BibTeX records: Jean Leneutre

download as .bib file

@inproceedings{DBLP:conf/IEEEares/CastroHBHBLP24,
  author       = {Hugo Teixeira De Castro and
                  Ahmed Hussain and
                  Gregory Blanc and
                  Jamal El Hachem and
                  Dominique Blouin and
                  Jean Leneutre and
                  Panos Papadimitratos},
  title        = {A Model-based Approach for Assessing the Security of Cyber-Physical
                  Systems},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {121:1--121:10},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670470},
  doi          = {10.1145/3664476.3670470},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CastroHBHBLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/BallotMLL24,
  author       = {Gabriel Ballot and
                  Vadim Malvone and
                  Jean Leneutre and
                  Youssef Laarouchi},
  editor       = {Mehdi Dastani and
                  Jaime Sim{\~{a}}o Sichman and
                  Natasha Alechina and
                  Virginia Dignum},
  title        = {Strategic Reasoning under Capacity-constrained Agents},
  booktitle    = {Proceedings of the 23rd International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} 2024, Auckland, New Zealand, May 6-10,
                  2024},
  pages        = {123--131},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  / {ACM}},
  year         = {2024},
  url          = {https://dl.acm.org/doi/10.5555/3635637.3662859},
  doi          = {10.5555/3635637.3662859},
  timestamp    = {Wed, 26 Jun 2024 14:06:50 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/BallotMLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/CattaLMM24,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone and
                  Aniello Murano},
  editor       = {Mehdi Dastani and
                  Jaime Sim{\~{a}}o Sichman and
                  Natasha Alechina and
                  Virginia Dignum},
  title        = {Obstruction Alternating-time Temporal Logic: {A} Strategic Logic to
                  Reason about Dynamic Models},
  booktitle    = {Proceedings of the 23rd International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} 2024, Auckland, New Zealand, May 6-10,
                  2024},
  pages        = {271--280},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  / {ACM}},
  year         = {2024},
  url          = {https://dl.acm.org/doi/10.5555/3635637.3662875},
  doi          = {10.5555/3635637.3662875},
  timestamp    = {Fri, 03 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/CattaLMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaart/CattaLMUM24,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Antonina Mijatovic and
                  Johanna Ulin and
                  Vadim Malvone},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {A Formal Verification Approach to Handle Attack Graphs},
  booktitle    = {Proceedings of the 16th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2024, Volume 3, Rome, Italy, February 24-26,
                  2024},
  pages        = {125--132},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012310000003636},
  doi          = {10.5220/0012310000003636},
  timestamp    = {Thu, 04 Apr 2024 15:53:27 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/CattaLMUM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ia/CattaLM23,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone},
  title        = {Attack Graphs {\&} Subset Sabotage Games},
  journal      = {Intelligenza Artificiale},
  volume       = {17},
  number       = {1},
  pages        = {77--88},
  year         = {2023},
  url          = {https://doi.org/10.3233/IA-221080},
  doi          = {10.3233/IA-221080},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ia/CattaLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/CattaLM23,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone},
  editor       = {Riccardo De Benedictis and
                  Matteo Castiglioni and
                  Diodato Ferraioli and
                  Vadim Malvone and
                  Marco Maratea and
                  Enrico Scala and
                  Luciano Serafini and
                  Ivan Serina and
                  Elisa Tosello and
                  Alessandro Umbrico and
                  Mauro Vallati},
  title        = {Reasoning About Dynamic Game Models Using Obstruction Logic (short
                  paper)},
  booktitle    = {Proceedings of the the Italian Workshop on Planning and Scheduling,
                  {RCRA} Workshop on Experimental evaluation of algorithms for solving
                  problems with combinatorial explosion, and {SPIRIT} Workshop on Strategies,
                  Prediction, Interaction, and Reasoning in Italy {(IPS-RCRA-SPIRIT}
                  2023) co-located with 22nd International Conference of the Italian
                  Association for Artificial Intelligence AIxIA 2023, November 7-9th,
                  2023, Rome, Italy},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3585},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3585/paper13\_SPIRIT03.pdf},
  timestamp    = {Tue, 02 Jan 2024 17:44:44 +0100},
  biburl       = {https://dblp.org/rec/conf/aiia/CattaLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/CattaLM23,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone},
  editor       = {Kobi Gal and
                  Ann Now{\'{e}} and
                  Grzegorz J. Nalepa and
                  Roy Fairstein and
                  Roxana Radulescu},
  title        = {Obstruction Logic: {A} Strategic Temporal Logic to Reason About Dynamic
                  Game Models},
  booktitle    = {{ECAI} 2023 - 26th European Conference on Artificial Intelligence,
                  September 30 - October 4, 2023, Krak{\'{o}}w, Poland - Including
                  12th Conference on Prestigious Applications of Intelligent Systems
                  {(PAIS} 2023)},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {372},
  pages        = {365--372},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/FAIA230292},
  doi          = {10.3233/FAIA230292},
  timestamp    = {Wed, 18 Oct 2023 09:31:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/CattaLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaart/Catta0LMM23,
  author       = {Davide Catta and
                  Antonio Di Stasio and
                  Jean Leneutre and
                  Vadim Malvone and
                  Aniello Murano},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {A Game Theoretic Approach to Attack Graphs},
  booktitle    = {Proceedings of the 15th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2023, Volume 1, Lisbon, Portugal, February
                  22-24, 2023},
  pages        = {347--354},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011776900003393},
  doi          = {10.5220/0011776900003393},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/Catta0LMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-11039,
  author       = {Gabriel Ballot and
                  Vadim Malvone and
                  Jean Leneutre and
                  Youssef Laarouchi},
  title        = {Capacity {ATL}},
  journal      = {CoRR},
  volume       = {abs/2308.11039},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.11039},
  doi          = {10.48550/ARXIV.2308.11039},
  eprinttype    = {arXiv},
  eprint       = {2308.11039},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-11039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/CattaLM22,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone},
  editor       = {Riccardo De Benedictis and
                  Nicola Gatti and
                  Marco Maratea and
                  Andrea Micheli and
                  Aniello Murano and
                  Enrico Scala and
                  Luciano Serafini and
                  Ivan Serina and
                  Alessandro Umbrico and
                  Mauro Vallati},
  title        = {Towards a Formal Verification of Attack Graphs},
  booktitle    = {Proceedings of the 10th Italian workshop on Planning and Scheduling
                  {(IPS} 2022), {RCRA} Incontri {E} Confronti (RiCeRcA 2022), and the
                  workshop on Strategies, Prediction, Interaction, and Reasoning in
                  Italy {(SPIRIT} 2022) co-located with 21st International Conference
                  of the Italian Association for Artificial Intelligence (AIxIA 2022),
                  November 28 - December 2, 2022, University of Udine, Udine, Italy},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3345},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3345/paper14\_Spirit3.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:01 +0100},
  biburl       = {https://dblp.org/rec/conf/aiia/CattaLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BallotMLB22,
  author       = {Gabriel Ballot and
                  Vadim Malvone and
                  Jean Leneutre and
                  Etienne Borde},
  editor       = {Hamed Okhravi and
                  Cliff Wang},
  title        = {Reasoning about Moving Target Defense in Attack Modeling Formalisms},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Moving Target Defense, {MTD}
                  2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {55--65},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560828.3564009},
  doi          = {10.1145/3560828.3564009},
  timestamp    = {Tue, 08 Nov 2022 15:21:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BallotMLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/Chaitou0LP22,
  author       = {Hassan Chaitou and
                  Thomas Robert and
                  Jean Leneutre and
                  Laurent Pautet},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and
                  Their Mitigation},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {122--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_6},
  doi          = {10.1007/978-3-031-45137-9\_6},
  timestamp    = {Wed, 31 Jan 2024 07:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/Chaitou0LP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Chaitou0LP22,
  author       = {Hassan Chaitou and
                  Thomas Robert and
                  Jean Leneutre and
                  Laurent Pautet},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Threats to Adversarial Training for IDSs and Mitigation},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {226--236},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011277600003283},
  doi          = {10.5220/0011277600003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Chaitou0LP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woa/CattaLM22,
  author       = {Davide Catta and
                  Jean Leneutre and
                  Vadim Malvone},
  editor       = {Angelo Ferrando and
                  Viviana Mascardi},
  title        = {Subset sabotage games {\&} attack graphs},
  booktitle    = {Proceedings of the 23rd Workshop "From Objects to Agents", Genova,
                  Italy, September 1-3, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3261},
  pages        = {209--218},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3261/paper16.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:40 +0100},
  biburl       = {https://dblp.org/rec/conf/woa/CattaLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14076,
  author       = {Gabriel Ballot and
                  Vadim Malvone and
                  Jean Leneutre and
                  Etienne Borde},
  title        = {Reasoning about Moving Target Defense in Attack Modeling Formalisms},
  journal      = {CoRR},
  volume       = {abs/2206.14076},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14076},
  doi          = {10.48550/ARXIV.2206.14076},
  eprinttype    = {arXiv},
  eprint       = {2206.14076},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhalfaouiLVGMU21,
  author       = {Sameh Khalfaoui and
                  Jean Leneutre and
                  Arthur Villard and
                  Ivan Gazeau and
                  Jingxuan Ma and
                  Pascal Urien},
  title        = {Security Analysis of Machine Learning-Based {PUF} Enrollment Protocols:
                  {A} Review},
  journal      = {Sensors},
  volume       = {21},
  number       = {24},
  pages        = {8415},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21248415},
  doi          = {10.3390/S21248415},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KhalfaouiLVGMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/KhalfaouiLVMU21,
  author       = {Sameh Khalfaoui and
                  Jean Leneutre and
                  Arthur Villard and
                  Jingxuan Ma and
                  Pascal Urien},
  title        = {Security Analysis of Out-of-Band Device Pairing Protocols: {A} Survey},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {8887472:1--8887472:30},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8887472},
  doi          = {10.1155/2021/8887472},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/KhalfaouiLVMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/Chaitou0LP21,
  author       = {Hassan Chaitou and
                  Thomas Robert and
                  Jean Leneutre and
                  Laurent Pautet},
  title        = {Assessing adversarial training effect on IDSs and GANs},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2021, Rhodes, Greece, July 26-28, 2021},
  pages        = {543--550},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSR51186.2021.9527949},
  doi          = {10.1109/CSR51186.2021.9527949},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/Chaitou0LP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/KhalfaouiLVGMDU21,
  author       = {Sameh Khalfaoui and
                  Jean Leneutre and
                  Arthur Villard and
                  Ivan Gazeau and
                  Jingxuan Ma and
                  Jean{-}Luc Danger and
                  Pascal Urien},
  editor       = {Mauro Andreolini and
                  Mirco Marchetti and
                  Dimiter R. Avresky},
  title        = {Water- {PUF:} An Insider Threat Resistant {PUF} Enrollment Protocol
                  Based on Machine Learning Watermarking},
  booktitle    = {20th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2021, Boston, MA, USA, November 23-26, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NCA53618.2021.9685239},
  doi          = {10.1109/NCA53618.2021.9685239},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/KhalfaouiLVGMDU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/AyraultBKL21,
  author       = {Maxime Ayrault and
                  Etienne Borde and
                  Ulrich K{\"{u}}hne and
                  Jean Leneutre},
  title        = {Moving Target Defense Strategy in Critical Embedded Systems: {A} Game-theoretic
                  Approach},
  booktitle    = {26th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2021, Perth, Australia, December 1-4, 2021},
  pages        = {27--36},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PRDC53464.2021.00014},
  doi          = {10.1109/PRDC53464.2021.00014},
  timestamp    = {Wed, 19 Jan 2022 17:40:15 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/AyraultBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2020,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68887-5},
  doi          = {10.1007/978-3-030-68887-5},
  isbn         = {978-3-030-68886-8},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/DenisCCLCL20,
  author       = {Nathana{\"{e}}l Denis and
                  Pierre Chaffardon and
                  Denis Conan and
                  Maryline Laurent and
                  Sophie Chabridon and
                  Jean Leneutre},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Privacy-preserving Content-based Publish/Subscribe with Encrypted
                  Matching and Data Splitting},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {405--414},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009833204050414},
  doi          = {10.5220/0009833204050414},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/DenisCCLCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DiopLLT20,
  author       = {A{\"{\i}}da Diop and
                  Maryline Laurent and
                  Jean Leneutre and
                  Jacques Traor{\'{e}}},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor
                  Networks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {84--95},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008962700840095},
  doi          = {10.5220/0008962700840095},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DiopLLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KhalfaouiLVMU20,
  author       = {Sameh Khalfaoui and
                  Jean Leneutre and
                  Arthur Villard and
                  Jingxuan Ma and
                  Pascal Urien},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {{COOB:} Hybrid Secure Device Pairing Scheme in a Hostile Environment},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {336},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63095-9\_27},
  doi          = {10.1007/978-3-030-63095-9\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KhalfaouiLVMU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KiennertIDL19,
  author       = {Christophe Kiennert and
                  Ziad Ismail and
                  Herv{\'{e}} Debar and
                  Jean Leneutre},
  title        = {A Survey on Game-Theoretic Approaches for Intrusion Detection and
                  Response Optimization},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {5},
  pages        = {90:1--90:31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3232848},
  doi          = {10.1145/3232848},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KiennertIDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/LaurentLCL19,
  author       = {Maryline Laurent and
                  Jean Leneutre and
                  Sophie Chabridon and
                  Imane Laaouane},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Authenticated and Privacy-Preserving Consent Management in the Internet
                  of Things},
  booktitle    = {The 10th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2019) / The 2nd International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2019) / Affiliated Workshops, April
                  29 - May 2, 2019, Leuven, Belgium},
  series       = {Procedia Computer Science},
  volume       = {151},
  pages        = {256--263},
  publisher    = {Elsevier},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.procs.2019.04.037},
  doi          = {10.1016/J.PROCS.2019.04.037},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/LaurentLCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/IsmailLF18,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  Alia Fourati},
  title        = {Optimal Deployment of Security Policies: Application to Industrial
                  Control Systems},
  booktitle    = {14th European Dependable Computing Conference, {EDCC} 2018, Ia{\c{s}}i,
                  Romania, September 10-14, 2018},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/EDCC.2018.00030},
  doi          = {10.1109/EDCC.2018.00030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/IsmailLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/CorollerCLCL18,
  author       = {Stevan Coroller and
                  Sophie Chabridon and
                  Maryline Laurent and
                  Denis Conan and
                  Jean Leneutre},
  title        = {Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures
                  in the Internet of Things},
  booktitle    = {Proceedings of the 5th Workshop on Middleware and Applications for
                  the Internet of Things, M4IoT@Middleware 2018, Rennes, France, December
                  10-11, 2018},
  pages        = {35--40},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3286719.3286727},
  doi          = {10.1145/3286719.3286727},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/CorollerCLCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DiopGLLT18,
  author       = {A{\"{\i}}da Diop and
                  Sa{\"{\i}}d Gharout and
                  Maryline Laurent and
                  Jean Leneutre and
                  Jacques Traor{\'{e}}},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Questioning the security and efficiency of the ESIoT approach},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {202--207},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212491},
  doi          = {10.1145/3212480.3212491},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DiopGLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/IsmailKL017,
  author       = {Ziad Ismail and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Game Theoretical Model for Optimal Distribution of Network Security
                  Resources},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {234--255},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_13},
  doi          = {10.1007/978-3-319-68711-7\_13},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/IsmailKL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IsmailKLC16,
  author       = {Ziad Ismail and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  title        = {Auditing a Cloud Provider's Compliance With Data Backup Requirements:
                  {A} Game Theoretical Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1685--1699},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2549002},
  doi          = {10.1109/TIFS.2016.2549002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IsmailKLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/IsmailLB016,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  David Bateman and
                  Lin Chen},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies
                  Between {ICT} and Electric Infrastructures},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_10},
  doi          = {10.1007/978-3-319-47413-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/IsmailLB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/NguyenL15,
  author       = {Trung Nguyen and
                  Jean Leneutre},
  title        = {A secure and effective device pairing protocol},
  booktitle    = {12th Annual {IEEE} Consumer Communications and Networking Conference,
                  {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015},
  pages        = {507--512},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCNC.2015.7158026},
  doi          = {10.1109/CCNC.2015.7158026},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/NguyenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IsmailLF15,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  Alia Fourati},
  editor       = {Adrien B{\'{e}}cue and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas and
                  Costas Lambrinoudakis},
  title        = {An Attack Execution Model for Industrial Control Systems Security
                  Assessment},
  booktitle    = {Security of Industrial Control Systems and Cyber Physical Systems
                  - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015,
                  Vienna, Austria, September 21-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9588},
  pages        = {157--167},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-40385-4\_11},
  doi          = {10.1007/978-3-319-40385-4\_11},
  timestamp    = {Mon, 03 Jan 2022 22:15:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/IsmailLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/IsmailLBC15,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  David Bateman and
                  Lin Chen},
  title        = {A Game-Theoretical Model for Security Risk Management of Interdependent
                  {ICT} and Electrical Infrastructures},
  booktitle    = {16th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2015, Daytona Beach, FL, USA, January 8-10, 2015},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HASE.2015.24},
  doi          = {10.1109/HASE.2015.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/IsmailLBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/IsmailLBC14,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  David Bateman and
                  Lin Chen},
  title        = {A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid
                  {AMI}},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {32},
  number       = {7},
  pages        = {1486--1499},
  year         = {2014},
  url          = {https://doi.org/10.1109/JSAC.2014.2332095},
  doi          = {10.1109/JSAC.2014.2332095},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/IsmailLBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14,
  author       = {Brahim Djebaili and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Data Integrity and Availability Verification Game in Untrusted Cloud
                  Storage},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_16},
  doi          = {10.1007/978-3-319-12601-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/NguyenL14,
  author       = {Trung Nguyen and
                  Jean Leneutre},
  title        = {Formal Analysis of Secure Device Pairing Protocols},
  booktitle    = {2014 {IEEE} 13th International Symposium on Network Computing and
                  Applications, {NCA} 2014, Cambridge, MA, USA, 21-23 August, 2014},
  pages        = {291--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/NCA.2014.50},
  doi          = {10.1109/NCA.2014.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/NguyenL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/OualhaLR12,
  author       = {Nouha Oualha and
                  Jean Leneutre and
                  Yves Roudier},
  title        = {Verifying remote data integrity in peer-to-peer data storage: {A}
                  comprehensive survey of protocols},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {5},
  number       = {3},
  pages        = {231--243},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12083-011-0117-3},
  doi          = {10.1007/S12083-011-0117-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/OualhaLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChenL11,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {Fight jamming with jamming - {A} game theoretic analysis of jamming
                  attack in wireless networks and defense strategy},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {9},
  pages        = {2259--2270},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.03.006},
  doi          = {10.1016/J.COMNET.2011.03.006},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChenLL11,
  author       = {Lin Chen and
                  Lavy Libman and
                  Jean Leneutre},
  title        = {Conflicts and Incentives in Wireless Cooperative Relaying: {A} Distributed
                  Market Pricing Framework},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {22},
  number       = {5},
  pages        = {758--772},
  year         = {2011},
  url          = {https://doi.org/10.1109/TPDS.2010.152},
  doi          = {10.1109/TPDS.2010.152},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ChenLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010-6514,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Ana R. Cavalli and
                  Jean Leneutre},
  title        = {Data Privacy Management and Autonomous Spontaneous Security - 5th
                  International Workshop, {DPM} 2010 and 3rd International Workshop,
                  {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6514},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19348-4},
  doi          = {10.1007/978-3-642-19348-4},
  isbn         = {978-3-642-19347-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2010-6514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/HeLL10,
  author       = {Ruan He and
                  Marc Lacoste and
                  Jean Leneutre},
  title        = {Virtual Security Kernel: {A} Component-Based {OS} Architecture for
                  Self-Protection},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {851--858},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.160},
  doi          = {10.1109/CIT.2010.160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/HeLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeLPL10,
  author       = {Ruan He and
                  Marc Lacoste and
                  Jacques Pulou and
                  Jean Leneutre},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Ana R. Cavalli and
                  Jean Leneutre},
  title        = {A {DSL} for Specifying Autonomic Security Management Strategies},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 5th
                  International Workshop, {DPM} 2010 and 3rd International Workshop,
                  {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6514},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19348-4\_16},
  doi          = {10.1007/978-3-642-19348-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeLPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icas/HeLL10,
  author       = {Ruan He and
                  Marc Lacoste and
                  Jean Leneutre},
  title        = {A Policy Management Framework for Self-Protection of Pervasive Systems},
  booktitle    = {Sixth International Conference on Autonomic and Autonomous Systems,
                  {ICAS} 2010, Cancun, Mexico, March 7-13, 2010},
  pages        = {104--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICAS.2010.22},
  doi          = {10.1109/ICAS.2010.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icas/HeLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ChenL09,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {On Multipath Routing in Multihop Wireless Networks: Security, Performance,
                  and Their Tradeoff},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/946493},
  doi          = {10.1155/2009/946493},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ChenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenL09,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {A game theoretical framework on intrusion detection in heterogeneous
                  networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {165--178},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2019154},
  doi          = {10.1109/TIFS.2009.2019154},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AljnidiL09,
  author       = {Mohamad Aljnidi and
                  Jean Leneutre},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Yves Roudier},
  title        = {{ASRBAC:} {A} Security Administration Model for Mobile Autonomic Networks
                  (MAutoNets)},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 4th International
                  Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009,
                  St. Malo, France, September 24-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5939},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11207-2\_13},
  doi          = {10.1007/978-3-642-11207-2\_13},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AljnidiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChenL09,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {Efficient medium access control design for autonomous wireless networks
                  - {A} game theoretic approach},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {376--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355131},
  doi          = {10.1109/LCN.2009.5355131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ChenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/HeLL09,
  author       = {Ruan He and
                  Marc Lacoste and
                  Jean Leneutre},
  editor       = {Rachid Guerraoui and
                  Franck Petit},
  title        = {Brief Announcement: An {OS} Architecture for Device Self-protection},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 11th International
                  Symposium, {SSS} 2009, Lyon, France, November 3-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5873},
  pages        = {783--784},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05118-0\_59},
  doi          = {10.1007/978-3-642-05118-0\_59},
  timestamp    = {Wed, 07 Dec 2022 23:13:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/HeLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChenL08,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {A Game Theoretic Framework of Distributed Power and Rate Control in
                  {IEEE} 802.11 WLANs},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {26},
  number       = {7},
  pages        = {1128--1137},
  year         = {2008},
  url          = {https://doi.org/10.1109/JSAC.2008.080910},
  doi          = {10.1109/JSAC.2008.080910},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ChenL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenL07,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {Toward secure and scalable time synchronization in ad hoc networks},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {11-12},
  pages        = {2453--2467},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2007.04.017},
  doi          = {10.1016/J.COMCOM.2007.04.017},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AljnidiL07,
  author       = {Mohamad Aljnidi and
                  Jean Leneutre},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Towards an Autonomic Security System for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {29--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.53},
  doi          = {10.1109/IAS.2007.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AljnidiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/autonomics/AljnidiL07,
  author       = {Mohamad Aljnidi and
                  Jean Leneutre},
  editor       = {Fabrizio Davide},
  title        = {A security policy system for mobile autonomic networks},
  booktitle    = {Proceedings of the 1st International Conference on Autonomic Computing
                  and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome,
                  Italy},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {302},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/ICST.AUTONOMICS2007.2205},
  doi          = {10.4108/ICST.AUTONOMICS2007.2205},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/autonomics/AljnidiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ChenL07,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {On the Power and Rate Control in {IEEE} 802.11 WLANs - {A} Game Theoretical
                  Approach},
  booktitle    = {Proceedings of the 16th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii,
                  USA, August 13-16, 2007},
  pages        = {450--456},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICCCN.2007.4317860},
  doi          = {10.1109/ICCCN.2007.4317860},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ChenL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChenL07,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {Selfishness, Not Always {A} Nightmare: Modeling Selfish {MAC} Behaviors
                  in Wireless Mobile Ad Hoc Networks},
  booktitle    = {27th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {16},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCS.2007.138},
  doi          = {10.1109/ICDCS.2007.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChenL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ChenL07,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {A Game Theoretic Framework of Distributed Power and Rate Control in
                  {IEEE} 802.11 WLANs},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {338--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375870},
  doi          = {10.1109/ICNP.2007.4375870},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ChenL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurongi/AljnidiL06,
  author       = {Mohamad Aljnidi and
                  Jean Leneutre},
  editor       = {Hermann de Meer and
                  James P. G. Sterbenz},
  title        = {Autonomic Security for Home Networks},
  booktitle    = {Self-Organizing Systems, First International Workshop, {IWSOS} 2006,
                  and Third International Workshop on New Trends in Network Architectures
                  and Services, EuroNGI 2006, Passau, Germany, September 18-20, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4124},
  pages        = {239--242},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11822035\_21},
  doi          = {10.1007/11822035\_21},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/eurongi/AljnidiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/ChenL06,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {A Secure and Scalable Time Synchronization Protocol in {IEEE} 802.11
                  Ad Hoc Networks},
  booktitle    = {2006 International Conference on Parallel Processing Workshops {(ICPP}
                  Workshops 2006), 14-18 August 2006, Columbus, Ohio, {USA}},
  pages        = {207--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPPW.2006.17},
  doi          = {10.1109/ICPPW.2006.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/ChenL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwmc/ChenLP06,
  author       = {Lin Chen and
                  Jean Leneutre and
                  Jean{-}Jacques Puig},
  editor       = {Petre Dini and
                  Christer {\AA}hlund and
                  Cosmin Dini and
                  Eugen Borcoci},
  title        = {A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks},
  booktitle    = {Proceedings of the Second International Conference on Wireless and
                  Mobile Communications (ICWMC'06), Bucharest, Romania, July 29-31,
                  2006},
  pages        = {36},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICWMC.2006.14},
  doi          = {10.1109/ICWMC.2006.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwmc/ChenLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imecs/ChenXL06,
  author       = {Lin Chen and
                  Xiaoyun Xue and
                  Jean Leneutre},
  editor       = {Sio Iong Ao and
                  Jeong{-}A Lee and
                  Oscar Castillo and
                  Pranay Chaudhuri and
                  David Dagan Feng},
  title        = {A Lightweight Mechanism to Secure {OLSR}},
  booktitle    = {Proceedings of the International MultiConference of Engineers and
                  Computer Scientists 2006, {IMECS} '06, June 20-22, 2006, Hong Kong,
                  China},
  series       = {Lecture Notes in Engineering and Computer Science},
  pages        = {887--895},
  publisher    = {Newswood Limited},
  year         = {2006},
  timestamp    = {Wed, 12 Sep 2018 01:05:12 +0200},
  biburl       = {https://dblp.org/rec/conf/imecs/ChenXL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/XueLB04,
  author       = {Xiaoyun Xue and
                  Jean Leneutre and
                  Jalel Ben{-}Othman},
  editor       = {Elizabeth M. Belding{-}Royer and
                  Khaldoun Al Agha and
                  Guy Pujolle},
  title        = {A Trust-Based Routing Protocol for Ad Hoc Networks},
  booktitle    = {Mobile and Wireless Communication Networks, {IFIP} {TC6} / {WG6.8}
                  Conference on Mobile and Wireless Communication Networks {(MWCN} 2004),
                  October 25-27, 2004, Paris, France},
  series       = {{IFIP}},
  volume       = {162},
  pages        = {251--262},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-23150-1\_22},
  doi          = {10.1007/0-387-23150-1\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/XueLB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}