Publications

Publications

IEEE Transactions on Computers

"Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets"
Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, et Yves Le Traon
IEEE Transactions on Computers PrePrint, no. 1, pp. 1, doi:10.1109/TC.2014.2375189

Liens : Article

Lëtzebuerger Gemengen Mars 2015

"Un nouveau regard en matière d'analyse de risques",
Dr. Carlo Harpes,
10 mars 2015, Lëtzebuerger Gemengen (LG) Hors-série ICT

Liens : Article

MODELSWARD 2015

A Toolchain for Model-Based Design and Testing of Access Control Systems,
Said Daoudagh, Donia El Kateb, Francesca Lonetti, Eda Marchetti et Tejeddine Mouelhi,
9-11 Février 2015, 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), Angers, France

Links: Article

Revue Technique Luxembourgeoise 2014

Cockpit CI: How to monitor cyberrisks on a critical infrastructure?
Dr. C. Harpes et Ing. M. Aubigny
Cahier scientifique biannuel de la Revue Technique Luxembourgeoise, Edition 2, 2014

Liens : Article

L’approche CockpitCI

Improving cyber-security awareness on Industrial Control Systems
T. Cruz, J. Proença, P. Simões, M. Aubigny, M. Ouedraogo, A. Graziano et L. Yasakhetu,
3-4 Juillet 2014, à Pirée, Grèce
En procédant de : 13th European Conference on Information Warfare and Security ECCWS 2014

Liens : Article

ICCGI 2014

RISK-DET : ICT Security Awareness Aspect Combining Education and Cognitive Sciences.
G. Schaff, C. Harpes, M. Aubigny, M. Junger, et R. Martin,
June 22 - 26, 2014, Seville, Spain. The Ninth International Multi-Conference on Computing in the Global Information Technology (ICCGI), IARIA, ISBN 978-1-61208-346-9.

Liens : Publication

CENTRIC 2013

An application to estimate the cyber-risk detection skill of mobile device users.
G. Schaff, C. Harpes, R. Martin, et M. Junger,
October 27 - November 1, 2013 - Venice, Italy.
The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services, IARIA conference, ISBN: 978-1-61208-306-3.

Liens : Article sur http://iaria.org

ERCIM News online edition “intelligent cars”

Location Assurance and Privacy in GNSS Navigation.
X. Chen, C. Harpes, G. Lenzini, S. Mauw, et J. Pang,
Juillet 2013.

Liens : Article sur http://ercim-news.ercim.eu

ACM Conference on Computer and Communication Security (CCS)

Demonstrating a trust framework for evaluating GNSS signal integrity.
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, et J. Pang,
Juin 2013, In Proc. 20th ACM Conference on Computer and Communications Securtiy (CCS), pages 1329-1332, ACM Press.

Liens : Référence sur http://uni.lu   Référence sur http://researchgate.net

IEEE Security Fondations Symposuim (CSF)

A trust Framework for evaluating GNSS signal integrity.
X. Chen, G. Lenzini, M. Martins, S. Mauw, et J. Pang,
Juin 2013, In Proc. 26th IEEE Security Foundations Symposuim (CSF), pages 179-192. IEEE Computer Society.

Liens : Référence sur http://uni.lu

Archive