Maxime Puys
Orcid: 0000-0001-6127-9816
According to our database1,
Maxime Puys
authored at least 25 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Information Security - 27th International Conference, 2024
2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023
2022
A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms.
ACM Trans. Design Autom. Electr. Syst., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems.
J. Internet Serv. Inf. Secur., 2022
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.
Proceedings of the Secure IT Systems, 2022
2021
Proceedings of the 19th IEEE International New Circuits and Systems Conference, 2021
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2019
Comput. Secur., 2019
Proceedings of the Advances in Information and Computer Security, 2019
2018
Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques. (Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios).
PhD thesis, 2018
2017
Comput. Secur., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Computer Safety, Reliability, and Security, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
2015
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
2014
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014