itrust consulting » Publications
Publications

Publications

IEEE Transactions on Computers

"Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets"
Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon
IEEE Transactions on Computers PrePrint, no. 1, pp. 1, doi:10.1109/TC.2014.2375189

Links: Article

Lëtzebuerger Gemengen March 2015

"Un nouveau regard en matière d'analyse de risques",
Dr. Carlo Harpes,
10 march 2015, Lëtzebuerger Gemengen (LG) Hors-série ICT

Links: Article

MODELSWARD 2015

A Toolchain for Model-Based Design and Testing of Access Control Systems,
Said Daoudagh, Donia El Kateb, Francesca Lonetti, Eda Marchetti and Tejeddine Mouelhi,
9-11 February 2015, 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), Angers, France

Links: Article

Revue Technique Luxembourgeoise 2014

Cockpit CI: How to monitor cyberrisks on a critical infrastructure?
Dr. C. Harpes and Ing. M. Aubigny
Cahier scientifique biannuel de la Revue Technique Luxembourgeoise, Édition 2, 2014

Links: Article

The CockpitCI approach

Improving cyber-security awareness on Industrial Control Systems,
T. Cruz, J. Proença, P. Simões, M. Aubigny, M. Ouedraogo, A. Graziano and L. Yasakhetu,
3-4 July 2014, at Piraeus, Greece
In proceeding of: 13th European Conference on Information Warfare and Security ECCWS 2014

Links: Article

ICCGI 2014

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences.
G. Schaff, C. Harpes, M. Aubigny, M. Junger, and R. Martin,
June 22 - 26, 2014, Seville, Spain. In: The Ninth International Multi-Conference on Computing in the Global Information Technology (ICCGI), IARIA, ISBN 978-1-61208-346-9.

Links: Publication

CENTRIC 2013

An application to estimate the cyber-risk detection skill of mobile device users.
G. Schaff, C. Harpes, R. Martin, and M. Junger,
October 27 - November 1, 2013 - Venice, Italy.
The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services; IARIA conference; ISBN: 978-1-61208-306-3.

Links: Article on http://iaria.org

ERCIM NEWS online edition “intelligent cars”

Location Assurance and Privacy in GNSS Navigation.
X. Chen, C. Harpes, G. Lenzini, S. Mauw, and J. Pang,
July 2013.

Links: Article on http://ercim-news.ercim.eu

ACM Conference on Computer and Communications Security

Demonstrating a trust framework for evaluating GNSS signals integrity.
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, and J. Pang,
June 2013, In Proc. 20th ACM Conference on Computer and Communication Security (CCS), pages 1329-1332. ACM Press.

Links: Reference on http://uni.lu   Reference on http://researchgate.net

IEEE Security Fondations Symposium (CSF)

A trust framework for evaluating GNSS signals integrity.
X. Chen, G. Lenzini, M. Martins, S. Mauw, and J. Pang,
June 2013, In Proc. 26th IEEE Security Fondations Symposium (CSF), pages 179-192. IEEE Computer Society.

Links: Reference on http://uni.lu

Archive