Home Website
Publications
DBLP
,
Google Scholar
Books
,
Symposia
Contact
,
Short Bio
Research & Projects
Lectures & Seminars
Projects & Actions
Digital Maintenance for Sustainable and Flexible Operation of Hydropower Plant (Di-Hydro)
Future Networks (PEPR)
Trustworthy AI for Connected, Cooperative and Automated Mobility (AI4CCAM)
International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance)
digital TuRn in EUrope: Strengthening relational reliance through Technology (TRUST)
Hub Cyber & Security — Systematic Paris Region
Norwegian Centre for Cybersecurity in Critical Sectors (NORCICS)
Intelligent Management of Processes, Ethics and Technology for Urban Safety (IMPETUS)
Ericsson-Carleton Partnership Advances 5G Wireless Communications
BGIN (Blockchain Governance Initiative Network)
Laboratory for Information, Networking and Communication Sciences (LINCS)
SPARTA (Strategic programs for advanced research and technology in Europe)
BART (Blockchain Advanced Research & Technologies)
[PDF]
Chair on Cyber Security of Critical National Infrastructures
(Cyber CNI Chair)
Adaptive Trust-based e-Assessment
(video)
(@TeSLA)
Blockchain Research Network (BSAFE.network)
(2017 map)
User-centric Management of Security and Dependability in Clouds of Clouds (SUPERCLOUD)
Adaptive Multi-sensor Biomimetics for Unsupervised Submarine Hunt
(AMBUSH)
Chaire de cyberdéfense des systèmes navals
(Chaire Cyber Navale)
Dynamic Risk Approaches for Automated Cyber Defence (PANOPTESEC)
Nippon-European Cyberdefense-Oriented Multilayer threat Analysis (NECOMA)
Chair Values and Policies of Personal Information (CVPIP)
Visual Analytic Representation of Large Datasets for Enhancing Network Security
(VIS-SENSE)
Sustainable Privacy for a Sustainable Information Society (CO-PRIVACY)
Attacks Detection And Countermeasures Simulation (ADAX)
Policy Refined Dynamically and Kept On Track (PREDYKOT)
DEcentralized, cooperative, and privacy-preserving MONitoring for trustworthinesS
(DEMONS)
Advanced Research on Information Security and Privacy (ARES)
Role-centric identity
(Role-ID)
REaction after Detection
(RED)
Trust Management in Dynamic Open Systems
(iTRUST)
Sample Prototypes
Quantum Algorithms for Shapley Value Calculation
—
[Sample Circuit]
Drones & Micro Aerial Vehicle (MAV) Communications
Underwater Wireless Communications
—
[Related projects]
Cyber-Physical Testbeds & SCADA Protocols
—
[Press release in French]
Automated Tools for the Selection of Countermeasures
WebVisor (Malware C&C Classifier)
MIRAGE (MIsconfiguRAtion manaGEr)