@Comment http://www-public.tem-tsp.eu/~garcia_a/web/publications.html @Comment 2023 @inproceedings{burge2023quantum, title={Quantum Algorithms for Shapley Value Calculation}, author={Burge, Iain and Barbeau, Michel and Garcia-Alfaro, Joaquin}, booktitle={2023 IEEE International Conference on Quantum Computing and Engineering (QCE)}, volume={1}, pages={1--9}, year={2023}, organization={IEEE} } @inproceedings{Saint-Hilaire2023Sec, author={Saint-Hilaire, K\'eren and Cuppens, Fr\'ed\'eric and Cuppens, Nora and Garcia-Alfaro, Joaquin}, title={Automated Enrichment of Logical Attack Graphs via Formal Ontologies}, booktitle = {38th IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2023), Poznan, Poland, June 14-16 2023}, doi = {}, url = {}, } @article{pamiesCOSE2023, title = {On the self-adjustment of privacy safeguards for query log streams}, journal = {Computers \& Security}, volume = {134}, pages = {103450}, year = {2023}, issn = {0167-4048}, doi = {https://doi.org/10.1016/j.cose.2023.103450}, url = {https://www.sciencedirect.com/science/article/pii/S0167404823003607}, author = {David Pamies-Estrems and Joaquin Garcia-Alfaro}, } @article{kaaniche2019anonymous, title={Anonymous certification for E-assessment opinion polls}, author={Kaaniche, Nesrine and Kiennert, Chistophe and Laurent, Maryline and Garcia-Alfaro, Joaquin}, journal={Journal of Ambient Intelligence and Humanized Computing}, pages={14979--14993}, volume={14(11)}, year={2023}, month={november}, publisher={Springer}, doi={10.1007/s12652-019-01545-2}, url={https://dx.doi.org/10.1007/s12652-019-01545-2}, } @inproceedings{Dagnas2023Networking, author={Dagnas, Romain and Barbeau, Michel and Boutin, Maxime and Garcia-Alfaro, Joaquin and Yaich, Reda}, title = {Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems}, booktitle = {22nd IFIP International Conference on Networking (IFIP NETWORKING 2023), Barcelona, Spain, June 12-15, 2023.}, doi = {}, url = {}, } @misc{faraj2023zircon, title={ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks}, author={Omair Faraj and David Megias and Joaquin Garcia-Alfaro}, year={2023}, eprint={2305.00266}, archivePrefix={arXiv}, primaryClass={cs.CR}, doi = {}, url = {}, } @article{ghaffari2023widening, title={Widening Blockchain Technology toward Access Control for Service Provisioning in Cellular Networks}, author={Ghaffari, Fariba and Aryal, Nischal and Bertin, Emmanuel and Crespi, Noel and Garcia-Alfaro, Joaquin}, journal={Sensors}, volume={23}, number={9}, pages={4224}, year={2023}, publisher={MDPI}, doi = {}, url = {}, } @book{lncs13877, title={{Foundations and Practice of Security, 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers}}, author={Guy-Vincent Jourdan and Laurent Mounier and Carlisle Adams and Florence Sedes and Joaquin Garcia-Alfaro}, year={2022}, publisher={Springer}, series={LNCS 13877}, doi = {10.1007/978-3-031-30122-3}, url = {https://doi.org/10.1007/978-3-031-30122-3}, } @misc{barbeau2023repeated, title={Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks}, author={Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis}, year={2023}, eprint={2302.13791}, archivePrefix={arXiv}, primaryClass={quant-ph}, doi = {}, url = {}, } @misc{segoviaferreira2023cyberresilience, title={Cyber-Resilience Approaches for Cyber-Physical Systems}, author={Mariana Segovia-Ferreira and Jose Rubio-Hernan and Ana R. Cavalli and Joaquin Garcia-Alfaro}, year={2023}, eprint={2302.05402}, archivePrefix={arXiv}, primaryClass={cs.CR}, doi = {}, url = {}, } @misc{burge2023quantum, title={A Quantum Algorithm for Shapley Value Estimation}, author={Iain Burge and Michel Barbeau and Joaquin Garcia-Alfaro}, year={2023}, eprint={2301.04727}, archivePrefix={arXiv}, primaryClass={quant-ph}, doi = {}, url = {}, } @book{lncs13619, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2022 and CBT 2022)}}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Dragoni, Nicola}, year={2023}, publisher={Springer}, series={LNCS 13619}, month={February}, doi = {10.1007/978-3-031-25734-6}, url = {https://doi.org/10.1007/978-3-031-25734-6}, } @Comment 2022 @inproceedings{ceur-ws3329barbeau, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Christian Lübben and Marc-Oliver Pahl and Lars Wüstrich}, editor = {Gurvan le Guernic}, title = {Resilience via Blackbox Self-Piloting Plants}, booktitle = {29th Computer \& Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), Rennes, France, November 15-16, 2022.}, series = {{CEUR} Workshop Proceedings}, volume = {3329}, pages = {35--46}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3329/paper-02.pdf}, } @inproceedings{banaeizadeh2022uplink, title={Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA}, author={Banaeizadeh, Fatemeh and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kothapalli, Venkata Srinivas and Kranakis, Evangelos}, booktitle={IEEE Latin-American Conference on Communications (LATINCOM 2022)}, pages={1--6}, year={2022}, organization={IEEE} } @book{megias2022eicc, title={EICC 2022: European Interdisciplinary Cybersecurity Conference}, author={Megias, David and Di Pietro, Roberto and Garcia-alfaro, Joaquin}, year={2022}, publisher={ACM}, doi = {10.1145/3528580}, url = {https://doi.org/10.1145/3528580}, } @incollection{rubio2022non, title={Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems}, author={Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro, Joaquin}, booktitle={Emerging Trends in Cybersecurity Applications}, pages={347--370}, year={2022}, publisher={Springer}, doi = {10.1007/978-3-031-09640-2_16}, url = {https://doi.org/10.1007/978-3-031-09640-2_16}, } @article{segovia2022design, title={Design, modeling and implementation of digital twins}, author={Segovia, Mariana and Garcia-Alfaro, Joaquin}, journal={Sensors}, volume={22}, number={14}, pages={5396}, year={2022}, publisher={MDPI}, doi = {10.3390/s22145396}, url = {https://doi.org/10.3390/s22145396}, } @inproceedings{segovia2022secrypt, title={{Switched-based Control Testbed to Assure Cyber-physical Resilience by Design}}, author={Segovia, Mariana and Rubio-Hernan, Jose and Cavalli, Ana and Garcia-Alfaro, Joaquin}, booktitle={Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), Lisbon, Portugal}, isbn={978-989-758-590-6}, issn={2184-7711}, pages={681--686}, month={July}, year={2022}, doi = {}, url = {}, } @inproceedings{seng2022secrypt, title={{Implementation of a Stateful Network Protocol Intrusion Detection Systems}}, author={Seng, S. and Garcia-Alfaro, Joaquin and Laarouci, Youssef}, booktitle={Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), Lisbon, Portugal}, isbn={978-989-758-590-6}, issn={2184-7711}, pages={398--405}, month={July}, year={2022}, } @book{lncs13291, title={{Foundations and Practice of Security, 14th International Symposium, FPS 2021, Paris, France, December 7–10, 2021, Revised Selected Papers}}, author={Esma Aimeur and Maryline Laurent and Reda Yaich and Benoit Dupont and Joaquin Garcia-Alfaro}, year={2022}, publisher={Springer}, series={LNCS 13291}, doi = {10.1007/978-3-031-08147-7}, url = {https://doi.org/10.1007/978-3-031-08147-7}, } @misc{burge2022DWelt, title={{Quantum Predictive Modelling with Applications in Cybersecurity}}, author={Iain Burge and Michel Barbeau and Joaquin Garcia-Alfaro}, howpublished={Digitale Welt, V:P1-P2, June 2022}, year={\url{https://digitaleweltmagazin.de/fachbeitrag/quantum-predictive-modelling-with-applications-in-cyber-physical-security/}, 2022}, url = {https://digitaleweltmagazin.de/fachbeitrag/quantum-predictive-modelling-with-applications-in-cyber-physical-security/}, } @misc{seng2022RESSI, title={{STANPI, une sonde de détection d’intrusion réseau avec suivi d’état pour système industriel}}, author={S. Seng and Joaquin Garcia-Alfaro and Youssef Laarouchi}, howpublished={RESSI 2022 (Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information), May 2022}, } @article{barbeau2022research, title={Research Trends in Collaborative Drones}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, journal={Sensors}, volume={22}, number={9}, pages={3321}, year={2022}, publisher={MDPI}, doi = {10.3390/s22093321}, url = {https://doi.org/10.3390/s22093321}, } @misc{burge2022Cognitive, title={{Quantum predictive modeling for multi-agent systems with application to cyber-physical security}}, author={Iain Burge and Michel Barbeau and Joaquin Garcia-Alfaro}, howpublished={Cognitive Science Graduate Conference, May 2022}, year={\url{https://carleton.ca/cognitivescience/carleton-cog-sci-graduate-conference-2022/}, 2022}, url = {https://carleton.ca/cognitivescience/carleton-cog-sci-graduate-conference-2022/}, } @article{barbeau2022cyber, title={{Cyber-Physical Defense in the Quantum Era}}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin}, journal={Scientific Reports}, volume={12}, number={1}, pages={1--11}, year={2022}, publisher={Nature Publishing Group}, doi = {10.1038/s41598-022-05690-1}, url = {https://doi.org/10.1038/s41598-022-05690-1}, } @book{lncs13140, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology}}, author={Joaquin Garcia-Alfaro and Jose Mu\~{n}oz-Tapia and Guillermo Navarro-Arribas and Miquel Soriano}, year={2022}, publisher={Springer}, series={LNCS 13140}, doi = {10.1007/978-3-030-93944-1}, url = {https://link.springer.com/book/10.1007/978-3-030-93944-1}, } @Comment 2021 @misc{Kaaniche2021TIEMS, title={{Parivacy-preserving Challenges for Urban Safety}}, author={Kaaniche, Nesrine and Garcia-Alfaro, Joaquin}, month={December}, year={2021}, publisher={TIEMS Annual Conference, December 2021, Paris, France}, } @misc{SHilaire2021TIEMS, title={{Ontology-based Attack Graph Enrichment}}, author={Saint-Hilaire, K\'eren and Cuppens, Fr\'ed\'eric and Cuppens, Nora and Garcia-Alfaro, Joaquin}, month={December}, year={2021}, publisher={TIEMS Annual Conference, December 2021, Paris, France}, } @inproceedings{seng2021fps, author = {S. Seng and Joaquin Garcia-Alfaro and Youssef Laarouchi}, title = {Why anomaly-based intrusion detection systems have not yet conquered the industrial market?}, booktitle = {Foundations and Practice of Security - 14th International Symposium, {FPS} 2021, Paris, France, December 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13291}, pages = {341--354}, publisher = {Springer Nature}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08147-7_23}, doi = {10.1007/978-3-031-08147-7_23}, } @article{Barbeau2021DW, title={{The Quantum What? Advantage, Utopia or Threat?}}, author={Barbeau, Michel and Beurier, Erwan and Garcia-Alfaro, Joaquin and Kuang, Randy and Pahl, Marc-Oliver and Pastor, Dominique}, journal={Digitale Welt}, volume={5}, pages={34--39}, month={October}, year={2021}, } @book{LNICSTvol398PartI, title={{Security and Privacy in Communication Networks, 17th EAI International Conference, SecureComm 2021, Part I}}, author={Joaquin Garcia-Alfaro and Shujun Li and Radha Poovendran and Herv\'e Debar and Moti Yung}, year={2022}, publisher={Springer}, series={LNCS 13140}, doi = {10.1007/978-3-030-90019-9}, url = {https://doi.org/10.1007/978-3-030-90019-9}, } @book{LNICSTvol398PartII, title={{Security and Privacy in Communication Networks, 17th EAI International Conference, SecureComm 2021, Part II}}, author={Joaquin Garcia-Alfaro and Shujun Li and Radha Poovendran and Herv\'e Debar and Moti Yung}, year={2022}, publisher={Springer}, series={LNCS 13140}, doi = {10.1007/978-3-030-90022-9}, url = {https://doi.org/10.1007/978-3-030-90022-9}, } @inproceedings{barbeau2021risky, title={Risky Zone Avoidance Strategies for Drones}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages={1--6}, year={2021}, organization={IEEE} } @inproceedings{banaeizadeh2021pilot, title={Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks}, author={Banaeizadeh, Fatemeh and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Wan, Tao}, booktitle={2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)}, pages={479--484}, year={2021}, organization={IEEE} } @article{barbeau2021gps, title={GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Santos, Fillipe}, journal={Sensors}, volume={21}, number={14}, pages={4731}, year={2021}, publisher={Multidisciplinary Digital Publishing Institute} } @article{ahvar2021deca, title={DECA: a Dynamic Energy cost and Carbon emission-efficient Application placement method for Edge Clouds}, author={Ahvar, Ehsan and Ahvar, Shohreh and Mann, Zolt{\'a}n {\'A}d{\'a}m and Crespi, Noel and Glitho, Roch and Garcia-Alfaro, Joaquin}, journal={IEEE Access}, year={2021}, publisher={IEEE}, doi = {10.1109/ACCESS.2021.3075973}, url = {https://doi.org/10.1109/ACCESS.2021.3075973}, } @article{GalvanGNT21, author = {Edgar Galv{\'{a}}n and Joaquin Garcia-Alfaro and Guillermo Navarro{-}Arribas and Vicen{\c{c}} Torra}, title = {Agents in a privacy-preserving world}, journal = {Trans. Data Priv.}, volume = {14}, number = {1}, pages = {53--63}, year = {2021}, url = {http://www.tdp.cat/issues21/tdp.a419a21.pdf}, } @book{lncs12637, title={{Foundations and Practice of Security, 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers}}, author={Gabriela Nicolescu and Assia Tria and Jose M. Fernandez and Jean-Yves Marion and Joaquin Garcia-Alfaro}, year={2021}, publisher={Springer}, series={LNCS 12637}, doi = {10.1007/978-3-030-70881-8}, url = {https://doi.org/10.1007/978-3-030-70881-8}, } @article{barbeau2021resilience, title={Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics}, author={Barbeau, Michel and Cuppens, Fr{\'e}d{\'e}ric and Cuppens, Nora and Dagnas, Romain and Garcia-Alfaro, Joaquin}, journal={IEEE Access}, volume={9}, pages={46462--46475}, year={2021}, publisher={IEEE}, doi = {10.1109/ACCESS.2021.3066108}, url = {https://doi.org/10.1109/ACCESS.2021.3066108}, } @book{lncs12528, title={{Risks and Security of Internet and Systems, 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers}}, author={Joaquin Garcia-Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, year={2021}, publisher={Springer}, series={LNCS 12528}, doi = {10.1007/978-3-030-68887-5}, url = {https://doi.org/10.1007/978-3-030-68887-5}, } @Comment 2020 @inproceedings{barbeau2021metrics, title={Metrics to enhance the resilience of cyber-physical systems}, author={Barbeau, Michel and Cuppens, Fr{\'e}d{\'e}ric and Cuppens, Nora and Dagnas, Romain and Garcia-Alfaro, Joaquin}, booktitle={2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)}, pages={1167--1172}, year={2021}, organization={IEEE}, doi = {10.1109/TrustCom50675.2020.00156}, url = {https://doi.org/10.1109/TrustCom50675.2020.00156}, } @techreport{sharma2020anonymousTechRep, title={Anonymous proof-of-asset transactions using designated blind signatures}, author={Sharma, Neetu and Sahu, Rajeev Anand and Saraswat, Vishal and Garcia-Alfaro, Joaquin}, journal={arXiv preprint arXiv:2009.13978}, year={2020}, url = {https://arxiv.org/pdf/2009.13978}, } @inproceedings{sharma2020anonymous, author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro}, title = {Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures}, booktitle = {Foundations and Practice of Security - 13th International Symposium, {FPS} 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12637}, pages = {137--146}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70881-8\_9}, doi = {10.1007/978-3-030-70881-8\_9}, } @article{segovia2020switched, title={Switched-based Resilient Control of Cyber-Physical Systems}, author={Segovia, Mariana and Rubio-Hernan, Jose and Cavalli, Ana R and Garcia-Alfaro, Joaquin}, journal={IEEE Access}, year={2020}, month={November}, publisher={IEEE}, doi = {10.1109/ACCESS.2020.3039879}, url = {https://doi.org/10.1109/ACCESS.2020.3039879}, } @inproceedings{segovia2020nca, title={Cyber-Resilience Evaluation of Cyber-Physical Systems}, author={Segovia, Mariana and Rubio-Hernan, Jose and Cavalli, Ana R and Garcia-Alfaro, Joaquin}, booktitle={2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)}, pages={1--8}, year={2020}, organization={IEEE}, doi = {10.1109/NCA51143.2020.9306741}, url = {https://doi.org/10.1109/NCA51143.2020.9306741}, } @techreport{segovia2020ncaTechRep, title={Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report)}, author={Segovia, Mariana and Rubio-Hernan, Jose and Cavalli, Ana and Garcia-Alfaro, Joaquin}, year={2020}, url={https://arxiv.org/abs/2009.06927}, } @book{CSNet2020, title={{2020 4th Cyber Security in Networking Conference, CSNet 2020}}, author={Romain Laborde and Nadjib Aitsaadi and Solange Ghernaouti and Abdelmalek Benzekri and Joaquin Garcia-Alfaro}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSNet50428.2020}, doi = {10.1109/CSNet50428.2020}, isbn = {978-1-6654-0458-7}, } @book{lncs12484, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology}}, author={Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Jordi Herrera-Joancomarti}, year={2020}, publisher={Springer}, series={LNCS 12484}, doi = {10.1007/978-3-030-66172-4}, url = {https://link.springer.com/book/10.1007/978-3-030-66172-4}, } @inproceedings{BarbeauGK20, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis}, title = {Capacity Requirements in Networks of Quantum Repeaters and Terminals}, booktitle = {{IEEE} International Conference on Quantum Computing and Engineering, {QCE} 2020, Denver, CO, USA, October 12-16, 2020}, pages = {148--157}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QCE49297.2020.00028}, doi = {10.1109/QCE49297.2020.00028}, } @inproceedings{barbeau2020geocaching, title={Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={International Conference on Ad-Hoc Networks and Wireless}, pages={55--70}, year={2020}, organization={Springer}, doi = {10.1007/978-3-030-61746-2_5}, url = {https://doi.org/10.1007/978-3-030-61746-2_5}, } @article{gonzalez2020stateful, title={Stateful RORI-based countermeasure selection using hypergraphs}, author={Gonzalez-Granadillo, Gustavo and Doynikova, Elena and Garcia-Alfaro, Joaquin and Kotenko, Igor and Fedorchenko, Andrey}, journal={Journal of Information Security and Applications}, volume={54}, pages={102562}, year={2020}, publisher={Elsevier}, doi = {10.1016/j.jisa.2020.102562}, url = {https://doi.org/10.1016/j.jisa.2020.102562}, } @inproceedings{faraj2020taxonomy, title={Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things}, author={Faraj, Omair and Meg{\'\i}as, David and Ahmad, Abdel-Mehsen and Garcia-Alfaro, Joaquin}, booktitle={Proceedings of the 15th International Conference on Availability, Reliability and Security}, pages={1--10}, year={2020}, publisher={ACM}, doi = {10.1145/3407023.3407048}, url = {https://doi.org/10.1145/3407023.3407048}, } @article{pamies2020real, title={A Real-Time Query Log Protection Method for Web Search Engines}, author={P{\`a}mies-Estrems, David and Castell{\`a}-Roca, Jordi and Garcia-Alfaro, Joaquin}, journal={IEEE Access}, volume={8}, pages={87393--87413}, year={2020}, publisher={IEEE}, doi = {10.1109/ACCESS.2020.2992012}, url = {https://doi.org/10.1109/ACCESS.2020.2992012}, } @book{lncs12056, title={Foundations and Practice of Security}, author={Benzekri, Abdelmalek and Barbeau, Michel and Gong, Guang and Laborde, Romain and Garcia-Alfaro, Joaquin}, year={2020}, publisher={Springer}, series={LNCS 12056}, month={April}, doi = {10.1007/978-3-030-45371-8}, url = {https://doi.org/10.1007/978-3-030-45371-8}, } @inproceedings{perez2020lockdown, title={Lockdown: Balance availability attack against lightning network channels}, author={P{\'e}rez-Sol{\`a}, Cristina and Ranchal-Pedrosa, Alejandro and Herrera-Joancomart{\'\i}, Jordi and Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin}, booktitle={International Conference on Financial Cryptography and Data Security}, pages={245--263}, year={2020}, organization={Springer}, doi = {10.1007/978-3-030-51280-4_14}, url = {https://doi.org/10.1007/978-3-030-51280-4_14}, } @book{lncs11981, title={{Computer Security, ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26--27, 2019, Revised Selected Papers}}, author={Fournaris, Apostolos and Athanatos, Manos and Lampropoulos, Konstantinos and Ioannidis, Sotiris and Hatzivasilis, George and Damiani, Ernesto and Abie, Habtamu and Ranise, Silvio and Verderame, Luca and Siena, Alberto and Garcia-Alfaro, Joaquin}, year={2020}, publisher={Springer}, series={LNCS 11981}, month={February}, doi = {10.1007/978-3-030-42051-2}, url = {https://doi.org/10.1007/978-3-030-42051-2}, } @book{lncs11980, title={{Computer Security, ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26--27, 2019 Revised Selected Papers}}, author={Katsikas, Sokratis and Cuppens, Frederic and Cuppens, Nora and Lambrinoudakis, Costas and Kalloniatis, Christos and Mylopoulos, John and Anton, Annie and Gritzalis, Stefanos and Pallas, Frank and Pohle, Jorg and Sasse, Angela and Meng, Weizhi and Furnell, Steven and Garcia-Alfaro, Joaquin}, year={2020}, publisher={Springer}, series={LNCS 11980}, month={February}, doi = {10.1007/978-3-030-42048-2}, url = {https://doi.org/10.1007/978-3-030-42048-2}, } @Comment 2019 @article{ahmad2019tuning, title={Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications}, author={Ahmad, Abdel-Mehsen and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kassem, Jamil and Kranakis, Evangelos}, journal={Transactions on Emerging Telecommunications Technologies}, volume={30}, number={12}, pages={e3712}, year={2019}, publisher={Wiley Online Library}, doi={10.1002/ett.3712}, url={http://dx.doi.org/10.1002/ett.3712}, } @techreport{barbeau2019qualityArxiv, title={Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations)}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Santos, Fillipe}, year={2019}, url={https://arxiv.org/pdf/1906.09505}, } @inproceedings{barbeau2019fakingArxiv, title={Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks (pre-print)}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin}, year={2019}, url={https://arxiv.org/pdf/1907.03038}, } @inproceedings{barbeau2019quality, title={Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Santos, Fillipe}, booktitle={2019 IEEE Globecom Workshops (GC Wkshps)}, pages={1--6}, year={2019}, organization={IEEE}, doi={10.1109/GCWkshps45667.2019.9024394}, url={https://doi.org/10.1109/GCWkshps45667.2019.9024394}, } @inproceedings{barbeau2019faking, title={Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin}, booktitle={2019 IEEE Globecom Workshops (GC Wkshps)}, pages={1--6}, year={2019}, organization={IEEE}, doi={10.1109/GCWkshps45667.2019.9024550}, url={https://doi.org/10.1109/GCWkshps45667.2019.9024550}, } @incollection{kiennert2020security, title={{Security and Privacy in the TeSLA Architecture}}, author={Kiennert, Christophe and Ivanova, Malinka and Rozeva, Anna and Garcia-Alfaro, Joaquin}, booktitle={Engineering Data-Driven Adaptive Trust-based e-Assessment Systems}, pages={85--108}, year={2020}, publisher={Springer}, ISBN={978-3-030-29325-3}, doi={10.1007/978-3-030-29326-0_5}, url={https://doi.org/10.1007/978-3-030-29326-0_5}, } @techreport{iacr-2019-1149, title={{LockDown: Balance Availability Attack against Lightning Network Channels}}, author={Perez-Sola, Cristina and Ranchal-Pedrosa, Alejandro and Herrera-Joancomarti, Jordi and Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin}, year={2019}, month={October}, url={https://eprint.iacr.org/2019/1149}, } @inproceedings{segovia2019cybericps, title={{Reflective Attenuation of Cyber-Physical Attacks}}, author={Segovia, Mariana and Cavalli, Ana and Cuppens, Nora and Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin}, booktitle={5th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980}, pages={19--34}, year={2020}, month={February}, publisher={Springer}, doi = {10.1007/978-3-030-42048-2_2}, url = {https://doi.org/10.1007/978-3-030-42048-2_2}, } @book{lncs11737, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2019 and DPM 2019)}}, author={P{\'e}rez-Sol{\`a}, Cristina and Navarro-Arribas, Guillermo and Biryukov, Alex and Garcia-Alfaro, Joaquin}, year={2019}, publisher={Springer}, series={LNCS 11737}, month={September}, doi = {10.1007/978-3-030-31500-9}, url = {https://doi.org/10.1007/978-3-030-31500-9}, } @inproceedings{torraChoquetMDAI2019, title={Towards an Adaptive Defuzzification: Using Numerical Choquet Integral}, author={Torra, Vicen{\c{c}} and Garcia-Alfaro, Joaquin}, booktitle={International Conference on Modeling Decisions for Artificial Intelligence}, pages={113--125}, year={2019}, organization={Springer}, doi={10.1007/978-3-030-26773-5_11}, url={https://doi.org/10.1007/978-3-030-26773-5_11}, } @inproceedings{HerreraAsiaCCS2019, author = {Herrera-Joancomart\'{\i}, Jordi and Navarro-Arribas, Guillermo and Ranchal-Pedrosa, Alejandro and P\'{e}rez-Sol\`{a}, Cristina and Garcia-Alfaro, Joaquin}, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, year = {2019}, isbn = {9781450367523}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3321705.3329812}, doi = {10.1145/3321705.3329812}, booktitle = {2019 ACM Asia Conference on Computer and Communications Security}, pages = {602--612}, numpages = {11}, location = {Auckland, New Zealand}, series = {Asia CCS'19}, } @techreport{barbeau2019next, title={Next Generation Resilient Cyber-Physical Systems}, author={Barbeau, Michel and Carle, Georg and Garcia-Alfaro, Joaquin and Torra, Vicen{\c{c}}}, url={https://arxiv.org/abs/1907.08849}, year={2019} } @ARTICLE{KiennertAccess2019, author={C. {Kiennert} and N. {De Vos} and M. {Knockaert} and J. {Garcia-Alfaro}}, journal={{IEEE Access}}, title={{The Influence of Conception Paradigms on Data Protection in E-Learning Platforms: A Case Study}}, year={2019}, volume={7}, number={1}, pages={64110--64119}, doi={10.1109/ACCESS.2019.2915275}, ISSN={2169-3536}, } @inproceedings{BarbeauInfocom2019, author={M. {Barbeau} and J. {Garcia-Alfaro} and E. {Kranakis}}, booktitle={IEEE Conference on Computer Communications (IEEE INFOCOM 2019) Workshops}, title={{Geocaching-inspired Resilient Path Planning for Drone Swarms}}, month={April}, year={2019}, volume={}, number={}, pages={620-625}, doi={10.1109/INFCOMW.2019.8845318}, url={https://doi.org/10.1109/INFCOMW.2019.8845318}, ISSN={null}, } @techreport{iacr-2019-328, title={On the Difficulty of Hiding the Balance of Lightning Network Channels}, author={Herrera-Joancomarti, Jordi and Navarro-Arribas, Guillermo and Ranchal-Pedrosa, Alejandro and Perez-Sola, Cristina and Garcia-Alfaro, Joaquin}, year={2019}, month={January}, url={https://eprint.iacr.org/2019/328}, } @Comment 2018 @book{bsc2018, title={{29th Biennial Symposium on Communications (BSC'2018)}}, author={Miri, Ali and Dong, X. and Ardakani, M. and Garcia-Alfaro, Joaquin}, year={2018}, publisher={IEEE}, month={July}, doi = {}, url = {https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8481276}, } @inproceedings{segovia2018fps, title={A Study on Mitigation Techniques for SCADA-driven Cyber-Physical Systems}, author={Segovia, Mariana and Cavalli, Anna R. and Cuppens, Nora and Garcia-Alfaro, Joaquin}, booktitle={Foundations and Practice of Security (FPS 2018)}, pages={257--264}, year={2019}, month={April}, publisher={Springer}, doi = {10.1007/978-3-030-18419-3_17}, url = {https://doi.org/10.1007/978-3-030-18419-3_17}, } @book{lncs11358, title={{11th International Symposium, FPS 2018, Montreal, Canada, November 13-15, 2018, Revised Papers}}, author={Zincir-Heywood, Nur and Bonfante, Guillaume and Debbabi, Mourad and Garcia-Alfaro, Joaquin}, year={2019}, publisher={Springer}, series={LNCS 11358}, doi = {}, url = {}, } @techreport{segoviaCNIoct2018, title={{Techniques de reflexion pour attenuer les attaques cyber-physiques contre les systemes SCADA}}, author={Segovia, Mariana and Cavalli, Anna R. and Cuppens, Nora and Garcia-Alfaro, Joaquin}, year={2018}, month={October}, url={https://www.chairecyber-cni.org/actualites/tattenuer-les-attaques-cyber-physiques-contre-les-systemes-scada/}, } @article{compeleceng2018, author = {Garcia-Alfaro, Joaquin and Martinez-Perez, Gregorio}, journal = {Computers \& Electrical Engineering}, title = {{Introduction to the special section on critical systems modelling and security (third edition)}}, year = {2018}, volume = {71}, pages = {1040-1042}, doi = {10.1016/j.compeleceng.2018.10.008}, month = {Oct} } @book{lncs11552, title={{Security and Safety Interplay of Intelligent Software Systems, ESORICS 2018 workshops, Barcelona, Spain, September 3-7, 2018, Revised Papers}}, author={Hamid, Brahim and Gallina, Barbara and Shabtai, Asaf and Elovici, Yuval and Garcia-Alfaro, Joaquin}, year={2019}, publisher={Springer}, series={LNCS 11552}, doi = {10.1007/978-3-030-16874-2}, url = {https://www.springer.com/fr/book/9783030168735}, } @book{lncs11025, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2018 and DPM 2018)}}, author={Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi and Livraga, Giovanni and Rios, Ruben}, year={2018}, publisher={Springer}, series={LNCS 11025}, month={September}, doi = {10.1007/978-3-030-00305-0}, url = {https://www.springer.com/de/book/9783030003043}, } @inproceedings{pamies2018dpm, title={{Lifelogging Protection Scheme for Internet-based Personal Assistants}}, author={Pamies-Estrems, David and Kaaniche, Nesrine and Laurent, Maryline and Castella-Roca, Jordi and Garcia-Alfaro, Joaquin}, booktitle={Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2018 and DPM 2018)}, pages={1--10}, year={2018}, month={September}, publisher={Springer}, doi = {10.1007/978-3-030-00305-0_31}, url = {https://doi.org/10.1007/978-3-030-00305-0_31}, } @inproceedings{kassemgnuradio2018a, author = {Kassem, Jamil and Barbeau, Michel and Ahmad, Abdel-Mehsen and Garcia-Alfaro, Joaquin}, title = {{The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications}}, booktitle = {GRCON 2018: 8th Annual GNU Radio Conference}, editor = {GRCON}, year = {2018}, volume = {3}, pages = {1-8}, url = {https://pubs.gnuradio.org/index.php/grcon/article/view/50} } @inproceedings{kassemgnuradio2018b, author = {Kassem, Jamil and Barbeau, Michel and Ahmad, Abdel-Mehsen and Garcia-Alfaro, Joaquin}, title = {{GNU radio blocks for long-lasting frames in mobile underwater acoustic communications}}, booktitle = {French GNU Radio days 2018}, year = {2018}, pages = {1-2}, url = {https://gnuradio-fr-18.sciencesconf.org/211038}, } @inproceedings{ADHOCNOW2018, author = {Ahmad, Abdel-Mehsen and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Porretta, Steven and Kassem, Jamil}, title = {{Low frequency mobile communications in underwater networks}}, booktitle = {ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless }, editor = {Springer-Nature}, year = {2018}, volume = {Lecture Notes in Computer Science book series (LNCS, volume 11104)}, pages = {239--251}, url = {https://doi.org/10.1007/978-3-030-00247-3_22}, doi = {10.1007/978-3-030-00247-3_22}, } @inproceedings{Gonzalezares2018, author = {Gonzalez-Granadillo, Gustavo and Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin}, title = {{A pyramidal-based model to compute the impact of cyber security events}}, booktitle = {13th International Conference on Availability, Reliability and Security (ARES 2018)}, address = {New York}, editor = {ACM}, year = {2018}, pages = {1--10}, doi = {10.1145/3230833.3230847}, url = {https://doi.org/10.1145/3230833.3230847}, } @article{itlTeSLA, author = {Baro-Sole, Xavi and Guerrero-Roldan, Anna and Prieto-Vazquez, Josep and Rozeva, Anna and Marinov, Orlin and Kiennert, Christophe and Rocher, Pierre-Olivier and Garcia-Alfaro, Joaquin}, journal = {Internet technology letters}, title = {{Integration of an adaptive trust-based e-assessment system into virtual learning environments --- the TeSLA project experience}}, year = {2018}, volume = {1}, number = {4}, pages = {e56-1-e56-6}, doi = {10.1002/itl2.56}, month = {July}, note = {Open access}, url = {http://dx.doi.org/10.1002/itl2.56}, } @techreport{rubioCNIoct2018, title={{Resilience programmable pour des systemes cyber-physiques}}, author={Rubio-Hernan, Jose Garcia-Alfaro, Joaquin}, year={2018}, month={June}, url={https://www.chairecyber-cni.org/actualites/resilience-programmable-pour-des-systemes-cyber-physiques/}, } @article{Gonzalez2018FGCS, title={{Dynamic Risk Management Response System to handle cyber threats}}, author={Gonzalez-Granadillo, Gustavo and Dubus, Samuel and Motzek, Alexander and Garcia-Alfaro, Joaquin and Alvarez, Ender and Merialso, Matteo and Papillon, Serge and Debar, Herv{\'{e}}}, journal={Future Generation Computer Systems}, volume={83}, issue={1}, pages={535--552}, year={2018}, month={June}, publisher={Elsevier}, doi = {10.1016/j.future.2017.05.043}, url = {http://dx.doi.org/10.1016/j.future.2017.05.043}, } @article{itlcpsdn, author = {Rubio-Hernan, Jose and Sahay, Rishikesh and De Cicco, Luca and Garcia-Alfaro, Joaquin}, journal = {Internet technology letters}, title = {{Cyber-physical architecture assisted by programmable networking}}, year = {2018}, volume = {1}, number = {4}, pages = {e44-1-e44-7}, doi = {10.1002/itl2.44}, url = {http://dx.doi.org/10.1002/itl2.44}, month = {July} } @article{Gonzalez2018ITL, title={{Hypergraph-driven Mitigation of Cyber-Attacks}}, author={Gonzalez-Granadillo, Gustavo and Doynikova, Elena and Kotenko, Igor and Garcia-Alfaro, Joaquin}, journal={Internet Technology Letters}, volume={1}, issue={3}, pages={e38-1-e38-6}, year={2018}, month={May}, publisher={Wiley}, doi = {10.1002/itl2.38}, url = {http://dx.doi.org/10.1002/itl2.38}, } @article{mona2018, author = {Ahmad, Abdel-Mehsen and Kassem, Jamil and Barbeau, Michel and Porretta, Steven and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, journal = {Mobile Networks \& Applications}, title = {{Doppler effect in the acoustic ultra low frequency band for wireless underwater networks}}, year = {2018}, volume = {23}, number = {5}, pages = {1282-1292}, doi = {10.1007/s11036-018-1036-9}, month = {Oct} } @book{lncs10694, title={{12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers}}, author={Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Lanet, Jean-Louis and Legay, Axel and Garcia-Alfaro, Joaquin}, year={2018}, publisher={Springer}, doi = {10.1007/978-3-319-76687-4}, url = {https://doi.org/10.1007/978-3-319-76687-4}, } @techreport{rubioCNIfeb2018, title={{These sur la securite des systemes cyber-physiques industriels}}, author={Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro Joaquin}, year={2018}, month={February}, url={https://www.chairecyber-cni.org/actualites/these-securite-systemes-cyber-physiques-industriels/}, } @book{fps2017, title={{10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}}, author={Imine, Abdessamad and Fernandez, Jose-M. and Marion, Jean-Yves and Logrippo, Luigi and Garcia-Alfaro, Joaquin}, year={2018}, publisher={Springer}, doi = {10.1007/978-3-319-75650-9}, url = {http://dx.doi.org/10.1007/978-3-319-75650-9}, } @Comment 2017 @article{ETTTrubio, author = {Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro, Joaquin}, journal = {Transactions on emerging telecommunications technologies}, title = {{Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems}}, year = {2018}, volume = {9}, number = {7}, pages = {e3209-1-e3209-17}, doi = {10.1002/ett.3209}, month = {July} } @inproceedings{porretta2017wuwnet, title={Learning to Communicate Underwater (An exploration of Limited Mobility Agents in Underwater Acoustic Sensor Networks)}, author={Porretta, Steven and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={12th ACM International Conference on Underwater Networks \& Systems, WUWNet'17, Nov 6-8, 2017, Halifax}, pages={1--5}, year={2017}, month={November}, publisher={ACM}, doi = {10.1145/3148675.3148709}, url = {https://doi.org/10.1145/3148675.3148709}, } @inproceedings{gonzalez2017fps, title={{Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric}}, author={Gonzalez-Granadillo, Gustavo and Doynikova, Elena and Kotenko, Igor and Garcia-Alfaro, Joaquin}, booktitle={Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723}, pages={293--302}, year={2017}, month={October}, publisher={Springer}, doi = {10.1007/978-3-319-75650-9_19}, url = {https://doi.org/10.1007/978-3-319-75650-9_19}, } @inproceedings{kiennert2017nordsec, title={{Anonymous Certification for an e-Assessment Framework}}, author={Kiennert, Christophe and Kaaniche, Nesrine and Laurent, Maryline and Rocher, Pierre-Olivier and Garcia-Alfaro, Joaquin}, booktitle={22nd Nordic Conference on Secure IT Systems (NordSec 2017) Tartu, Estonia}, pages={70--85}, year={2017}, month={November}, publisher={Springer}, doi = {10.1007/978-3-319-70290-2_5}, url = {https://doi.org/10.1007/978-3-319-70290-2_5}, } @book{dpm2017, title={{Data Privacy Management, Cryptocurrencies and Blockchain Technology. ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings}}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Hartenstein, Hannes and Herrera-Joancomarti, Jordi}, year={2018}, publisher={Springer}, doi = {10.1007/978-3-319-67816-0}, url = {http://dx.doi.org/10.1007/978-3-319-67816-0}, } @inproceedings{kaaniche2017dpm, title={{PCS, a privacy-preserving certification scheme}}, author={Kaaniche, Nesrine and Laurent, Maryline and Rocher, Pierre-Olivier and Kiennert, Christophe and Garcia-Alfaro, Joaquin}, booktitle={12th International Workshop on Data Privacy Management (DPM 2017), 22nd ESORICS symposium, Oslo, Norway}, pages={239--256}, year={2017}, month={September}, publisher={Springer}, doi = {10.1007/978-3-319-67816-0_14}, url = {https://doi.org/10.1007/978-3-319-67816-0_14}, } @inproceedings{gonzalez2017crisis, title={{Towards a Security Event Data Taxonomy}}, author={Gonzalez-Granadillo, Gustavo and Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin}, booktitle={12th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2017), Dinard, France}, pages={29--45}, year={2017}, month={September}, publisher={Springer}, doi = {10.1007/978-3-319-76687-4_3}, url = {https://doi.org/10.1007/978-3-319-76687-4_3}, } @inproceedings{kassem2017adhocnets, title={{Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band}}, author={Ahmad, Abdel and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kassem, Jamil and Kranakis, Evangelos and Porretta, Steven}, booktitle={9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada}, pages={3--12}, year={2017}, month={September}, publisher={Springer}, doi = {10.1007/978-3-319-74439-1_1}, url = {https://doi.org/10.1007/978-3-319-74439-1_1}, } @inproceedings{kranakis2017adhocnets, title={{The Sound of Communication in Underwater Acoustic Sensor Networks}}, author={Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Porretta, Steven}, booktitle={9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada}, pages={13--23}, year={2017}, month={September}, publisher={Springer}, doi = {10.1007/978-3-319-74439-1_2}, url = {https://doi.org/10.1007/978-3-319-74439-1_2}, } @article{Gonzalez17IEEEACCESS, title={{Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances}}, author={Gonzalez-Granadillo, Gustavo and Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin}, journal={IEEE Access}, volume={6}, number={}, pages={8810--8828}, year={2017}, publisher={IEEE}, doi = {10.1109/ACCESS.2017.2740402}, url = {https://doi.org/10.1109/ACCESS.2017.2740402}, } @article{Rubio17ETT, title={{Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems}}, author={Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro, Joaquin}, journal={Transactions on Emerging Telecommunications Technologies}, volume={32}, number={9}, pages={1--17}, year={2018}, publisher={Wiley}, doi = {10.1002/ett.3209}, url = {http://dx.doi.org/10.1002/ett.3209}, } @article{shi2017sensors, title={{Secure Localization in the Presence of Colluders in WSNs}}, author={Shi, Wei and Barbeau, Michel and Corriveau, Jean-Pierre and Garcia-Alfaro, Joaquin and Yao, Meng}, journal={Sensors}, volume={17}, number={8}, pages={1--15}, year={2017}, publisher={MDPI}, doi = {10.3390/s17081892}, url = {http://dx.doi.org/10.3390/s17081892}, } @article{Motzek2017EurasipPareto, title={{Selection of Pareto-efficient Response Plans based on Financial and Operational Assessments}}, author={Motzek, Alexander and Gonzalez-Granadillo, Gustavo and Debar, Herv{\'{e}} and Garcia-Alfaro, Joaquin and M\"{o}ller, Ralf}, journal={EURASIP Journal on Information Security}, volume={2017}, issue={12}, pages={1--22}, year={2017}, month={July}, publisher={Springer}, doi = {10.1186/s13635-017-0063-6}, url = {https://dx.doi.org/10.1186/s13635-017-0063-6}, } @article{rubio2017EurasipWatermak, title={{On the use of Watermark-based Schemes to Detect Cyber-Physical Attacks}}, author={Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro, Joaquin}, journal={EURASIP Journal on Information Security}, volume={2017}, issue={8}, pages={1--25}, year={2017}, month={June}, publisher={Springer}, doi = {10.1186/s13635-017-0060-9}, url = {http://dx.doi.org/10.1186/s13635-017-0060-9}, } @inproceedings{kiennert2017IVUK, title={Security Challenges in e-Assessment and Technical Solutions}, author={Kiennert, Christophe and Rocher, Pierre-Olivier and Ivanova, Malinka Rozeva, Anna and Durcheva, Mariana and Garcia-Alfaro, Joaquin}, booktitle={21st Nordic Conference on Secure IT Systems (NordSec 2016)}, pages={366--371}, year={2017}, month={July}, publisher={IEEE}, doi = {10.1109/iV.2017.70}, url = {https://doi.org/10.1109/iV.2017.70}, } @proceedings{garcia2017CEESI, title={Special section on critical systems modelling and security}, editor={Garcia-Alfaro, Joaquin and Martinez-Perez, Gregorio}, series={Computers and Electrical Engineering}, volume={47}, pages={73--200}, year={April, 2017}, publisher={Elsevier} } @article{garcia2017introductionCEESI, title={{Introduction to the special section on critical systems modelling and security}}, author={Garcia-Alfaro, Joaquin and Martinez-Perez, Gregorio}, journal={Computers and Electrical Engineering}, volume={59}, pages={73--75}, year={2017}, month={April}, publisher={Elsevier}, doi = {10.1016/j.compeleceng.2017.05.027}, url = {http://dx.doi.org/10.1016/j.compeleceng.2017.05.027}, } @article{gonzalez2017polytope, title={{A polytope-based approach to measure the impact of events against critical infrastructures}}, author={Gonzalez-Granadillo, Gustavo and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, journal={Journal of Computer and System Sciences}, volume={83}, number={1}, pages={3--21}, year={2017}, publisher={Elsevier}, doi = {10.1016/j.jcss.2016.02.004}, url = {http://dx.doi.org/10.1016/j.jcss.2016.02.004}, } @book{fps2016, title={{Foundations and Practice of Security; 9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}}, author={Cuppens, Fr{\'e}d{\'e}ric and Lingyu, Wang and Cuppens-Boulahia, Nora and Tawbi, Nadia and Garcia-Alfaro, Joaquin}, year={2016}, publisher={Springer}, doi = {10.1007/978-3-319-51966-1}, url = {http://dx.doi.org/10.1007/978-3-319-51966-1}, } @Comment 2016 @article{toumi2016reputation, title={{Reputation trust mechanism under the organizational-based access control model}}, author={Toumi, Khalifa and Sfar, Hela and Garcia-Alfaro, Joaquin}, journal={Security and Communication Networks}, volume={9}, number={18}, pages={5295--5310}, year={2016}, publisher={Wiley}, doi = {10.1002/sec.1698}, url = {http://dx.doi.org/10.1002/sec.1698}, } @misc{Ahvar2016EP3096227, title={{Resource allocation method in distributed clouds}}, author={Ahvar, Ehsan and Ahvar, Shohreh and Crespi, No\"el and Garcia-Alfaro, Joaquin}, url={https://www.google.com/patents/EP3096227A1}, month={November}, year={2016}, publisher={Google Patents}, } @inproceedings{rubio2016event, title={Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks}, author={Rubio-Hernan, Jose and De Cicco, Luca and Garcia-Alfaro, Joaquin}, booktitle={21st Nordic Conference on Secure IT Systems (NordSec 2016)}, pages={3--19}, year={2016}, month={November}, publisher={Springer}, doi = {10.1007/978-3-319-47560-8_1}, url = {http://dx.doi.org/10.1007/978-3-319-47560-8_1}, } @inproceedings{gonzalez2016towards, title={{Towards an Automated and Dynamic Risk Management Response System}}, author={Gonzalez-Granadillo, Gustavo and Alvarez, Ender and Motzek, Alexander and Merialdo, Matteo and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={21st Nordic Conference on Secure IT Systems (NordSec 2016)}, pages={37--53}, year={2016}, month={November}, publisher={Springer}, doi = {10.1007/978-3-319-47560-8_3}, url = {http://dx.doi.org/10.1007/978-3-319-47560-8_3}, } @book{atc2016, title={13th Annual International Conference on Advanced and Trusted Computing (ATC'2016)}, author={D. El Baz and J. Bougeois and B. Defude and Z. Zhou and G. Han and J. Garcia-Alfaro}, year={2016}, publisher={IEEE}, month={July}, doi = {10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0191}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7814735}, } @inproceedings{garcia2016CyberICPS, title={{Security of Cyber-Physical Systems. From Theory to Testbeds and Validation}}, author={Rubio-Hernan, Jose and Rodolfo-Mejias, Juan and Garcia-Alfaro Joaquin}, booktitle={2nd Workshop on the Security of Industrial Control Systems \& Cyber-Physical Systems (CyberICPS 2016)}, pages={3--18}, month={September}, year={2016}, publisher={Springer}, doi={10.1007/978-3-319-61437-3_1}, url={https://doi.org/10.1007/978-3-319-61437-3_1}, } @inproceedings{gonzalezn, title={An n-sided polygonal model to calculate the impact of cyber security events}, author={Gonzalez-Granadillo, Gustavo and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016}, doi={10.1007/978-3-319-54876-0_7}, pages={87--102}, publisher={Springer}, year={2016}, month={September}, doi = {10.1007/978-3-319-54876-0_7}, url = {http://dx.doi.org/10.1007/978-3-319-54876-0_7}, } @book{raid2016, title={Research in Attacks, Intrusions, and Defenses (19th International Symposium, RAID 2016)}, author={Monrose, Fabien and Dacier, Marc and Blanc, Gregory and Garcia-Alfaro, Joaquin}, series={Lecture Notes in Computer Science}, volume={9854}, year={2016}, month={September}, doi = {10.1007/978-3-319-45719-2}, url = {http://dx.doi.org/10.1007/978-3-319-45719-2}, } @inproceedings{gonzalez2016considering, title={Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms}, author={Gonz{\'a}lez-Granadillo, Gustavo and Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={Trustcom/BigDataSE/ISPA, 2016 IEEE}, pages={340--348}, year={2016}, publisher={IEEE}, month={August}, doi = {10.1109/TrustCom.2016.0082}, url = {https://doi.org/10.1109/TrustCom.2016.0082}, } @inproceedings{granadillo2016selection, title={Selection of mitigation actions based on financial and operational impact assessments}, author={Granadillo, Gustavo Gonzalez and Motzek, Alexander and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={Availability, Reliability and Security (ARES), 2016 11th International Conference on}, pages={137--146}, year={2016}, month={August}, publisher={IEEE}, doi = {10.1109/ARES.2016.3}, url = {http://dx.doi.org/10.1109/ARES.2016.3}, } @inproceedings{rubio2016revisiting, title={Revisiting a watermark-based detection scheme to handle cyber-physical attacks}, author={Rubio-Hern{\'a}n, Jos{\'e} and De Cicco, Luca and Garcia-Alfaro, Joaquin}, booktitle={Availability, Reliability and Security (ARES), 2016 11th International Conference on}, pages={21--28}, year={2016}, publisher={IEEE}, month={August}, doi = {10.1109/ARES.2016.2}, url = {http://dx.doi.org/10.1109/ARES.2016.2}, } @inproceedings{ahvar2016cacev, title={{CACEV: a Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds}}, author={Ahvar, Ehsan and Ahvar, Shohreh and Mann, Zolt{\'a}n Ad{\'a}m and Crespi, Noel and Garcia-Alfaro, Joaquin and Glitho, Roch}, booktitle={Services Computing (SCC), 2016 IEEE International Conference on}, pages={275--282}, year={2016}, month={July}, publisher={IEEE}, doi = {10.1109/SCC.2016.43}, url = {http://dx.doi.org/10.1109/SCC.2016.43}, } @article{barbeau2016channel, title={Channel Selection Using Multiple Radio Channels}, author={Barbeau, Michel and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, journal={Journal of Network and Computer Applications}, volume={64}, pages={113--123}, year={2016}, month={April}, publisher={Elsevier}, doi = {10.1016/j.jnca.2016.01.021}, url = {http://dx.doi.org/10.1016/j.jnca.2016.01.021}, } @book{fps2015, title={{Foundations and Practice of Security; 8th International Symposium, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected}}, author={Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Bonfante, Guillaume}, series={Lecture Notes in Computer Science}, volume={9482}, year={2016}, month={March}, publisher={Springer}, doi = {10.1007/978-3-319-30303-1}, url = {http://dx.doi.org/10.1007/978-3-319-30303-1}, } @book{dpm2015, title={Data Privacy Management, and Security Assurance; 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21--22, 2015. Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Aldini, Alessandro and Martinelli, Fabio and Suri, Neeraj}, year={2016}, month={}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-319-29883-2}, doi = {10.1007/978-3-319-29883-2}, } @Comment 2015 @article{gonzalez2015selecting, title={{Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index}}, author={Gonzalez-Granadillo, G and Garcia-Alfaro, Joaqu{\'\i}n and Alvarez, E and El-Barbori, Mohammed and Debar, Herv{\'e}}, journal={Computers \& Electrical Engineering}, volume={47}, pages={13--34}, year={2015}, month={}, publisher={Elsevier}, doi = {10.1016/j.compeleceng.2015.07.023}, url = {http://dx.doi.org/10.1016/j.compeleceng.2015.07.023}, } @inproceedings{granadillo2015using, title={{Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks}}, author={Granadillo, Gustavo Daniel Gonzalez and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015)}, volume={164}, pages={538--555}, year={2015}, month={}, publisher={Springer}, doi = {10.1007/978-3-319-28865-9_29}, url = {http://dx.doi.org/10.1007/978-3-319-28865-9_29}, } @proceedings{garcia2015CEESI, title={Special section on critical systems modelling and security}, editor={Garcia-Alfaro, Joaquin and Longo, Francesco and Martinez-Perez, Gregorio}, series={Computers and Electrical Engineering}, volume={47}, pages={255--344}, year={October, 2015}, publisher={Elsevier} } @article{garcia2015introductionCEESI, title={{Introduction to the special section on critical systems modelling and security}}, author={Garcia-Alfaro, Joaquin and Longo, Francesco and Martinez-Perez, Gregorio}, journal={Computers and Electrical Engineering}, volume={47}, pages={255--257}, year={2015}, month={October}, publisher={Elsevier}, doi = {10.1016/j.compeleceng.2015.11.016}, url = {http://dx.doi.org/10.1016/j.compeleceng.2015.11.016}, } @inproceedings{ahvar2015nacer, title={{NACER: a Network-Aware Cost-Efficient Resource allocation method for processing-intensive tasks in distributed clouds}}, author={Ahvar, Ehsan and Ahvar, Shohreh and Crespi, Noel and Garcia-Alfaro, Joaquin and Mann, Zolt{\'a}n Ad{\'a}m}, booktitle={Network Computing and Applications (NCA), 2015 IEEE 14th International Symposium on}, pages={90--97}, year={2015}, month={}, publisher={IEEE}, doi = {10.1109/NCA.2015.37}, url = {http://dx.doi.org/10.1109/NCA.2015.37}, } @Comment A. Ghorbani, V. Torra, H. Hisil, A. Miri, A. Koltuksuz, J. Zhang, M. Sensoy, J. Garcia-Alfaro, I. Zincir @book{pst2015, title={{13th annual conference on Privacy, Security and Trust}}, author={Miri, Ali and Hengartner, Urs and Nen-Fu, Huang and Josang, Audun and Garcia-Alfaro, Joaquin}, year={2014}, publisher={IEEE}, month={July}, doi = {10.1109/PST.2015.7232973}, url = {https://doi.org/10.1109/PST.2015.7232971}, } @inproceedings{belhaouane2015isofunctionality, title={{On the isofunctionality of network access control lists}}, author={Belhaouane, Malek and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={Availability, Reliability and Security (ARES), 2015 10th International Conference on}, pages={168--173}, year={2015}, publisher={IEEE}, month={ }, doi = {10.1109/ARES.2015.78}, url = {http://dx.doi.org/10.1109/ARES.2015.78}, } @inproceedings{belhaouane2015evaluating, title={{Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics}}, author={Belhaouane, Malek and Garcia-Alfaro, Joaquin and Debar, Herv{\'e}}, booktitle={e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on}, volume={4}, pages={53--64}, year={2015}, publisher={IEEE}, month={ }, doi = {10.5220/0005544100530064}, url = {http://dx.doi.org/10.5220/0005544100530064}, } @techreport{barbeau2015quantum, title={Quantum computing assisted medium access control for multiple client station networks}, author={Barbeau, Michel and Cloutier, Steve R and Garcia-Alfaro, Joaquin}, year={2015}, url = {http://arxiv.org/abs/1507.00270}, } @inproceedings{granadillo2015considering, title={{Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)}}, author={Granadillo, Gustavo Gonzalez and Garcia-Alfaro, Joaquin and Debar, Herv{\'e} and Ponchel, Christophe and Martin, Laura Rodriguez}, booktitle={New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on}, pages={1--6}, year={2015}, publisher={IEEE}, doi = {10.1109/NTMS.2015.7266480}, url = {http://dx.doi.org/10.1109/NTMS.2015.7266480}, } @inproceedings{kheir2015automated, title={{Automated classification of C \& C connections through malware URL clustering}}, author={Kheir, Nizar and Blanc, Gregory and Debar, Herv{\'e} and Garcia-Alfaro, Joaquin and Yang, Dingqi}, booktitle={IFIP International Information Security Conference}, pages={252--266}, year={2015}, publisher={Springer}, month={ }, doi = {10.1007/978-3-319-18467-8_17}, url = {http://dx.doi.org/10.1007/978-3-319-18467-8_17}, } @inproceedings{martinez2015model, title={{Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems}}, author={Mart{\'\i}nez, Salvador and Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Cabot, Jordi}, booktitle={IFIP International Information Security Conference}, pages={218--233}, year={2015}, month={}, publisher={Springer}, doi = {10.1007/978-3-319-18467-8_15}, url = {http://dx.doi.org/10.1007/978-3-319-18467-8_15}, } @inproceedings{barbeau2015location, title={{Location-free Link State Routing for Underwater Acoustic Sensor Networks}}, author={Barbeau, Michel and Blouin, Stephane and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={28th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages={1544--1549}, year={2015}, month={ }, publisher={IEEE}, doi = {10.1109/CCECE.2015.7129510}, url = {http://dx.doi.org/10.1109/CCECE.2015.7129510}, } @inproceedings{barbeau2015simulation, title={Simulation of underwater communications with a colored noise approximation and mobility}, author={Barbeau, Michel and Blouin, Stephane and Cervera, Gimer and Garcia-Alfaro, Joaquin and Hasannezhad, Bita and Kranakis, Evangelos}, booktitle={28th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages={1532--1537}, year={2015}, month={ }, publisher={IEEE}, doi = {10.1109/CCECE.2015.7129508}, url = {http://dx.doi.org/10.1109/CCECE.2015.7129508}, } @book{fps2014, title={{Foundations and Practice of Security; 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}}, author={Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin and Heywood, Nur Zincir and Fong, Philip}, year={2015}, month={ }, publisher={Springer}, doi = {10.1007/978-3-319-17040-4}, url = {http://www.springer.com/fr/book/9783319170398}, } @book{dpm2014, title={Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance; 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi and Lupu, Emil and Posegga, Joachim and Aldini, Alessandro and Martinelli, Fabio and Suri, Neeraj}, year={2015}, month={ }, publisher={Springer}, url={http://link.springer.com/book/10.1007%2F978-3-642-28879-1}, doi = {10.1007/978-3-642-28879-1}, } @article{garcia2015remarks, title={Remarks on Peinado et al.'s Analysis of J3Gen}, author={Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi and Meli{\`a}-Segu{\'\i}, Joan}, journal={Sensors}, volume={15}, number={3}, pages={6217--6220}, year={2015}, month={ }, publisher={Multidisciplinary Digital Publishing Institute}, doi = {10.3390/s150306217}, url = {http://www.mdpi.com/1424-8220/15/3/6217}, } @incollection{garcia2015security, title={{Security and Privacy Concerns about the RFID layer of EPC Gen2 Networks}}, author={Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi and Meli{\`a}-Segu{\'\i}, Joan}, booktitle={Advanced research in data privacy}, pages={303--324}, year={2015}, month={ }, publisher={Springer}, doi = { }, url = { }, } @Comment 2014 @inproceedings{rubio2014adaptation, title={{On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems}}, author={Rubio-Hernan, Jose and Garcia-Alfaro, Joaquin}, booktitle={1st Symposium on Digital Trust in Auvergne}, year={2014}, publisher={ }, month={ }, doi={ }, url={ }, } @inproceedings{barbeau2014bidirectional, title={The bidirectional algorithm for channel selection using a two-radio model}, author={Barbeau, Michel and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Vehicular Technology Conference (VTC Fall), 2014 IEEE 80th}, pages={1--5}, year={2014}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @inproceedings{pukkawanna2014classification, title={{Classification of SSL servers based on their SSL handshake for automated security assessment}}, author={Pukkawanna, Sirikarn and Blanc, Gregory and Garcia-Alfaro, Joaquin and Kadobayashi, Youki and Debar, Herv{\'e}}, booktitle={Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014)}, pages={30--39}, year={2014}, month={ }, publisher={IEEE}, doi = {10.1109/BADGERS.2014.10}, url = {http://dx.doi.org/10.1109/BADGERS.2014.10}, } @inproceedings{garcia2014simulaciones, title={Simulaciones software para el estudio de amenazas contra sistemas SCADA}, author={Garcia Alfaro, Joaquin and Romero Tris, Cristina and Rubio Hernan, Jose}, booktitle={XIII Reunion Espanola sobre Criptologia y Seguridad de la Informacion (RECSI 2014)}, year={2014}, publisher={Universidad de Alicante}, month={ }, doi={ }, url={ }, } @book{pst2014, title={2014 Twelfth annual conference on privacy, security and trust}, author={Miri, Ali and Hengartner, Urs and Nen-Fu, Huang and Josang, Audun and Garcia-Alfaro, Joaquin}, year={2014}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @inproceedings{barbeau2014revisiting, title={Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks}, author={Barbeau, Michel and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={International Conference on Ad-Hoc Networks and Wireless}, pages={197--208}, year={2014}, publisher={Springer}, month={ }, doi={ }, url={ }, } @inproceedings{tounsi2014probabilistic, title={{Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm}}, author={Tounsi, Wiem and Justus, Benjamin and Boulahia, Nora Cuppens and Cuppen, Fr{\'e}d{\'e}ric and Alfaro, Joaquin Garcia}, booktitle={Software Security and Reliability-Companion (SERE-C), 2014 IEEE Eighth International Conference on}, pages={113--120}, year={2014}, publisher={IEEE}, doi = {10.1109/SERE-C.2014.29}, url = {https://doi.org/10.1109/SERE-C.2014.29}, month={ }, } @inproceedings{barbeau2014new, title={A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model}, author={Barbeau, Michel and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Communications (ICC), 2014 IEEE International Conference on}, pages={1590--1595}, year={2014}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @book{dpm2013, title={Data Privacy Management and Autonomous Spontaneous Security; DPM 2013: 8th International Workshop, SETOP 2013: 6th International Workshop, Ehgam, UK, September 12-13, 2013-Revised Selected Papers}, author={Alfaro, Joaquin Garcia and Lioudakis, Georgios V and Cuppens-Boulahia, Nora and Foley, Simon N and Fitzgerald, William M}, year={2014}, publisher={Springer}, month={ }, url={http://link.springer.com/book/10.1007%2F978-3-642-54568-9}, doi = {10.1007/978-3-642-54568-9}, } @book{fps2013, title={Foundations and Practice of Security; 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, author={Danger, Jean-Luc and Debbabi, Mourad and Marion, Jean-Yves and Garcia-Alfaro, Joaquin and Zincir-Heywood, Nur}, year={2014}, publisher={Springer}, month={ }, doi = {10.1007/978-3-319-05302-8}, url = {http://link.springer.com/book/10.1007%2F978-3-319-05302-8}, } @incollection{AIDP2014, title={2014 International Workshop on Advanced Intrusion Detection and Prevention}, author={Garcia-Alfaro, Joaquin and G{\"u}r, G{\"u}rkan}, booktitle={Electronic Proceedings in Theoretical Computer Science}, volume={165}, month={June}, year={2014}, doi = {10.4204/EPTCS.165}, url = {http://dx.doi.org/10.4204/EPTCS.165}, } @article{tounsi2014kedgen2, title={KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems}, author={Tounsi, Wiem and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin and Chevalier, Yannick and Cuppens, Fr{\'e}d{\'e}ric}, journal={Journal of Network and Computer Applications}, volume={39}, pages={152--166}, year={2014}, publisher={Elsevier}, month={}, doi = {}, url = {}, } @article{melia2014similarity, title={On the similarity of commercial EPC Gen2 pseudorandom number generators}, author={Meli{\`a}-Segu{\'\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi}, journal={Transactions on Emerging Telecommunications Technologies}, volume={25}, number={2}, pages={151--154}, year={2014}, month={}, doi = {}, url = {}, } @article{shi2014searching, title={Searching for a black hole in interconnected networks using mobile agents and tokens}, author={Shi, Wei and Garcia-Alfaro, Joaquin and Corriveau, Jean-Pierre}, journal={Journal of Parallel and Distributed Computing}, volume={74}, number={1}, pages={1945--1958}, year={2014}, publisher={Elsevier}, month={}, doi = {}, url = {}, } @Comment 2013 @article{garcia2013COSEManagement, title={Management of stateful firewall misconfiguration}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Martinez, Salvador and Cabot, Jordi}, journal={Computers \& Security}, volume={39}, pages={64--85}, year={2013}, publisher={Elsevier}, month={ }, doi={ }, url={ }, } @inproceedings{barbeau2013new, title={A new analytic model for the cognitive radio jump-stay algorithm}, author={Barbeau, Michel and Cervera, Gimer and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Wireless Days (WD), 2013 IFIP}, pages={1--3}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @inproceedings{cervera2013qos, title={{QoS and security in Link State Routing protocols for MANETs}}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Wireless Days (WD), 2013 IFIP}, pages={1--6}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @article{papagiannakopoulou2013CAEE, title={A privacy-aware access control model for distributed network monitoring}, author={Papagiannakopoulou, Eugenia I and Koukovini, Maria N and Lioudakis, Georgios V and Garcia-Alfaro, Joaquin and Kaklamani, Dimitra I and Venieris, Iakovos S and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora}, journal={Computers \& Electrical Engineering}, volume={39}, number={7}, pages={2263--2281}, year={2013}, publisher={Elsevier}, month={ }, doi={ }, url={ }, } @inproceedings{papagiannakopoulou2013fps, title={{Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model}}, author={Papagiannakopoulou, Eugenia and Koukovini, Maria and Lioudakis, Georgios and Garcia-Alfaro, Joaquin and Kaklamani, Dimitra and Venieris, Iakovos and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric}, booktitle={6th International Symposium on Foundations and Practice of Security, La Rochelle, France}, pages={}, year={2013}, month={ }, doi={ }, url={ }, } @inproceedings{hachem2013adaptive, title={An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies}, author={Hachem, Nabil and Garcia-Alfaro, Joaquin and Debar, Herve}, booktitle={Nordic Conference on Secure IT Systems}, pages={297--312}, year={2013}, publisher={Springer}, month={ }, doi={ }, url={ }, } @inproceedings{tounsi2013fine, title={Fine-grained privacy control for the rfid middleware of epcglobal networks}, author={Tounsi, Wiem and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin}, booktitle={Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems}, pages={60--67}, year={2013}, publisher={ACM}, month={ }, doi={ }, url={ }, } @inproceedings{tounsi2013privacy, title={Privacy-enhanced filtering and collection middleware in epcglobal networks}, author={Tounsi, Wiem and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin}, booktitle={Risks and Security of Internet and Systems (CRiSIS), 2013 International Conference on}, pages={1--8}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @book{pst2013, title={2013 Eleventh annual conference on privacy, security and trust}, author={Castell{\`a}-Roca, Jordi and Domingo-Ferrer, Josep and Garcia-Alfaro, Joaquin and Ghorbani, Ali and Jensen, Christian Damsgaard and Manjon, Jesus and Onut, Iosif-Viorel and Stakhanova, Natalia and Torra, Vicen{\c{c}} and Zhang, Jie}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @article{castillo2013onion, title={Onion routing circuit construction via latency graphs}, author={Castillo-P{\'e}rez, Sergio and Garcia-Alfaro, Joaquin}, journal={Computers \& Security}, volume={37}, pages={197--214}, year={2013}, publisher={Elsevier}, month={ }, doi={ }, url={ }, } @inproceedings{martinez2013model, title={Model-driven extraction and analysis of network security policies}, author={Mart{\'\i}nez, Salvador and Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Cabot, Jordi}, booktitle={International Conference on Model Driven Engineering Languages and Systems}, pages={52--68}, year={2013}, publisher={Springer}, month={ }, doi={ }, url={ }, } @article{cuppens2013setop, title={{SETOP'2012 and FPS'2012 special issue}}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Damiani, Ernesto and Garcia-Alfaro, Joaquin and Tawbi, Nadia and State, Radu}, journal={Journal of information security and applications}, volume={18}, number={1}, pages={1--96}, year={2013}, publisher={Elsevier}, month={ }, doi = {10.1016/j.jisa.2013.08.004}, url = {http://doi.org/10.1016/j.jisa.2013.08.004}, } @inproceedings{wazan2013attribute, title={Attribute-based Mining Process for the Organization-Based Access Control Model}, author={Wazan, Ahmad Samer and Blanc, Gregory and Debar, Herv{\'e} and Garcia-Alfaro, Joaquin}, booktitle={Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on}, pages={421--430}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @inproceedings{martinez2013towards, title={Towards an access-control metamodel for web content management systems}, author={Mart{\i}nez, Salvador and Garc{\i}a-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Cabot, Jordi}, booktitle={ICWE Workshops}, pages={148--155}, year={2013}, publisher={ }, month={ }, doi={ }, url={ }, } @inproceedings{martinez2013real, title={Real-time malicious fast-flux detection using DNS and bot related features}, author={Martinez-Bea, Sergi and Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin}, booktitle={Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on}, pages={369--372}, year={2013}, publisher={IEEE}, month={ }, doi={ }, url={ }, } @article{hachana2013semantic, title={Semantic analysis of role mining results and shadowed roles detection}, author={Hachana, Safa{\`a} and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin}, journal={Information Security Technical Report}, volume={17}, number={4}, pages={131--147}, year={2013}, publisher={Elsevier}, month={ }, doi={ }, url={ }, } @book{fps2012, title={{Foundations and Practice of Security; 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Miri, Ali and Tawbi, Nadia}, year={2013}, month={ }, publisher={Springer}, doi = {10.1007/978-3-642-37119-6}, url = {http://www.springer.com/fr/book/9783642371189}, } @article{melia2013j3gen, title={J3Gen: A PRNG for low-cost passive RFID}, author={Melia-Segui, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi}, journal={Sensors}, volume={13}, number={3}, pages={3816--3830}, year={2013}, month={ }, publisher={Multidisciplinary Digital Publishing Institute} } @article{cervera2013multipath, title={A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, journal={Journal of Network and Computer Applications}, volume={36}, number={2}, pages={744--755}, year={2013}, publisher={Elsevier}, month={ }, doi={ }, url={ }, } @article{shi2012handling, title={Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks}, author={Shi, Wei and Barbeau, Michel and Alfaro, Joaquin Garcia and Corriveau, Jean-Pierre}, journal={Ad hoc \& sensor wireless networks}, volume={17}, number={1}, pages={87--102}, year={2012}, publisher={ }, month={ }, doi={ }, url={ }, } @incollection{cervera2013SecurityLinkState, title={Security issues in link state routing protocols for MANETs}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Advances in Network Analysis and its Applications}, pages={117--148}, month={January}, year={2013}, publisher={Springer}, doi={ }, url={ }, } @Comment 2012 @inproceedings{hachem2012hadega, title={{HADEGA: A novel MPLS-based mitigation solution to handle network attacks}}, author={Hachem, Nabil and Debar, Herve and Garcia-Alfaro, Joaquin}, booktitle={31st IEEE International conference on Performance Computing and Communications (IPCCC 2012)}, pages={171--180}, year={2012}, month={December}, publisher={IEEE}, doi={10.1109/PCCC.2012.6407750}, url={http://dx.doi.org/10.1109/PCCC.2012.6407750}, } @inproceedings{martinez2012model, title={A model-driven approach for the extraction of network access-control policies}, author={Mart{\'\i}nez, Salvador and Cabot, Jordi and Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora}, booktitle={Proceedings of the Workshop on Model-Driven Security}, pages={5--10}, year={2012}, month={October}, publisher={ACM}, doi={10.1145/2422498.2422503}, url={http://dx.doi.org/10.1145/2422498.2422503}, } @article{battistello2012transaction, title={{Transaction-based authentication and key agreement protocol for inter-domain VoIP}}, author={Battistello, Patrick and Garcia-Alfaro, Joaquin and Del{\'e}tr{\'e}, Cyril}, journal={Journal of Network and Computer Applications}, volume={35}, number={5}, pages={1579--1597}, year={2012}, publisher={Elsevier}, month={September}, doi={10.1016/j.jnca.2012.02.010}, url={http://dx.doi.org/10.1016/j.jnca.2012.02.010}, } @book{pst2012, title={10th Annual International Conference on Privacy, Security and Trust Privacy, Security and Trust (PST 2012), Paris, July 16-18}, author={Cuppens-Boulahia, Nora and Fong, Philip and Garcia-Alfaro, Joaquin and Marsh, Stephen and Stegh{\"o}fer, Jan-Philipp}, year={2012}, publisher={IEEE}, month={July}, url={http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6287257}, } @techreport{castillo2012arxiv, title={On the Use of Latency Graphs for the Construction of Tor Circuits}, author={Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin}, year={2012}, month={August}, url={http://arxiv.org/abs/1208.3730}, } @inproceedings{hachana2012towards, title={Towards automated assistance for mined roles analysis in role mining applications}, author={Hachana, Safaa and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin}, booktitle={Seventh International Conference on Availability, Reliability and Security (ARES 2012)}, pages={123--132}, year={2012}, publisher={IEEE}, month={August}, doi={10.1109/ARES.2012.61}, url={http://dx.doi.org/10.1109/ARES.2012.61}, } @book{cuppens2012dbsec, title={{Data and Applications Security and Privacy XXVI; 26th Annual IFIP WG 11.3 Conference (DBSec 2012) Paris, France, July 11-13,2012. Proceedings}}, author={Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Alfaro, Joaquin Garcia}, year={2012}, month={ }, publisher={Springer}, journal={Lecture Notes in Computer Science}, volume={7371}, doi = {10.1007/978-3-642-31540-4}, url = {http://dx.doi.org/10.1007/978-3-642-31540-4}, } @inproceedings{cuppens2012handling, title={Handling stateful firewall anomalies}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin and Moataz, Tarik and Rimasson, Xavier}, booktitle={IFIP International Information Security Conference (SEC 2012); Information Security and Privacy Research}, pages={174--186}, year={2012}, publisher={Springer}, month={June}, doi={10.1007/978-3-642-30436-1_15}, url={http://dx.doi.org/10.1007/978-3-642-30436-1_15}, } @inproceedings{cuppens2012sarssi, title={D{\'e}tection des anomalies dans les pare-feux de nouvelles g{\'e}n{\'e}rations}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin and Moataz, Tarik and Morucci, St{\'e}phane and Rimasson, Xavier}, booktitle={7th Conference on Network and Information Systems Security (SARSSI 2012), Cabourg, France}, year={2012}, month={May}, } @book{dpm2011, title={Data Privacy Management and Autonomous Spontaneus Security; 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Cuppens-Boulahia, Nora and Capitani di Vimercati, Sabrina}, series={Lecture Notes in Computer Science}, volume={7122}, year={2012}, month={ }, doi = {10.1007/978-3-642-28879-1}, url = {http://dx.doi.org/10.1007/978-3-642-28879-1}, } @book{fps2011, title={Foundations and practice of security; 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Lafourcade, Pascal}, year={2012}, month={ }, publisher={Springer}, doi = {10.1007/978-3-642-27901-0}, url = {http://dx.doi.org/10.1007/978-3-642-27901-0}, } @Comment 2011 @inproceedings{rao2011system, title={{System architecture for collaborative security and privacy monitoring in multi-domain networks}}, author={Rao, Sathya and Bianchi, Giuseppe and Garcia-Alfaro, Joaquin and Romero, Francisco and Trammell, Brian and Berger, Andreas and Lioudakis, Georgios and Papagianakopoulou, Eugenia and Koukovini, Mariza and Mittig, Karel}, booktitle={5th International Conference on Internet Multimedia Systems Architecture and Applications}, pages={1--6}, year={2011}, month={December}, publisher={IEEE}, doi={10.1109/IMSAA.2011.6156360}, url={http://dx.doi.org/10.1109/IMSAA.2011.6156360}, } @inproceedings{melia2011multiple, title={{Multiple-Polynomial LFSR based Pseudorandom Number Generator for EPC Gen2 RFID Tags}}, author={Melia-Segui, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi}, booktitle={37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011)}, year={2011}, pages={3820--3825}, publisher={IEEE}, month={November}, doi={10.1109/IECON.2011.6119932}, url={http://dx.doi.org/10.1109/IECON.2011.6119932}, } @article{garcia2011secure, title={Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, journal={annals of telecommunications-annales des t{\'e}l{\'e}communications}, volume={66}, number={9-10}, pages={535--552}, year={2011}, month={ }, publisher={Springer-Verlag} } @misc{garcia2011MISC, title={{Administration des Architectures de Securite Reseau}}, author={Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin}, month={September}, issue={57}, pages={73--82}, year={2011}, publisher={Editions DIAMOND}, url={https://boutique.ed-diamond.com/anciens-numeros/391-misc57.html} } @misc{garcia2011hakin9, title={{Practical eavesdropping of control data from EPC Gen2 queries with a programmable RFID toolkit}}, author={Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi and Melia-Segui, Joan}, month={September}, volume={6}, issue={9}, pages={14--19}, year={2011}, publisher={HAKIN9 MEDIA}, url={https://hakin9.org/} } @article{melia2011practical, title={A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags}, author={Meli{\`a}-Segu{\'\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi}, journal={Wireless personal communications}, volume={59}, number={1}, pages={27--42}, year={2011}, publisher={Springer}, month={July}, doi={10.1007/s11277-010-0187-1}, url={http://dx.doi.org/10.1007/s11277-010-0187-1}, } @article{preda2011dynamic, title={Dynamic deployment of context-aware access control policies for constrained security devices}, author={Preda, Stere and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin and Toutain, Laurent}, journal={Journal of Systems and Software}, volume={84}, number={7}, pages={1144--1159}, year={2011}, publisher={Elsevier}, month={July}, doi={10.1016/j.jss.2011.02.005}, url={http://dx.doi.org/10.1016/j.jss.2011.02.005}, } @inproceedings{cervera2011fps, title={{Preventing the cluster formation attack against the hierarchical OLSR protocol}}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={International Symposium on Foundations and Practice of Security}, pages={118--131}, year={2011}, publisher={Springer}, month={May}, doi={10.1007/978-3-642-27901-0_10}, url={http://dx.doi.org/10.1007/978-3-642-27901-0_10}, } @inproceedings{papagiannakopoulou2011fps, title={A contextual privacy-aware access control model for network monitoring workflows: Work in progress}, author={Papagiannakopoulou, Eugenia and Koukovini, Maria and Lioudakis, Georgios and Garcia-Alfaro, Joaquin and Kaklamani, Dimitra and Venieris, Iakovos}, booktitle={International Symposium on Foundations and Practice of Security}, pages={208--217}, year={2011}, publisher={Springer}, month={May}, doi={10.1007/978-3-642-27901-0_16}, url={http://dx.doi.org/10.1007/978-3-642-27901-0_16}, } @inproceedings{tounsi2011fps, title={Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress}, author={Tounsi, Wiem and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin}, booktitle={International Symposium on Foundations and Practice of Security}, pages={242--251}, year={2011}, publisher={Springer}, month={May}, doi={10.1007/978-3-642-27901-0_20}, url={http://dx.doi.org/10.1007/978-3-642-27901-0_20}, } @inproceedings{cervera2011cnsr, title={Mitigation of flooding disruption attacks in HOLSR networks}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={9th Annual Conference on Communication Networks and Services Research Conference (CNSR 2011)}, pages={167--174}, year={2011}, publisher={IEEE}, month={May}, doi={10.1109/CNSR.2011.32}, url={http://dx.doi.org/doi:10.1109/CNSR.2011.32}, } @article{garcia2011AHSWN, title={Proactive threshold cryptosystem for EPC tags}, author={Alfaro, Joaquin Garcia and Barbeau, Michel and Kranakis, Evangelos}, journal={Ad hoc \& sensor wireless networks}, volume={12}, number={3-4}, pages={187--208}, year={2011}, publisher={Old City Publishing}, month={May}, url={http://www.oldcitypublishing.com/AHSWN/AHSWNcontents/AHSWNv12n3-4contents.html}, } @article{montolio2011jnca, title={{Improved flooding of broadcast messages using extended multipoint relaying}}, author={Montolio-Aranda, Pere and Garcia-Alfaro, Joaquin and Megias, David}, journal={Journal of Network and Computer Applications}, volume={34}, number={2}, pages={542--550}, year={2011}, publisher={Elsevier}, month={March}, doi={10.1016/j.jnca.2010.12.011}, url={http://dx.doi.org/10.1016/j.jnca.2010.12.011}, } @book{dpm2010, title={Data Privacy Management and Autonomous Spontaneus Security; 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Cavalli, Ana and Leneutre, Jean}, journal={Lecture Notes in Computer Science}, volume={6514}, year={2011}, month={ }, doi = {10.1007/978-3-642-19348-4}, url = {http://dx.doi.org/10.1007/978-3-642-19348-4}, } @Comment 2010 @incollection{garcia2010Auerbach, booktitle={{Security of Self-Organizing Networks: MANET, WSN, WMN, VANET}}, title={{Handling security threats to the RFID system of EPC networks}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, editor={Al-Sakib Khan Pathan}, publisher={Auerbach Publications, Taylor and Francis Group}, pages={45--64}, year={2010}, chapter={3}, url={https://books.google.fr/books?id=ZtBnZoijaDcC}, } @inproceedings{cervera2010CRiSIS, title={Mitigation of topology control traffic attacks in OLSR networks}, author={Cervera, Gimer and Barbeau, Michel and Garcia-Alfaro, Joaquin and Kranakis, Evangelos}, booktitle={Risks and Security of Internet and Systems (CRiSIS), 2010 Fifth International Conference on}, pages={1--8}, year={2010}, month={ }, publisher={IEEE}, doi={10.1109/CRISIS.2010.5764920}, url={http://dx.doi.org/10.1109/CRISIS.2010.5764920}, } @inproceedings{garcia2010SETOP, title={{MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies}}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Preda, Stere}, booktitle={Data Privacy Management and Autonomous Spontaneous Security}, pages={203--215}, month={September}, year={2010}, publisher={Springer}, doi={10.1007/978-3-642-19348-4_15}, url={http://dx.doi.org/10.1007/978-3-642-19348-4_15}, } @article{melia2010clasificacion, title={{Clasificaci{\'o}n de las Amenazas a la Seguridad en Sistemas RFID-EPC Gen2}}, author={Meli{\`a}-Segu{\'\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi}, journal={XI Reuni{\'o}n Espanola sobre Criptolog{\i}a y Seguridad de la Informaci{\'o}n, Tarragona-Spain. Universitat Rovira i Virgili}, month={September}, pages={211--215}, year={2010}, } @inproceedings{martinezRecsi2010, title={Despliegue de pol{\'\i}ticas condicionadas para la protecci{\'o}n de atributos en negociadores m{\'o}viles}, author={Mart{\'\i}nez-Garc{\'\i}a, Carles and Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin}, pages={171--175}, booktitle={XI Reuni{\'o}n Espanola sobre Criptolog{\i}a y Seguridad de la Informaci{\'o}n, Tarragona-Spain. Universitat Rovira i Virgili}, month={September}, year={2010}, } @inproceedings{castilloRecsi2010, title={{El Spyware como amenaza contra navegadores web}}, author={Castillo-Perez, Sergio and M{\'u}rcia-Andres, Jose and Garcia-Alfaro, Joaquin}, pages={277--281}, booktitle={XI Reuni{\'o}n Espanola sobre Criptolog{\i}a y Seguridad de la Informaci{\'o}n, Tarragona-Spain. Universitat Rovira i Virgili}, month={September}, year={2010}, } @misc{garcia2010MitacsMultiple, title={{A Multiple-Polynomial LFSR based Pseudorandom Number Generator Design for EPC Gen2 Systems [Extended Abstract]}}, author={Garcia-alfaro, Joaquin and Herrera-Joancomarti, Jordi and Melia-segui, Joan}, booktitle={Mitacs Workshop on Network Security and Cryptography, Mitacs Focus Period, Toronto, Canada}, month={June}, year={2010} } @inproceedings{melia2010rfid, title={{RFID EPC-Gen2 for postal applications: a security and privacy survey}}, author={Meli{\`a}-Segu{\'\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'\i}, Jordi}, booktitle={RFID-Technology and Applications (RFID-TA), 2010 IEEE International Conference on}, pages={118--123}, month={June}, year={2010}, publisher={IEEE} } @inproceedings{tounsi2010gedsip, title={S{\'e}curiser les communications dans les syst{\`e}mes de surveillance m{\'e}dicale-Protocoles appliqu{\'e}s aux {\'e}tiquettes {\`a} faible co{\^u}t}, author={Tounsi, Wiem and Alfaro, Joaquin Garcia and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric}, booktitle={3eme Atelier sur la Gestion de Donnees dans les Systemes d'Information Pervasifs (GEDSIP'10), Marseille, France}, pages={77--91}, month={May}, year={2010}, } @inproceedings{tounsi2010sarssi, title={Protocoles d'{\'e}change de cl{\'e}s pour des syst{\`e}mes de surveillance {\`a} base de radio-{\'e}tiquettes}, author={Tounsi, Wiem and Alfaro, Joaquin Garcia and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric}, booktitle={5th Conf. on Network Architectures and Information Systems Security (SAR-SSI 2010), Menton, France}, month={May}, year={2010}, } @inproceedings{tounsi2010CNSR, title={Securing the communications of home health care systems based on RFID sensor networks}, author={Tounsi, Wiem and Garcia-Alfaro, Joaquin and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric}, booktitle={Eighth Annual Conference on Communication Networks and Services Research (CNSR 2010)}, pages={284--291}, year={2010}, publisher={IEEE}, doi={10.1109/CNSR.2010.38}, url={http://doi.org/10.1109/CNSR.2010.38}, } @techreport{garcia2010TRpositioning, title={{Positioning of wireless sensor nodes in the presence of liars}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, institution={Carleton University}, month = {March}, year={2010}, url={http://service.scs.carleton.ca/node/126}, } @book{dpm2009, title={Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Cuppens-Boulahia, Nora}, year={2010}, publisher={Springer}, doi = {10.1007/978-3-642-11207-2}, url = {http://link.springer.com/book/10.1007%2F978-3-642-11207-2}, } @inproceedings{preda2010ESSOS, title={Model-driven security policy deployment: property oriented approach}, author={Preda, Stere and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin and Toutain, Laurent}, booktitle={International Symposium on Engineering Secure Software and Systems}, pages={123--139}, month={February}, year={2010}, publisher={Springer}, doi={10.1007/978-3-642-11747-3_10}, url={http://dx.doi.org/10.1007/978-3-642-11747-3_10}, } @inproceedings{melia2010analysis, title={Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags}, author={Melia-Segui, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi}, booktitle={International Conference on Financial Cryptography and Data Security}, series={Lecture Notes in Computer Science}, volume={6054}, month={January}, pages={34--46}, year={2010}, publisher={Springer}, doi={10.1007/978-3-642-14992-4_4}, url={http://dx.doi.org/10.1007/978-3-642-14992-4_4}, } @Comment 2009 @inproceedings{castillo2009incos, title={{Spyware-based Menaces Against Web Applications}}, author={Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin}, booktitle={International Conference on Intelligent Networking and Collaborative Systems (INCOS'09)}, pages={409--412}, month={November}, year={2009}, publisher={IEEE}, url={http://dx.doi.org/10.1109/INCOS.2009.31}, doi={10.1109/INCOS.2009.31}, } @misc{Preda2009WO2010043649, title={{Network system including a plurality of computer devices using an ipv6 addressing, and computer device capable of connecting to such a network system}}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Toutain, Laurent and Preda, Stere and Garcia-Alfaro, Joaquin}, url={https://www.google.com/patents/WO2010043649A1}, month={October}, year={2009}, publisher={Google Patents}, } @inproceedings{preda2009secured, title={{A secured delegation of remote services on IPv6 home networks}}, author={Preda, Stere and Toutain, Laurent and Cuppens-Boulahia, Nora and Cuppens, Fr{\'e}d{\'e}ric and Garcia-Alfaro, Joaquin}, booktitle={Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)}, pages={12--18}, month={October}, year={2009}, publisher={IEEE}, url={http://dx.doi.org/10.1109/CRISIS.2009.5411984}, doi={10.1109/CRISIS.2009.5411984}, } @inproceedings{garcia2009evaluation, title={{Security Threat Mitigation Trends in Low-Cost RFID Systems}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, booktitle={4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009}, pages={193-207}, month={September}, year={2009}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-642-11207-2_15}, doi={10.1007/978-3-642-11207-2_15}, } @misc{garcia2009techniques, title={{Les composants RFID, sont-ils vulnerables ?}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, month={July/September}, issue={4/5}, year={2009}, publisher={Techniques de l'ingenieur}, url={http://www.techniques-ingenieur.fr/} } @inproceedings{garcia2009CNSR, title={Secure localization of nodes in wireless sensor networks with limited number of truth tellers}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, booktitle={Seventh Annual Conference on Communication Networks and Services Research (CNSR'09)}, pages={86--93}, year={2009}, publisher={IEEE}, url={http://dx.doi.org/10.1109/CNSR.2009.23}, doi={10.1109/CNSR.2009.23}, } @inproceedings{navarro2009IFIPSEC, title={{A policy based approach for the management of Web browser resources to prevent anonymity attacks in TOR}}, author={Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin}, booktitle={IFIP International Information Security Conference (SEC 2009), Emerging Challenges for Security, Privacy and Trust}, pages={164--175}, year={2009}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-642-01244-0_15}, doi={10.1007/978-3-642-01244-0_15}, } @inproceedings{castillo2009ITNG, title={{Evaluation of two privacy-preserving protocols for the DNS}}, author={Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin}, booktitle={Sixth International Conference on Information Technology; New Generations (ITNG'09)}, pages={411--416}, month={April}, year={2009}, publisher={IEEE}, url={http://dx.doi.org/10.1109/ITNG.2009.195}, doi={10.1109/ITNG.2009.195}, } @techreport{garcia2009proactive, title={{A Proactive Threshold Secret Sharing Scheme Handling Gen2 Privacy Threats}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, year={2009}, month = {March}, institution={Carleton University}, url={http://service.scs.carleton.ca/node/125}, } @inproceedings{preda2009semantic, title={{Semantic context aware security policy deployment}}, author={Preda, Stere and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin and Toutain, Laurent and Elrakaiby, Yehia}, booktitle={4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009)}, pages={251--261}, month={March}, year={2009}, publisher={ACM}, url={http://dx.doi.org/10.1145/1533057.1533092}, doi={10.1145/1533057.1533092}, } @misc{melia2009rfidsec, title={{Security and Privacy of Postal RFID Systems}}, author={Melia-Segui, Joan and Herrera-Joancomarti, Jordi and Garcia-Alfaro, Joaquin}, booktitle={RFIDSec Asia 2009}, month={January}, year={2009}, } @Comment 2008 @inproceedings{castillo2008anonymous, title={{Anonymous resolution of DNS queries}}, author={Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin}, journal={OTM Confederated International Conferences, On the Move to Meaningful Internet Systems (OTM 2008)}, pages={987--1000}, month={November}, year={2008}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-540-88873-4_5}, doi={10.1007/978-3-540-88873-4_5}, volume={5332}, } @inproceedings{garcia2008SETOP, title={{Evaluation of Anonymized ONS Queries}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, booktitle={Security of Autonomous and Spontaneous Networks (SETOP 2008)}, pages={47--59}, publisher={Editions Publibook, France}, month={October}, year={2008}, } @article{garcia2008RecsiDNS, title={Resoluci{\'o}n de consultas an{\'o}nimas sobre DNS}, author={Garcia-Alfaro, Joaquin and Castillo-Perez, Sergio}, booktitle={X Reuni{\'o}n Espanola sobre Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI), Universidad de Salamanca}, pages={619-628}, month={September}, year={2008}, } @inproceedings{melia2008Recsi, title={An{\'a}lisis de seguridad y privacidad para sistemas EPC-RFID en el sector postal}, author={Melia-Segui, Joan and Herrera-Joancomarti, Jordi and Garcia-Alfaro, Joaquin}, pages={639--646}, booktitle={X Reuni{\'o}n Espanola sobre Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI), Universidad de Salamanca}, month={September}, year={2008}, } @inproceedings{garciaRecsiPrevencion, title={Prevenci{\'o}n de ataques de Cross-Site Scripting en aplicaciones Web}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo}, booktitle={X Reuni{\'o}n Espanola sobre Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI), Universidad de Salamanca}, pages={369-377}, month={September}, year={2008}, } @inproceedings{garcia2008analysis, title={{Analysis of Threats to the Security of EPC Networks}}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, booktitle={Communication Networks and Services Research Conference, 2008. CNSR 2008. 6th Annual}, pages={67--74}, month={May}, year={2008}, publisher={IEEE}, url={http://dx.doi.org/10.1109/CNSR.2008.69}, doi={10.1109/CNSR.2008.69}, } @inproceedings{garcia2008distributed, title={Distributed exchange of alerts for the detection of coordinated attacks}, author={Garcia-Alfaro, Joaquin and Jaeger, Michael A. and M{\"{u}}hl, Gero and Barrera, Ignasi and Borrell, Joan}, booktitle={6th Annual Communication Networks and Services Research Conference (CNSR 2008)}, pages={96--103}, month={May}, year={2008}, publisher={IEEE}, url={http://dx.doi.org/10.1109/CNSR.2008.70}, doi={10.1109/CNSR.2008.70}, } @article{garcia2008ijis, title={Complete analysis of configuration rules to guarantee reliable network security policies}, author={Garcia-Alfaro, Joaquin and Boulahia-Cuppens, Nora and Cuppens, Fr{\'e}d{\'e}ric}, journal={International Journal of Information Security}, volume={7}, number={2}, pages={103--122}, month={April}, year={2008}, publisher={Springer}, url={http://dx.doi.org/10.1007/s10207-007-0045-7}, doi={10.1007/s10207-007-0045-7}, } @inproceedings{garcia2008security, title={Security threats on EPC based RFID systems}, author={Garcia-Alfaro, Joaquin and Barbeau, Michel and Kranakis, Evangelos}, booktitle={Fifth International Conference on Information Technology: New Generations, 2008 (ITNG 2008)}, pages={1242--1244}, year={2008}, publisher={IEEE}, url={http://dx.doi.org/10.1109/ITNG.2008.206}, doi={10.1109/ITNG.2008.206}, } @Comment 2007 @inproceedings{garcia2007OTM, title={{Prevention of cross-site scripting attacks on current Web applications}}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo}, booktitle={OTM Confederated International Conferences, On the Move to Meaningful Internet Systems (OTM 2007)}, pages={1770--1784}, volume={4804}, month={November}, year={2007}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-540-76843-2_45}, doi={10.1007/978-3-540-76843-2_45}, } @inproceedings{garcia2007critis, title={{A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications}}, author={Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo}, booktitle={International Workshop on Critical Information Infrastructures Security (CRITIS 2007)}, pages={287-298}, volume={5141}, month={October}, year={2007}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-3-540-89173-4_24}, doi={10.1007/978-3-540-89173-4_24}, } @inproceedings{garcia2007secrypt, title={{Reliable Process for Security Policy Deployment}}, author={Garcia-Alfaro, Joaquin and Cuppens, Frederic and Cuppens-Boulahia, Nora}, booktitle={International Conference on Security and Cryptography (Secrypt 2007), Barcelona, Spain}, month={July}, year={2007}, } @inproceedings{alfaro2007IFIPSEC, title={{Management of exceptions on access control policies}}, author={Garcia-Alfaro, Joaquin and Cuppens, Frederic and Cuppens-Boulahia, Nora}, booktitle={IFIP International Information Security Conference (SEC 2007); New Approaches for Security, Privacy and Trust in Complex Environments}, pages={97--108}, year={2007}, publisher={Springer}, url={http://dx.doi.org/10.1007/978-0-387-72367-9_9}, doi={10.1007/978-0-387-72367-9_9}, } @inproceedings{alfaro2007aggregating, title={Aggregating and deploying network access control policies}, author={Garcia-Alfaro, Joaquin and Cuppens, Frederic and Cuppens-Boulahia, Nora}, booktitle={Second International Conference on Availability, Reliability and Security (ARES 2007)}, pages={532--542}, month={April}, year={2007}, publisher={IEEE}, url={http://dx.doi.org/10.1109/ARES.2007.34}, doi={10.1109/ARES.2007.34}, } @Comment 2006 @phdthesis{TELECOM_BRETAGNE-2379, author={Garcia-Alfaro, Joaquin}, title={{Platform of intrusion management - Design and implementation}}, school={ RSM - D{\'e}pt. R{\'e}seaux, S{\'e}curit{\'e} et Multim{\'e}dia (Institut Mines-T{\'e}l{\'e}com-T{\'e}l{\'e}com Bretagne-UEB), UR1 - Universit{\'e} de Rennes 1}, year={November 2006}, note={PhD Thesis, Computer Science, Universite de Rennes 1, Institut Mines-Telecom, Telecom Bretagne-UEB, Universitat Autonoma de Barcelona}, url={https://portail.telecom-bretagne.eu/publi/public/fic_download.jsp?id=4771}, } @inproceedings{garcia2006OTM, title={SMARTCOP--a smart card based access control for the protection of network security components}, author={Garcia-Alfaro, Joaquin and Castillo, Sergio and Castella-Roca, Jordi and Navarro, Guillermo and Borrell, Joan}, booktitle={On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops}, pages={415--424}, year={2006}, publisher={Springer} } @inproceedings{garcia2006esorics, title={Analysis of policy anomalies on distributed network security setups}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora}, booktitle={European Symposium on Research in Computer Security}, pages={496--511}, year={2006}, publisher={Springer} } @inproceedings{garcia2006critis, title={Protection of components based on a smart-card enhanced security module}, author={Garcia-Alfaro, Joaquin and Castillo, Sergio and Castell{\`a}-Roca, Jordi and Navarro, Guillermo and Borrell, Joan}, booktitle={International Workshop on Critical Information Infrastructures Security (CRITIS 2006)}, pages={128--139}, year={2006}, publisher={Springer} } @inproceedings{garcia2006safecomp, title={Towards filtering and alerting rule rewriting on single-component policies}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora}, booktitle={International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006)}, pages={182--194}, year={2006}, month={September}, publisher={Springer}, doi = {10.1007/11875567_14}, url = {http://dx.doi.org/10.1007/11875567_14}, } @inproceedings{barrera2006Recsi, title={Intercambio distribuido de alertas para la gestion de ataques coordinados}, author={Barrera-Caparros, Ignasi and Garcia-Alfaro Joaquin}, booktitle={IX Reunion Espanola sobre Criptologia y Seguridad de la Informacion, Barcelona, Spain}, pages={616--631}, month={September}, year={2006}, } @article{garcia2006RecsiProteccion, title={Proteccion de componentes y dispositivos de seguridad mediante un control de acceso basado en kernel}, author={Garcia-Alfaro, Joaquin and Castillo, Sergio and Castella-Roca, Jordi and Navarro, Guillermo}, booktitle={IX Reunion Espanola sobre Criptologia y Seguridad de la Informacion, Barcelona, Spain}, pages={773-787}, month={September}, year={2006}, } @inproceedings{garcia2006RecsiAnomalias, title={An{\'a}lisis de anomal{\'\i}as sobre pol{\'\i}ticas de control de acceso en red}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora}, pages={584-599}, month={September}, year={2006}, } @inproceedings{cuppens2006SARSSI, title={Detection of network security component misconfiguration by rewriting and correlation}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Alfaro, J Garcia}, booktitle={5th Conference on Security and Network Architectures (SAR-SSI2006), Seignose-Landes, France}, month={June}, year={2006}, } @article{cuppens2006Annals, title={Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network}, author={Cuppens, Fr{\'e}d{\'e}ric and Autrel, Fabien and Bouzida, Yacine and Garcia-Alfaro, Joaquin and Gombault, Sylvain and Sans, Thierry}, journal={Annals of Telecommunications}, volume={61}, number={1-2}, year={2006}, publisher={Springer}, issn={0003-4347}, doi = {10.1007/BF03219974}, url = {http://dx.doi.org/10.1007/BF03219974}, } @Comment 2005 @article{garcia2005acaps, title={ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System}, author={Garc{\'\i}a, Joaqu{\'\i}n and Castillo, Sergio and Navarro, Guillermo and Borrell, Joan}, journal={Journal of Computer Science and Network Security}, volume={5}, number={11}, pages={87--94}, year={2005} } @inproceedings{cuppens2005cnis, title={Detection and Removal of Firewall Misconfiguration}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin}, booktitle={2005 IASTED International Conference on Communication, Network, and Information Security (CNIS 2005)}, pages={154--161}, publisher={IASTED, Phoenix, AZ, USA, ISBN: 0-88986-537-X}, year={November 2005} } @inproceedings{cuppens2005ssi, title={Misconfiguration Management of Network Security Components}, author={Cuppens, Fr{\'e}d{\'e}ric and Cuppens-Boulahia, Nora and Garcia-Alfaro, Joaquin}, booktitle={7th International Symposium on System and Information Security (SSI 2005)}, pages={1--10}, year={2005} } @article{garcia2005INTELLCOMM, title={{Decoupling Components of an Attack Prevention System Using Publish/Subscribe}}, author={Borrell, Joan and Garcia-Alfaro, Joaquin and Jaeger, Michael A. and M{\"{u}}hl, Gero}, month={October}, year={2005}, pages={37--53}, booktitle={2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005)}, publisher={Springer}, doi = {10.1007/0-387-32015-6_9}, url = {http://dx.doi.org/10.1007/0-387-32015-6_9}, } @inproceedings{navarro2005INTELLCOMM, title={{AMAPOLA: A simple infrastructure for ubiquitous computing}}, author={Navarro-Arribas, Guillermo and Penalver, J. and Ortega-Ruiz, Jose-Antonio and Ametller, Joan and Garcia-Alfaro, Joaquin and Borrell, Joan}, booktitle={2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005)}, pages={77--86}, year={2005}, month={October}, publisher={Springer}, doi = {10.1007/0-387-32015-6_8}, url = {http://dx.doi.org/10.1007/0-387-32015-6_8}, } @inproceedings{garcia2005Carnahan, title={Mechanisms for attack protection on a prevention framework}, author={Garcia-Alfaro, Joaquin and Castillo-Perez, Sergio and Navarro-Arribas, Guillermo and Borrell, Joan}, booktitle={Security Technology, 2005. CCST'05. 39th Annual 2005 International Carnahan Conference on}, pages={137--140}, year={2005}, month={October}, publisher={IEEE}, url={https://doi.org/10.1109/CCST.2005.1594872}, doi={10.1109/CCST.2005.1594872}, } @inproceedings{jaeger2005Carnahan, title={An alert communication infrastructure for a decentralized attack prevention framework}, author={Garcia-Alfaro, Joaquin and Borrell, Joan and Jaeger, Michael A. and Muhl, G}, booktitle={Security Technology, 2005. CCST'05. 39th Annual 2005 International Carnahan Conference on}, pages={234--237}, year={2005}, month={October}, publisher={IEEE}, url={https://doi.org/10.1109/CCST.2005.1594878}, doi={10.1109/CCST.2005.1594878}, } @inproceedings{navarro2005Carnahan, title={Secure agent-based management for pervasive environments}, author={Navarro-Arribas, Guillermo and Ortega-Ruiz, Jose-Antonio and Garcia-Alfaro, Joaquin and Robles, Sergi}, booktitle={Security Technology, 2005. CCST'05. 39th Annual 2005 International Carnahan Conference on}, pages={133--136}, year={2005}, month={October}, publisher={IEEE}, url={https://doi.org/10.1109/CCST.2005.1594864}, doi={10.1109/CCST.2005.1594864}, } @inproceedings{castillod2005CEDI, title={Proteccion de Componentes en una Plataforma para la Prevencion de Ataques Coordinados}, author={Castillo-Perez, Sergio and Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Borrell, Joan}, booktitle={1st Spanish Conference on Informatics (CEDI 2005), Information Security Symposium}, publisher={Thomson}, pages={265--272}, year={2005}, month={September}, } @inproceedings{castillo2005SCE, title={Dise{\~n}o y desarrollo del subsistema de detecci{\'o}n y reacci{\'o}n de una plataforma para la prevenci{\'o}n de ataques coordinados}, author={Castillo, Sergio and Garc{\'\i}a, Joaqu{\'\i}n and Borrell, Joan}, booktitle={Third Spanish Symposium on Electronic Commerce (SCE 2005)}, publisher={Universitat de les Illes Balears, ISBN: 84-7632-929-6}, pages={47--58}, year={2005}, month={June}, } @inproceedings{garcia2005protecting, title={Protecting online casinos against fraudulent player drop-out}, author={Garcia-Alfaro, Joaquin and Cuppens, Fr{\'e}d{\'e}ric and Autrel, Fabien and Castella-Roca, Jordi and Borrell, Joan and Navarro-Arribas, Guillermo and Ortega-Ruiz, Jose-Antonio}, booktitle={International Conference on Information Technology, Coding and Computing (ITCC 2005)}, volume={1}, pages={500--505}, year={2005}, month={April}, publisher={IEEE}, url={https://doi.org/10.1109/ITCC.2005.232}, doi={10.1109/ITCC.2005.232}, } @inproceedings{castella2005digital, title={Digital chips for an on-line casino}, author={Castella-Roca, Jordi and Navarro-Arribas, Guillermo and Ortega-Ruiz, Jose-Antonio and Garcia-Alfaro, Joaquin}, booktitle={Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on}, volume={1}, pages={494--499}, year={2005}, month={April}, publisher={IEEE}, url={https://doi.org/10.1109/ITCC.2005.130}, doi={10.1109/ITCC.2005.130}, } @Comment 2004 @inproceedings{garcia2004nordsec2004, title={Preventing coordinated attacks via alert correlation}, author={Garcia-Alfaro, Joaquin and Autrel, Fabien and Borrell, Joan and Bouzida, Yacine and Castillo-Perez, Sergio and Cuppens, Fr{\'e}d{\'e}ric and Navarro-Arribas, Guillermo}, booktitle={9th Nordic Workshop on Secure IT Systems (NORDSEC 2004)}, publisher={Publications in Telecommunications Software and Multimedia, Sanna Liimatainen, Teemupekka Virtanen, ISSN: 1456-7911}, year={2004}, month={November}, pages={110--117}, } @inproceedings{navarro2004nordsec2004, title={Chained and delegable authorization tokens}, author={Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin and Ortega-Ruiz, Jose-Antonio}, booktitle={9th Nordic Workshop on Secure IT Systems (NORDSEC 2004)}, publisher={Publications in Telecommunications Software and Multimedia, Sanna Liimatainen, Teemupekka Virtanen, ISSN: 1456-7911}, year={2004}, month={November}, pages={8--14}, } @inproceedings{garcia2004icics, title={Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation}, author={Garcia-Alfaro, Joaquin and Autrel, Fabien and Borrell, Joan and Castillo, Sergio and Cuppens, Fr{\'e}d{\'e}ric and Navarro-Arribas, Guillermo}, booktitle={6th International Conference on Information and Communications Security (ICICS 2004)}, pages={223--235}, year={2004}, month={October}, publisher={Springer}, doi = {10.1007/978-3-540-30191-2_18}, url = {http://dx.doi.org/10.1007/978-3-540-30191-2_18}, } @inproceedings{navarro2004recsi, title={CADAT: control de acceso basado en tokens y cadenas hash delegables}, author={Navarro-Arribas, Guillermo and Garcia-Alfaro, Joaquin}, booktitle={Advances in Crytptology and Information Security (VIII RECSI). Ediciones Diaz de Santos, ISBN: 84-7978-650-7}, pages={425--435}, year={2004}, month={September}, } @inproceedings{garcia2004recsi, title={Dise{\~n}o y desarrollo de un sistema colaborativo para la prevenci{\'o}n de ataques coordinados}, author={Garcia-Alfaro, Joaquin and Castillo-Perez, Sergio and Navarro-Arribas, Guillermo and Borrell, Joan}, booktitle={Advances in Crytptology and Information Security (VIII RECSI). Ediciones Diaz de Santos, ISBN: 84-7978-650-7}, pages={475--493}, year={2004}, month={September}, }