Jonathan Petit

Orcid: 0000-0002-8644-1442

According to our database1, Jonathan Petit authored at least 50 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Next Generation Vehicles, Safety, and Cybersecurity - The CMX Framework.
IEEE Trans. Intell. Transp. Syst., February, 2024

VOGUES: Validation of Object Guise using Estimated Components.
Proceedings of the 33rd USENIX Security Symposium, 2024

PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
Proceedings of the 33rd USENIX Security Symposium, 2024

Vehigan:Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

SPIDER: Interplay Assessment Method for Privacy and Other Values.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Navigating Privacy Patterns in the Era of Robotaxis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
A survey on misbehavior detection for connected and autonomous vehicles.
Veh. Commun., 2023

2022
PKIs in C-ITS: Security functions, architectures and projects: A survey.
Veh. Commun., 2022

V2X Misbehavior in Maneuver Sharing and Coordination Service: Considerations for Standardization.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022

2021
Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS.
Proceedings of the Research Challenges in Information Science, 2021

V2X Misbehavior and Collective Perception Service: Considerations for Standardization.
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021

2020
Simulation Framework for Misbehavior Detection in Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

2019
Physical layer plausibility checks for misbehavior detection in V2X networks.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
Privacy of Connected Vehicles.
Proceedings of the Handbook of Mobile Data Privacy., 2018

An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intell. Transp. Syst., 2018

Pearson Correlation Analysis to Detect Misbehavior in VANET.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

2017
Binary Hash Tree based Certificate Access Management.
IACR Cryptol. ePrint Arch., 2017

Binary hash tree based certificate access management for connected vehicles.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2015
Potential Cyberattacks on Automated Vehicles.
IEEE Trans. Intell. Transp. Syst., 2015

Pseudonym Schemes in Vehicular Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Threat and Countermeasures Analysis for WAVE Service Advertisement.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
In-Network Aggregation for Vehicular Ad Hoc Networks.
IEEE Commun. Surv. Tutorials, 2014

Revisiting attacker model for smart vehicles.
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014

Formal model of certificate omission schemes in VANET.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

2013
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.
IEEE Trans. Veh. Technol., 2013

Authentication and consensus overhead in vehicular ad hoc networks.
Telecommun. Syst., 2013

Reactive and adaptive monitoring to secure aggregation in wireless sensor networks.
Telecommun. Syst., 2013

Copra: Conditional pseudonym resolution algorithm in VANETs.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

Impact of V2X privacy strategies on Intersection Collision Avoidance systems.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

The impact of security on cooperative awareness in VANET.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

Short paper: Experimental analysis of misbehavior detection and prevention in VANETs.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

POPCORN: privacy-preserving charging for emobility.
Proceedings of the CyCAR'13, 2013

Efficient and secure storage of private keys for pseudonymous vehicular communication.
Proceedings of the CyCAR'13, 2013

2012
On the potential of PUF for pseudonym generation in vehicular networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Evaluation of congestion-based certificate omission in VANETs.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Congestion-based certificate omission in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Analyzing dissemination redundancy to achieve data consistency in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Central misbehavior evaluation for VANETs based on mobility data plausibility.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

2011
Surcoût de l'authentification et du consensus dans la sécurité des réseaux sans fil véhiculaires. (Authentication and Consensus Overhead in Vehicular Ad Hoc Networks).
PhD thesis, 2011

RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks.
J. Univers. Comput. Sci., 2011

Trustworthy Broadcasting in IEEE 802.11p/WAVE Vehicular Networks: Delay Analysis.
IEEE Commun. Lett., 2011

Dynamic consensus for secured vehicular ad hoc networks.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

Spoofed data detection in VANETs using dynamic thresholds.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

2010
Analysis of authentication overhead in vehicular networks.
Proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference, 2010

2009
Analysis of ECDSA Authentication Processing in VANETs.
Proceedings of the NTMS 2009, 2009


  Loading...