Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Yannick Chevalier"'
Autor:
Yannick Chevalier, Florian Fenzl, Maxim Kolomeets, Roland Rieke, Andrey Chechulin, Christoph Kraus
Publikováno v:
Информатика и автоматизация, Vol 20, Iss 4, Pp 845-868 (2021)
The connectivity of autonomous vehicles induces new attack surfaces and thus the demand for sophisticated cybersecurity management. Thus, it is important to ensure that in-vehicle network monitoring includes the ability to accurately detect intrusive
Externí odkaz:
https://doaj.org/article/ef322a2b3d304e9c86a1511e3583ac8b
Autor:
Christoph Krauß, Florian Fenzl, Andrey Chechulin, Yannick Chevalier, Maxim Kolomeets, Roland Rieke
Publikováno v:
Informatics and Automation. 20:845-868
The connectivity of autonomous vehicles induces new attack surfaces and thusthe demand for sophisticated cybersecurity management. Thus, it is important to ensure thatin-vehicle network monitoring includes the ability to accurately detect intrusive b
Autor:
Yannick Chevalier, Michael Rusinowitch
Publikováno v:
2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).
Autor:
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar, Yannick Chevalier, Amine Medad, Baptiste Gregorutti, Edouard Genetay, Alexandre Peter Nguema, Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de de Souza Lima, Rémy Charayron, Thierry Lefèvre, Nathalie Bartoli, Joseph Morlier, Zakaria Chihani, Bruno Carron, Stephan Brunessaux, Léonard Caquot, Tristan Charrier, Badre El Bezzaz Semlali, Oudomsack Pierre Pasquero, Alexis Bazin, Pierre-Elisée Flory, Katarzyna Kapusta, Oana Stan, Vincent Thouvenot, Karel Hynek, Romain Ferrari, Aimen Boudguiga, Renaud Sirdey, Alice Héliou, Thomas Cejka, Daria La Rocca, Martin Zuber, George Vardoulias, Ioannis Papaioannou, Andreas Vekinis, Georgia Papadopoulou, Marc Vincent, Amal El Fallah-Seghrouchni, Vincent Corruble, Narayan Bernardin, Rami Kassab, Frédéric Barbaresco, Karim Tit, Teddy Furon, Mathias Rousset, Louis-Marie Traonouez, Pierre-Yves Lagrave, Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier, Aleksei Iancheruk, Ahmed Allali, Julien Rodriguez, Tejas Bhor, Ricardo Garcia, Jean-Eudes Guilhot-Gaudeffroy, Robert Plana
Publikováno v:
pp.1-152, 2021
HAL
HAL
6th European Cyber Week (6ème semaine européenne de la cybersécurité et de la cyberdéfense)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f7dfc118ffb956c27559ee25e9520267
https://hal.science/hal-03535661
https://hal.science/hal-03535661
Autor:
Yannick Chevalier, Michaël Rusinowitch
Publikováno v:
Proceedings SCSS 2021
9th International Symposium on Symbolic Computation in Software Science (SCSS 2021)
9th International Symposium on Symbolic Computation in Software Science (SCSS 2021), Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
SCSS 2021-9th International Symposium on Symbolic Computation in Software Science
SCSS 2021-9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
9th International Symposium on Symbolic Computation in Software Science (SCSS 2021)
9th International Symposium on Symbolic Computation in Software Science (SCSS 2021), Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
SCSS 2021-9th International Symposium on Symbolic Computation in Software Science
SCSS 2021-9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0799afda737aa4e5ff7aa3bf9db7b20e
https://hal.inria.fr/hal-03463789/file/eptcs.pdf
https://hal.inria.fr/hal-03463789/file/eptcs.pdf
Autor:
Fabián Romero, Yannick Chevalier
Publikováno v:
2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
28th Euromicro International Conference on Parallel, Distributed and network-based Processing-PDP 2020
28th Euromicro International Conference on Parallel, Distributed and network-based Processing-PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
PDP
28th Euromicro International Conference on Parallel, Distributed and network-based Processing-PDP 2020
28th Euromicro International Conference on Parallel, Distributed and network-based Processing-PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
PDP
International audience; Deciding privacy-type properties of deterministic cryptographic protocols such as anonymity and strong secrecy can be reduced to deciding the symbolic equivalence of processes, where each process is described by a set of possi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bbfbd7a44e3bd3e1999abb0962067d58
https://oatao.univ-toulouse.fr/25220/
https://oatao.univ-toulouse.fr/25220/
Publikováno v:
Research Briefs on Information and Communication Technology Evolution. 4:98-106
The paper considers a new design methodology for organization of reliable and secure data transferenvironment in cyber-physical systems, which contain microcontroller-based devices. The keyidea of the design methodology is in providing of most ration
Publikováno v:
Intelligent Distributed Computing XIII ISBN: 9783030322571
IDC
IDC
Growing connectivity of vehicles induces increasing attack surfaces and thus the demand for a sophisticated security strategy. One part of such a strategy is to accurately detect intrusive behavior in an in-vehicle network. Therefore, we built a log
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bacf391a988b062f9bddb2d07e2c44de
https://doi.org/10.1007/978-3-030-32258-8_58
https://doi.org/10.1007/978-3-030-32258-8_58
Publikováno v:
NTMS
The paper considers a new design and verification methodology for secure and distributed cyber-physical systems, which contain microcontroller-based devices. The key idea of the methodology is in providing of most rational solution to improve the cyb
Publikováno v:
Simulation Modelling Practice and Theory. 105:102143
The attack surface of a modern vehicle increases with its connectivity. A strategy to prevent attacks or at least to identify such attacks and to mitigate their effects is therefore imperative. The detection of indications for intrusive behavior in a