Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Luka Le Roux"'
Publikováno v:
7th International Conference on Information Systems Security and Privacy, ICISSP 2021
7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Feb 2021, Vienne-Virtual Online, Austria. pp.694-701, ⟨10.5220/0010388206940701⟩
ICISSP
7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Feb 2021, Vienne-Virtual Online, Austria. pp.694-701, ⟨10.5220/0010388206940701⟩
ICISSP
International audience; With the increasing number of cyber-attacks on cyber-physical systems, many security precautions and solutions have been suggested. However, most of these solutions aim to prevent the access of an adversary to the system. Thou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::678961a22815e09f0047a02076d2acb8
https://hal-ensta-bretagne.archives-ouvertes.fr/hal-03188864
https://hal-ensta-bretagne.archives-ouvertes.fr/hal-03188864
Publikováno v:
MODELS Companion
The Advanced Persistent Threats (APT) are sophisticated and well-resourced attacks targeting valuable assets. For APTs both the attack and the defense require advanced planning and strategies similar to military operations. The existing cyber-securit
Autor:
Bernard L'Hostis, Bastien Drouot, Ciprian Teodorov, Raúl Mazo, Sylvain Guérin, Lionel Van Aertryck, Joël Champeau, Fahad Rafique Golra, Luka Le Roux, Tithnara Nicolas Sun
Publikováno v:
ICISSP
ICISSP 2020 : 6th International Conference on Information Systems Security and Privacy
ICISSP 2020 : 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valetta, Malta. pp.341-348, ⟨10.5220/0008916203410348⟩
ICISSP 2020 : 6th International Conference on Information Systems Security and Privacy
ICISSP 2020 : 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valetta, Malta. pp.341-348, ⟨10.5220/0008916203410348⟩
International audience; Cybersecurity is becoming vital as industries are gradually moving from automating physical processes to a higher level automation using cyber physical systems (CPS) and internet of things (IoT). In this context, security is b
Autor:
Ciprian Teodorov, Luka Le Roux
Publikováno v:
Software Engineering and Formal Methods
17th International Conference on Software Engineering and Formal Methods, SEFM 2019
17th International Conference on Software Engineering and Formal Methods, SEFM 2019, Sep 2019, Oslo, Norway. pp.532-548, ⟨10.1007/978-3-030-30446-1_28⟩
Software Engineering and Formal Methods ISBN: 9783030304454
SEFM
17th International Conference on Software Engineering and Formal Methods, SEFM 2019
17th International Conference on Software Engineering and Formal Methods, SEFM 2019, Sep 2019, Oslo, Norway. pp.532-548, ⟨10.1007/978-3-030-30446-1_28⟩
Software Engineering and Formal Methods ISBN: 9783030304454
SEFM
International audience; Model-checking enables the formal verification of software systems. Powerful and automated, this technique suffers, however, from the state-space explosion problem because of the exponential growth in the number of states with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::508282efcf12b751646642019419b8b8
https://hal.archives-ouvertes.fr/hal-02434620/file/LeRoux2019.pdf
https://hal.archives-ouvertes.fr/hal-02434620/file/LeRoux2019.pdf
Publikováno v:
International Journal on Software Tools for Technology Transfer. 19:229-245
With an ever increasing complexity, the verification of critical embedded systems is a challenging and expensive task. Among the available formal methods, model checking offers a high level of automation and would thus lower the cost of this process.
Publikováno v:
Embedded systems, Analysis and Modeling with SysML, UML and AADL
Embedded systems, Analysis and Modeling with SysML, UML and AADL, Wiley, pp.157-184, 2013
Embedded Systems
Embedded systems, Analysis and Modeling with SysML, UML and AADL, Wiley, pp.157-184, 2013
Embedded Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::29cb4ec3e090380115c226cb461ccf3c
https://hal.archives-ouvertes.fr/hal-00843139
https://hal.archives-ouvertes.fr/hal-00843139
Publikováno v:
RTA
Rewriting Techniques and Applications
Rewriting Techniques and Applications, 2007, France. pp.48-62
Lecture Notes in Computer Science ISBN: 9783540734475
Rewriting Techniques and Applications
Rewriting Techniques and Applications, 2007, France. pp.48-62
Lecture Notes in Computer Science ISBN: 9783540734475
International audience; This paper shows how to construct static analyzers using tree automata and rewriting techniques. Starting from a term rewriting system representing the operational semantics of the target programming language and given a progr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b1ff4c4818390c60ebf629ebdb5cc5d3
https://hal.science/hal-00463418
https://hal.science/hal-00463418