Publications

Publications

From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography

Arash Atashpendar, From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography Doctoral thesis, University of Luxembourg, 2019.

Liens : Publication

Elsevier, Computers & Security, Volume 76

Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin A training-resistant anomaly detection system

Liens : Publication Article

International Journal of Critical Infrastructure Protection, Volume 21, 2018

F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua,

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach,

International Journal of Critical Infrastructure Protection, Volume 21, 2018, Pages 72-82, ISSN 1874-5482

Liens : Publication Article

Risk Monitoring and Intrusion Detection for Industrial Control Systems

Steve Muller, Risk Monitoring and Intrusion Detection for Industrial Control Systems, Doctoral thesis, University of Luxembourg, 2018.

Liens : Publication

2018 IEEE European Symposium on Security and Privacy (EuroS&P)

M. Skrobot and J. Lancrenon, "On Composability of Game-Based Password Authenticated Key Exchange," 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, pp. 443-457.

Liens : Publication

RISK 2016 – 4th International Workshop, held in conjunction with ICTSS 2016

S. Muller, C. Harpes and C. Muller, ‘Fast and optimal countermeasureselection for attack defence trees’, in Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, J. Großmann, M. Felderer and F. Seehusen, Eds. Cham: Springer International Publishing, 2017, pp. 53–65, ISBN: 978-3-319-57858-3. DOI: 10.1007/978- 3- 319- 57858- 3_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-57858-3_5.

Liens : Publication

Elsevier, Computers & Security, Volume 64

S. Muller, C. Harpes, Y. L. Traon, S. Gombault and J.-M. Bonnin, ‘Efficiently computing the likelihoods of cyclically interdependent risk scenarios’, Computers & Security, vol. 64, pp. 59–68, 2017, ISSN: 0167-DOI: http://dx.doi.org/10.1016/j.cose.2016.09. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404816301158.

Liens : Publication

Conférence internationale sur ATENA chez CREOS et SWDE

Du 26 au 28 septembre, les partenaires du projet ATENA se sont rencontrés au centre de contrôle de CREOS au Luxembourg, ainsi que dans les locaux de SWDE en Belgique pour discuter du déroulement du projet.

Liens : Communiqué de presse

CRITIS 2016 – 11th International conference

S. Muller, C. Harpes, Y. Le Traon, S. Gombault, J.-M. Bonnin and P. Hoffmann, ‘Dynamic risk analyses and dependency-aware rootcause model for critical infrastructures’, in Critical Information Infrastructures

Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers, G. Havarneanu,

R. Setola, H. Nassopoulos and S. Wolthusen, Eds. Cham: Springer 146 Bibliography International Publishing, 2017, pp. 163–175, ISBN: 978-3-319-71368-7. DOI: 10.1007/978-3-319-71368-7_14. [Online].

Liens : Publication

SECURWARE 2016

Information Security Maturity as an Integral Part of ISMS based Risk Management Tools,
Ben Fetler, Carlo Harpes,
24 au 28 Juillet 2016, the tenth international conference on emerging security information, systems and technologies – SECURWARE 2016, Nice, France

Links: Article

Archive