Jean Leneutre

Orcid: 0000-0003-1943-1583

According to our database1, Jean Leneutre authored at least 59 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Probabilistic Obstruction Temporal Logic: a Probabilistic Logic to Reason about Dynamic Models.
CoRR, 2024

A Formal Verification Approach to Handle Attack Graphs.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Obstruction Alternating-time Temporal Logic: A Strategic Logic to Reason about Dynamic Models.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

Strategic Reasoning under Capacity-constrained Agents.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

A Model-based Approach for Assessing the Security of Cyber-Physical Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Attack Graphs & Subset Sabotage Games.
Intelligenza Artificiale, 2023

Capacity ATL.
CoRR, 2023

A Game Theoretic Approach to Attack Graphs.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Obstruction Logic: A Strategic Temporal Logic to Reason About Dynamic Game Models.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Reasoning About Dynamic Game Models Using Obstruction Logic (short paper).
Proceedings of the the Italian Workshop on Planning and Scheduling, 2023

2022
Subset sabotage games & attack graphs.
Proceedings of the 23rd Workshop "From Objects to Agents", 2022

Threats to Adversarial Training for IDSs and Mitigation.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

Reasoning about Moving Target Defense in Attack Modeling Formalisms.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

Towards a Formal Verification of Attack Graphs.
Proceedings of the 10th Italian workshop on Planning and Scheduling (IPS 2022), RCRA Incontri E Confronti (RiCeRcA 2022), and the workshop on Strategies, Prediction, Interaction, and Reasoning in Italy (SPIRIT 2022) co-located with 21st International Conference of the Italian Association for Artificial Intelligence (AIxIA 2022), November 28, 2022

2021
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey.
Wirel. Commun. Mob. Comput., 2021

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review.
Sensors, 2021

Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Assessing adversarial training effect on IDSs and GANs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment.
Proceedings of the Security and Privacy in Communication Networks, 2020

CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization.
ACM Comput. Surv., 2019

Authenticated and Privacy-Preserving Consent Management in the Internet of Things.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

2018
Questioning the security and efficiency of the ESIoT approach.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

Optimal Deployment of Security Policies: Application to Industrial Control Systems.
Proceedings of the 14th European Dependable Computing Conference, 2018

2017
A Game Theoretical Model for Optimal Distribution of Network Security Resources.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis.
IEEE Trans. Inf. Forensics Secur., 2016

A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

An Attack Execution Model for Industrial Control Systems Security Assessment.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

A secure and effective device pairing protocol.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI.
IEEE J. Sel. Areas Commun., 2014

Formal Analysis of Secure Device Pairing Protocols.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Data Integrity and Availability Verification Game in Untrusted Cloud Storage.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2012
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols.
Peer-to-Peer Netw. Appl., 2012

2011
Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework.
IEEE Trans. Parallel Distributed Syst., 2011

Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy.
Comput. Networks, 2011

2010
A Policy Management Framework for Self-Protection of Pervasive Systems.
Proceedings of the Sixth International Conference on Autonomic and Autonomous Systems, 2010

A DSL for Specifying Autonomic Security Management Strategies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A game theoretical framework on intrusion detection in heterogeneous networks.
IEEE Trans. Inf. Forensics Secur., 2009

On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff.
EURASIP J. Wirel. Commun. Netw., 2009

Brief Announcement: An OS Architecture for Device Self-protection.
Proceedings of the Stabilization, 2009

Efficient medium access control design for autonomous wireless networks - A game theoretic approach.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets).
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs.
IEEE J. Sel. Areas Commun., 2008

2007
Toward secure and scalable time synchronization in ad hoc networks.
Comput. Commun., 2007

Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

On the Power and Rate Control in IEEE 802.11 WLANs - A Game Theoretical Approach.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

A security policy system for mobile autonomic networks.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

Towards an Autonomic Security System for Mobile Ad Hoc Networks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Lightweight Mechanism to Secure OLSR.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Autonomic Security for Home Networks.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2004
A Trust-Based Routing Protocol for Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communication Networks, 2004


  Loading...