Alexis Olivereau

According to our database1, Alexis Olivereau authored at least 30 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

On the Management of TSN Networks in 6G: A Network Digital Twin Approach.
Proceedings of the 28th IEEE International Conference on Emerging Technologies and Factory Automation, 2023

Efficient Network Representation for GNN-Based Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 2023

2020
Configuration of the Detection Function in a Distributed IDS Using Game Theory.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

Unsupervised Protocol-based Intrusion Detection for Real-world Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Predicting Bandwidth Utilization on Network Links Using Machine Learning.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Anomaly Detection in Vehicle-to-Infrastructure Communications.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

2017
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
A Lightweight Threat Detection System for Industrial Wireless Sensor Networks.
Int. J. Netw. Secur., 2016

2014
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications.
J. Netw. Comput. Appl., 2014

Lightweight collaborative key establishment scheme for the Internet of Things.
Comput. Networks, 2014

2013
Trust management system design for the Internet of Things: A context-aware and multi-service approach.
Comput. Secur., 2013

Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Pseudonymous communications in secure industrial wireless sensor networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks.
Proceedings of the Self-Organizing Systems - 7th IFIP TC 6 International Workshop, 2013

COACH: A context aware and multi-service trust model for Cooperation management in heterogeneous wireless networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
D-HIP: A distributed key exchange scheme for HIP-based Internet of Things.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract).
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

A Distributed Approach for Secure M2M Communications.
Proceedings of the 5th International Conference on New Technologies, 2012

(k, n) threshold distributed key exchange for HIP based internet of things.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

AAA-based infrastructure for industrial wireless sensor networks.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things.
Proceedings of the Third International Conference on Communications and Networking, 2012

2011
Energy efficiency in M2M networks: A cooperative key establishment system.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project.
Proceedings of the First SysSec Workshop 2011, 2011


  Loading...