Arash Atashpendar, From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography Doctoral thesis, University of Luxembourg, 2019.
Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin
A training-resistant anomaly detection system
F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua,
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach,
International Journal of Critical Infrastructure Protection, Volume 21, 2018, Pages 72-82, ISSN 1874-5482
Steve Muller, Risk Monitoring and Intrusion Detection for Industrial Control Systems, Doctoral thesis, University of Luxembourg, 2018.
M. Skrobot and J. Lancrenon, "On Composability of Game-Based Password Authenticated Key Exchange," 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, pp. 443-457.
S. Muller, C. Harpes and C. Muller, ‘Fast and optimal countermeasureselection for attack defence trees’, in Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, J. Großmann, M. Felderer and F. Seehusen, Eds. Cham: Springer International Publishing, 2017, pp. 53–65, ISBN: 978-3-319-57858-3. DOI: 10.1007/978- 3- 319- 57858- 3_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-57858-3_5.
S. Muller, C. Harpes, Y. L. Traon, S. Gombault and J.-M. Bonnin, ‘Efficiently computing the likelihoods of cyclically interdependent risk scenarios’, Computers & Security, vol. 64, pp. 59–68, 2017, ISSN: 0167-DOI: http://dx.doi.org/10.1016/j.cose.2016.09. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404816301158.
From September 26th to 28th the international partners of the ATENA project met at the dispatching centre of CREOS in Luxembourg and the SWDE facilities in Belgium in order to discuss the future road-map of the project.
S. Muller, C. Harpes, Y. Le Traon, S. Gombault, J.-M. Bonnin and P. Hoffmann, ‘Dynamic risk analyses and dependency-aware rootcause model for critical infrastructures’, in Critical Information Infrastructures
Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers, G. Havarneanu,
R. Setola, H. Nassopoulos and S. Wolthusen, Eds. Cham: Springer 146 Bibliography International Publishing, 2017, pp. 163–175, ISBN: 978-3-319-71368-7. DOI: 10.1007/978-3-319-71368-7_14. [Online].
Information Security Maturity as an Integral Part of ISMS based Risk Management Tools,
Ben Fetler, Carlo Harpes,
24th to 28th July 2016, the tenth international conference on emerging security information, systems and technologies – SECURWARE 2016, Nice, France