU21, author = {Sameh Khalfaoui and Jean Leneutre and Arthur Villard and Ivan Gazeau and Jingxuan Ma and Jean{-}Luc Danger and Pascal Urien}, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {Water- {PUF:} An Insider Threat Resistant {PUF} Enrollment Protocol Based on Machine Learning Watermarking}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685239}, doi = {10.1109/NCA53618.2021.9685239}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/KhalfaouiLVGMDU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/AyraultBKL21, author = {Maxime Ayrault and Etienne Borde and Ulrich K{\"{u}}hne and Jean Leneutre}, title = {Moving Target Defense Strategy in Critical Embedded Systems: {A} Game-theoretic Approach}, booktitle = {26th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2021, Perth, Australia, December 1-4, 2021}, pages = {27--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PRDC53464.2021.00014}, doi = {10.1109/PRDC53464.2021.00014}, timestamp = {Wed, 19 Jan 2022 17:40:15 +0100}, biburl = {https://dblp.org/rec/conf/prdc/AyraultBKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2020, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68887-5}, doi = {10.1007/978-3-030-68887-5}, isbn = {978-3-030-68886-8}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/DenisCCLCL20, author = {Nathana{\"{e}}l Denis and Pierre Chaffardon and Denis Conan and Maryline Laurent and Sophie Chabridon and Jean Leneutre}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {405--414}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009833204050414}, doi = {10.5220/0009833204050414}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/DenisCCLCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DiopLLT20, author = {A{\"{\i}}da Diop and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {84--95}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008962700840095}, doi = {10.5220/0008962700840095}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DiopLLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KhalfaouiLVMU20, author = {Sameh Khalfaoui and Jean Leneutre and Arthur Villard and Jingxuan Ma and Pascal Urien}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {{COOB:} Hybrid Secure Device Pairing Scheme in a Hostile Environment}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {336}, pages = {419--438}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63095-9\_27}, doi = {10.1007/978-3-030-63095-9\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KhalfaouiLVMU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KiennertIDL19, author = {Christophe Kiennert and Ziad Ismail and Herv{\'{e}} Debar and Jean Leneutre}, title = {A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {5}, pages = {90:1--90:31}, year = {2019}, url = {https://doi.org/10.1145/3232848}, doi = {10.1145/3232848}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KiennertIDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/LaurentLCL19, author = {Maryline Laurent and Jean Leneutre and Sophie Chabridon and Imane Laaouane}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Authenticated and Privacy-Preserving Consent Management in the Internet of Things}, booktitle = {The 10th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 {(EDI40} 2019) / Affiliated Workshops, April 29 - May 2, 2019, Leuven, Belgium}, series = {Procedia Computer Science}, volume = {151}, pages = {256--263}, publisher = {Elsevier}, year = {2019}, url = {https://doi.org/10.1016/j.procs.2019.04.037}, doi = {10.1016/J.PROCS.2019.04.037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/LaurentLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/IsmailLF18, author = {Ziad Ismail and Jean Leneutre and Alia Fourati}, title = {Optimal Deployment of Security Policies: Application to Industrial Control Systems}, booktitle = {14th European Dependable Computing Conference, {EDCC} 2018, Ia{\c{s}}i, Romania, September 10-14, 2018}, pages = {120--127}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/EDCC.2018.00030}, doi = {10.1109/EDCC.2018.00030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/IsmailLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/CorollerCLCL18, author = {Stevan Coroller and Sophie Chabridon and Maryline Laurent and Denis Conan and Jean Leneutre}, title = {Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things}, booktitle = {Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, M4IoT@Middleware 2018, Rennes, France, December 10-11, 2018}, pages = {35--40}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3286719.3286727}, doi = {10.1145/3286719.3286727}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/CorollerCLCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DiopGLLT18, author = {A{\"{\i}}da Diop and Sa{\"{\i}}d Gharout and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Questioning the security and efficiency of the ESIoT approach}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {202--207}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212491}, doi = {10.1145/3212480.3212491}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DiopGLLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/IsmailKL017, author = {Ziad Ismail and Christophe Kiennert and Jean Leneutre and Lin Chen}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Game Theoretical Model for Optimal Distribution of Network Security Resources}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {234--255}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_13}, doi = {10.1007/978-3-319-68711-7\_13}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/IsmailKL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IsmailKLC16, author = {Ziad Ismail and Christophe Kiennert and Jean Leneutre and Lin Chen}, title = {Auditing a Cloud Provider's Compliance With Data Backup Requirements: {A} Game Theoretical Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1685--1699}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549002}, doi = {10.1109/TIFS.2016.2549002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IsmailKLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/IsmailLB016, author = {Ziad Ismail and Jean Leneutre and David Bateman and Lin Chen}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between {ICT} and Electric Infrastructures}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {159--171}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_10}, doi = {10.1007/978-3-319-47413-7\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/IsmailLB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/NguyenL15, author = {Trung Nguyen and Jean Leneutre}, title = {A secure and effective device pairing protocol}, booktitle = {12th Annual {IEEE} Consumer Communications and Networking Conference, {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015}, pages = {507--512}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCNC.2015.7158026}, doi = {10.1109/CCNC.2015.7158026}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/NguyenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IsmailLF15, author = {Ziad Ismail and Jean Leneutre and Alia Fourati}, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {An Attack Execution Model for Industrial Control Systems Security Assessment}, booktitle = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, pages = {157--167}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-40385-4\_11}, doi = {10.1007/978-3-319-40385-4\_11}, timestamp = {Mon, 03 Jan 2022 22:15:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/IsmailLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/IsmailLBC15, author = {Ziad Ismail and Jean Leneutre and David Bateman and Lin Chen}, title = {A Game-Theoretical Model for Security Risk Management of Interdependent {ICT} and Electrical Infrastructures}, booktitle = {16th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2015, Daytona Beach, FL, USA, January 8-10, 2015}, pages = {101--109}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HASE.2015.24}, doi = {10.1109/HASE.2015.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/IsmailLBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/IsmailLBC14, author = {Ziad Ismail and Jean Leneutre and David Bateman and Lin Chen}, title = {A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid {AMI}}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {32}, number = {7}, pages = {1486--1499}, year = {2014}, url = {https://doi.org/10.1109/JSAC.2014.2332095}, doi = {10.1109/JSAC.2014.2332095}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/IsmailLBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14, author = {Brahim Djebaili and Christophe Kiennert and Jean Leneutre and Lin Chen}, editor = {Radha Poovendran and Walid Saad}, title = {Data Integrity and Availability Verification Game in Untrusted Cloud Storage}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {287--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_16}, doi = {10.1007/978-3-319-12601-2\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/NguyenL14, author = {Trung Nguyen and Jean Leneutre}, title = {Formal Analysis of Secure Device Pairing Protocols}, booktitle = {2014 {IEEE} 13th International Symposium on Network Computing and Applications, {NCA} 2014, Cambridge, MA, USA, 21-23 August, 2014}, pages = {291--295}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/NCA.2014.50}, doi = {10.1109/NCA.2014.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/NguyenL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/OualhaLR12, author = {Nouha Oualha and Jean Leneutre and Yves Roudier}, title = {Verifying remote data integrity in peer-to-peer data storage: {A} comprehensive survey of protocols}, journal = {Peer-to-Peer Netw. Appl.}, volume = {5}, number = {3}, pages = {231--243}, year = {2012}, url = {https://doi.org/10.1007/s12083-011-0117-3}, doi = {10.1007/S12083-011-0117-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/OualhaLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenL11, author = {Lin Chen and Jean Leneutre}, title = {Fight jamming with jamming - {A} game theoretic analysis of jamming attack in wireless networks and defense strategy}, journal = {Comput. Networks}, volume = {55}, number = {9}, pages = {2259--2270}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.03.006}, doi = {10.1016/J.COMNET.2011.03.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChenLL11, author = {Lin Chen and Lavy Libman and Jean Leneutre}, title = {Conflicts and Incentives in Wireless Cooperative Relaying: {A} Distributed Market Pricing Framework}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {5}, pages = {758--772}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2010.152}, doi = {10.1109/TPDS.2010.152}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ChenLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2010-6514, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19348-4}, doi = {10.1007/978-3-642-19348-4}, isbn = {978-3-642-19347-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2010-6514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/HeLL10, author = {Ruan He and Marc Lacoste and Jean Leneutre}, title = {Virtual Security Kernel: {A} Component-Based {OS} Architecture for Self-Protection}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {851--858}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.160}, doi = {10.1109/CIT.2010.160}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/HeLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeLPL10, author = {Ruan He and Marc Lacoste and Jacques Pulou and Jean Leneutre}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {A {DSL} for Specifying Autonomic Security Management Strategies}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, pages = {216--230}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19348-4\_16}, doi = {10.1007/978-3-642-19348-4\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeLPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icas/HeLL10, author = {Ruan He and Marc Lacoste and Jean Leneutre}, title = {A Policy Management Framework for Self-Protection of Pervasive Systems}, booktitle = {Sixth International Conference on Autonomic and Autonomous Systems, {ICAS} 2010, Cancun, Mexico, March 7-13, 2010}, pages = {104--109}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICAS.2010.22}, doi = {10.1109/ICAS.2010.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icas/HeLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ChenL09, author = {Lin Chen and Jean Leneutre}, title = {On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/946493}, doi = {10.1155/2009/946493}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ChenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenL09, author = {Lin Chen and Jean Leneutre}, title = {A game theoretical framework on intrusion detection in heterogeneous networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {165--178}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2019154}, doi = {10.1109/TIFS.2009.2019154}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AljnidiL09, author = {Mohamad Aljnidi and Jean Leneutre}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {{ASRBAC:} {A} Security Administration Model for Mobile Autonomic Networks (MAutoNets)}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {163--177}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_13}, doi = {10.1007/978-3-642-11207-2\_13}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AljnidiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChenL09, author = {Lin Chen and Jean Leneutre}, title = {Efficient medium access control design for autonomous wireless networks - {A} game theoretic approach}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {376--383}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355131}, doi = {10.1109/LCN.2009.5355131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/HeLL09, author = {Ruan He and Marc Lacoste and Jean Leneutre}, editor = {Rachid Guerraoui and Franck Petit}, title = {Brief Announcement: An {OS} Architecture for Device Self-protection}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, {SSS} 2009, Lyon, France, November 3-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5873}, pages = {783--784}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05118-0\_59}, doi = {10.1007/978-3-642-05118-0\_59}, timestamp = {Wed, 07 Dec 2022 23:13:25 +0100}, biburl = {https://dblp.org/rec/conf/sss/HeLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenL08, author = {Lin Chen and Jean Leneutre}, title = {A Game Theoretic Framework of Distributed Power and Rate Control in {IEEE} 802.11 WLANs}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {26}, number = {7}, pages = {1128--1137}, year = {2008}, url = {https://doi.org/10.1109/JSAC.2008.080910}, doi = {10.1109/JSAC.2008.080910}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ChenL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenL07, author = {Lin Chen and Jean Leneutre}, title = {Toward secure and scalable time synchronization in ad hoc networks}, journal = {Comput. Commun.}, volume = {30}, number = {11-12}, pages = {2453--2467}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2007.04.017}, doi = {10.1016/J.COMCOM.2007.04.017}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AljnidiL07, author = {Mohamad Aljnidi and Jean Leneutre}, editor = {Ning Zhang and Ajith Abraham}, title = {Towards an Autonomic Security System for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {29--32}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.53}, doi = {10.1109/IAS.2007.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AljnidiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/autonomics/AljnidiL07, author = {Mohamad Aljnidi and Jean Leneutre}, editor = {Fabrizio Davide}, title = {A security policy system for mobile autonomic networks}, booktitle = {Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome, Italy}, series = {{ACM} International Conference Proceeding Series}, volume = {302}, pages = {23}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.4108/ICST.AUTONOMICS2007.2205}, doi = {10.4108/ICST.AUTONOMICS2007.2205}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/autonomics/AljnidiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ChenL07, author = {Lin Chen and Jean Leneutre}, title = {On the Power and Rate Control in {IEEE} 802.11 WLANs - {A} Game Theoretical Approach}, booktitle = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, pages = {450--456}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICCCN.2007.4317860}, doi = {10.1109/ICCCN.2007.4317860}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ChenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChenL07, author = {Lin Chen and Jean Leneutre}, title = {Selfishness, Not Always {A} Nightmare: Modeling Selfish {MAC} Behaviors in Wireless Mobile Ad Hoc Networks}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {16}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.138}, doi = {10.1109/ICDCS.2007.138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ChenL07, author = {Lin Chen and Jean Leneutre}, title = {A Game Theoretic Framework of Distributed Power and Rate Control in {IEEE} 802.11 WLANs}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {338--339}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375870}, doi = {10.1109/ICNP.2007.4375870}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ChenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurongi/AljnidiL06, author = {Mohamad Aljnidi and Jean Leneutre}, editor = {Hermann de Meer and James P. G. Sterbenz}, title = {Autonomic Security for Home Networks}, booktitle = {Self-Organizing Systems, First International Workshop, {IWSOS} 2006, and Third International Workshop on New Trends in Network Architectures and Services, EuroNGI 2006, Passau, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4124}, pages = {239--242}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11822035\_21}, doi = {10.1007/11822035\_21}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/eurongi/AljnidiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/ChenL06, author = {Lin Chen and Jean Leneutre}, title = {A Secure and Scalable Time Synchronization Protocol in {IEEE} 802.11 Ad Hoc Networks}, booktitle = {2006 International Conference on Parallel Processing Workshops {(ICPP} Workshops 2006), 14-18 August 2006, Columbus, Ohio, {USA}}, pages = {207--214}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPPW.2006.17}, doi = {10.1109/ICPPW.2006.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/ChenL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwmc/ChenLP06, author = {Lin Chen and Jean Leneutre and Jean{-}Jacques Puig}, editor = {Petre Dini and Christer {\AA}hlund and Cosmin Dini and Eugen Borcoci}, title = {A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks}, booktitle = {Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), Bucharest, Romania, July 29-31, 2006}, pages = {36}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICWMC.2006.14}, doi = {10.1109/ICWMC.2006.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwmc/ChenLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imecs/ChenXL06, author = {Lin Chen and Xiaoyun Xue and Jean Leneutre}, editor = {Sio Iong Ao and Jeong{-}A Lee and Oscar Castillo and Pranay Chaudhuri and David Dagan Feng}, title = {A Lightweight Mechanism to Secure {OLSR}}, booktitle = {Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, {IMECS} '06, June 20-22, 2006, Hong Kong, China}, series = {Lecture Notes in Engineering and Computer Science}, pages = {887--895}, publisher = {Newswood Limited}, year = {2006}, timestamp = {Wed, 12 Sep 2018 01:05:12 +0200}, biburl = {https://dblp.org/rec/conf/imecs/ChenXL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/XueLB04, author = {Xiaoyun Xue and Jean Leneutre and Jalel Ben{-}Othman}, editor = {Elizabeth M. Belding{-}Royer and Khaldoun Al Agha and Guy Pujolle}, title = {A Trust-Based Routing Protocol for Ad Hoc Networks}, booktitle = {Mobile and Wireless Communication Networks, {IFIP} {TC6} / {WG6.8} Conference on Mobile and Wireless Communication Networks {(MWCN} 2004), October 25-27, 2004, Paris, France}, series = {{IFIP}}, volume = {162}, pages = {251--262}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-23150-1\_22}, doi = {10.1007/0-387-23150-1\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/XueLB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.