- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Access Control and Trust
- Smart Grid Security and Resilience
- Cybercrime and Law Enforcement Studies
- Cryptography and Data Security
- Security and Verification in Computing
- Digital and Cyber Forensics
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Adversarial Robustness in Machine Learning
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Network Packet Processing and Optimization
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Data Visualization and Analytics
- Spam and Phishing Detection
- Distributed systems and fault tolerance
- Energy Efficient Wireless Sensor Networks
- Data Quality and Management
- Cybersecurity and Cyber Warfare Studies
- Opportunistic and Delay-Tolerant Networks
Polytechnique Montréal
2020-2025
Université de Montréal
2020-2024
IMT Atlantique
2017-2022
Université de Bretagne Occidentale
2009-2020
Laboratoire des Sciences et Techniques de l’Information de la Communication et de la Connaissance
2009-2020
Centre National de la Recherche Scientifique
2018-2020
Université Bretagne Loire
2018-2019
Gestion de l'Eau, Acteurs, Usages
2019
Institut Mines-Télécom
2009-2017
École nationale supérieure de techniques avancées Bretagne
2006-2017
Ransomware remains a modern trend. Attackers are still using cryptovirology forcing victims to pay. Notable attacks have been spreading since 2012, starting with Reveton's ransomware attack the more recent 2017 WannaCry, Petya and Bad Rabbit cyberattacks. This as Service (RaaS) can lure criminals into developing tools perform an without previous knowledge of cryptosystem itself. We present in this paper graph-based countermeasure detect malicious threads. It is new mechanism that doesn't...
Nowadays, security policies are the key point of every modern infrastructure. The specification and testing such fundamental steps in development a secure system since any error set rules is likely to harm global security. To address both challenges, we propose framework specify test their implementation on system. Our makes it possible generate an automatic manner, sequences, order validate conformance policy. behavior specified using formal description technique based extended finite state...
In this article, we propose a new additive lossless watermarking scheme which identifies parts of the image that can be reversibly watermarked and conducts message embedding in conventional Haar wavelet transform coefficients. Our approach makes use an approximation signal is invariant to watermark addition for classifying order avoid over/underflows. The method has been tested on different sets medical images some usual natural test as Lena. Experimental result analysis conducted with...
A security policy of an information system is a set requirements that correspond to permissions, prohibitions and obligations execute some actions when contextual conditions are satisfied. Traditional approaches consider the enforces its associated if only executed in this permitted by (if closed) or not prohibited open) every obligatory actually (no violation obligations). In paper, we investigate more sophisticated approach which specification compliant with even though may be violated....
Several reversible watermarking schemes have been proposed for images of sensitive content, like medical imaging, which any modification may affect their interpretation. In this work, we distinguish these methods according to the way watermark insertion is conducted: additive and substitutive. Some approaches tested on different sets issued from three distinct modalities: magnetic resonance images, positron emission tomography ultrasound imaging. Comparison analysis has conducted with...
Privacy is among the key challenges to data integration in many sectors, including healthcare, e-government, etc. The PAIRSE project aims at providing a flexible, looselycoupled and privacy-preserving system P2P environments. exploits recent Web standards technologies such asWeb services ontologies export from autonomous providers as reusable services, proposes use of service composition viable solution answer needs on fly. proposed new algorithms service/composition execution models that...
Cyber Security data analysis is an important growing domain: more and visualization systems are offered to operators in order improve their threat detection performances or facilitate suspect behaviors characterization. As today trend regroup employees structures such as Operations Center (SOC) Computer Emergency Response Team (CERT), collaborative approach seems be relevant this context. We think that 3D Collaborative Virtual Environments (3DCVE) can used users Situational Awareness, they...