Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cr@ck3n: A cyber alerts visualization object., , , , , and . CyberSA, page 1-2. IEEE, (2017)Trust Assessment for the Security of Information Systems., , and . EGC (best of volume), volume 834 of Studies in Computational Intelligence, page 159-181. Springer, (2018)Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire. (Trust management for contextual cyberattacks detection on board ship).. IMT Atlantique Bretagne Pays de la Loire, France, (2018)Realistic simulation of users for IT systems in cyber ranges., , , and . CoRR, (2021)DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring., , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 53-69. Springer, (2022)Pirate ta fac ! Ludification de séances de cours sur la sécurité des systèmes d'information., and . INFORSID, page 125-140. (2022)Generating data sets as inputs of reference for cyber security issues and industrial control systems., , , , , , and . RCIS, page 453-454. IEEE, (2017)Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties., , , , and . C&ESAR, volume 3329 of CEUR Workshop Proceedings, page 65-80. CEUR-WS.org, (2022)Mesure de la confiance dans les systèmes d'information : application aux données de navires., , and . EGC, volume E-33 of Revue des Nouvelles Technologies de l'Information, page 117-128. Éditions RNTI, (2017)