Peer-reviewed journal articles indexed in international databases

  1. Thanh Hai Thai, Rémi Cogranne, Florent Retraint, Thi-Ngoc-Canh Doan,
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics.
    IEEE Transactions on Information Forensics and Security 12(1), 123 – 133.
    IEEE, 2017.
  2. Tong Qiao, Florent Retraint, Rémi Cogranne, Thanh Hai Thai,
    Individual Camera Device Identification from JPEG Images.
    Signal Processing: Image Communication 52(3), 74 – 86.
    Elsevier, 2017.
  3. Vahid Sedighi, Rémi Cogranne, Jessica Fridrich,
    Content-Adaptive Steganography by Minimizing Statistical Detectability.
    IEEE transactions on Information Forensics and Security 11(2), 221 – 234.
    IEEE, 2016.
  4. Thanh Hai Thai, Florent Retraint, Rémi Cogranne,
    Camera Model Identification Based on the Generalized Noise Model in Natural Images.
    Digital Signal Processing 48(1), 285 – 297.
    Elsevier, 2016.
  5. Karina Sokolova, Chales Perez, Marc Lemercier,
    Android Application Classification and Anomaly Detection with Graph-based Permission Patterns.
    Decision Support Systems Journal, Elsevier, under minor revision.
    2016.
  6. Tong Qiao, Florent Retraint, Rémi Cogranne, Cathel Zitzmann,
    Steganalysis of JSteg Algorithm Using Hypothesis Testing Theory.
    Eurasip Journal on Information Security 2015, 1–16.
    EURASIP, 2015.
  7. Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Jeroen Famaey, Petr Velan, Pavel Celeda,
    Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services.
    J. of Network and System Management 23(3), 794–802.
    Springer, 2015.
  8. Charles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul Watters,
    REPLOT : Retrieving Profile Links On Twitter for malicious campaign discovery.
    IA Communications (parue le 20/01/2015).
    2015.
  9. Rémi Cogranne, Jessica Fridrich,
    Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory.
    IEEE Transactions on Information Forensics and Security 10(12), 2627–2642.
    IEEE, 2015.
  10. Thanh Hai Thai, Florent Retraint, Rémi Cogranne,
    Generalized Signal-Dependent Noise Model and Parameter Estimation for Natural Images.
    Elsevier Signal Porcessing 114, 164–170.
    Elsevier, 2015.
  11. Thanh Hai Thai, Florent Retraint, Rémi Cogranne,
    Camera Model Identification Based on DCT Coefficient Statistics.
    Digital Signal Processing 40(5), 88 – 100.
    Elsevier, 2015.
  12. Karina Sokolova, Marc Lemercier, Ludovic Garcia,
    Towards High Quality Mobile Applications: Android Passive MVC architecture.
    International Journal On Advances in Software v7(n°1&2), 123–138.
    IARIA, 2014.
  13. Thanh Hai Thai, Rémi Cogranne, Florent Retraint,
    Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm.
    Image Processing, IEEE Transactions on 23(5), 1980–1993.
    IEEE, 2014.
  14. Rémi Cogranne, Florent Retraint,
    Statistical detection of defects in radiographic images using an adaptive parametric model.
    Signal Processing 96, Part B, 173 – 189.
    Elsevier, 2014.
  15. Thanh Hai Thai, Florent Retraint, Rémi Cogranne,
    Statistical detection of data hidden in least significant bits of clipped images.
    Signal Processing 98, 263 – 274.
    Elsevier, 2014.
  16. Karina Sokolova, Marc Lemercier, Jean-Baptiste Boisseau,
    Respecting user privacy in mobiles: privacy by design permission system for mobile applications.
    in International Journal On Advances in Security 7(3&4), 110 – 120.
    IARIA, 2014.
  17. Guillaume Doyen, Martin Waldburger, Anna Sperotto, Pavel Celeda, Jean-Luis Gorricho, Thomas Schaaf, Joan Serrat,
    Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet.
    Journal of Network and Systems Management 22(2), 289–296.
    Springer, 2014.
  18. Rémi Cogranne, Florent Retraint, Cathel Zitzmann, Igor Nikiforov, Lionel Fillatre, Philippe Cornu,
    Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results.
    Digital Signal Processing 24, 144 – 161.
    Elsevier, 2014.
  19. Thanh Hai Thai, Rémi Cogranne, Florent Retraint,
    Camera Model Identification Based on the Heteroscedastic Noise Model.
    Image Processing, IEEE Transactions on 23(1), 250–263.
    IEEE, 2014.
  20. Rémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor Nikiforov, Philippe Cornu, Lionel Fillatre,
    A Local Adaptive Model of Natural Images for Almost Optimal Detection of Hidden Data.
    Signal Processing 100, 169–185.
    Elsevier, 2014.
  21. Patrick Lallement,
    The cybercrime process: an overview of scientific challenges and methods.
    International Journal of Advanced Computer Science and Applications (IJACSA) 4(12), 72–78.
    THESAI, 2013.
  22. Rémi Cogranne, Florent Retraint,
    Application of Hypothesis Testing Theory for Optimal Detection of LSB Matching Data Hiding.
    Signal Processing 93(7), 1724–1737.
    Elsevier, 2013.
  23. Rémi Cogranne, Florent Retraint,
    An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection.
    IEEE Transactions on Information Forensics and Security 8(3), 464–476.
    IEEE, 2013.
  24. Charles Perez, Babiga Birregah, Marc Lemercier,
    A smartphone-based online social network trust evaluation system.
    Social Network Analysis and Mining Volume 3, Issue 4, 1293–1310.
    Springer, 2013.
  25. Thibault Cholez, Isabelle Chrisment, Olivier Festor, Guillaume Doyen,
    Detection and mitigation of localized attacks in a widely deployed P2P network.
    Springer Peer-to-Peer Networking and Applications 6(2), 20.
    Springer, 2012.

Unindexed peer-reviewed journal articles

  1. Van Long Do, Lionel Fillatre, Igor Nikiforov,
    Sequential detection of transient changes in stochastic - dynamical systems.
    Journal de la Société Française de Statistique 156(4), 60–97.
    Société Française de Statistique, 2015.

Patents

  1. Rémi Cogranne, Florent Retraint, Thanh Hai Thai,
    Système d'identification d'un modèle d'appareil photographique associé à une image compressée au format JPEG, procédé, utilisations et applications associés.
    Publication WO/2015/145091 Application PCT/2015/FR/050806.
    2015.
  2. Rémi Cogranne, Florent Retraint, Thanh Hai Thai,
    Système d'identification d'un modèle d'appareil photographique associé à une image compressée au format jpeg et procede mise en oeuvre dans un tel systeme, utilisations et applications associes.
    Publication WO/2015/145092 Application PCT/2015/FR/050807.
    2015.
  3. Aurélien Bénel, Christine Aubrat,
    Système collaboratif assurant l’archivage, la traçabilité et la valeur probatoire des données d’une organisation, WO2015036698/FR3010560.
    Institut National de la Propriété Industrielle, 2015.
  4. Aurélien Bénel,
    Dispositif de contrôle visuel permettant la vérification de signatures électroniques, et utilisation associée, WO2014207399/FR3007866.
    Institut National de la Propriété Industrielle, 2014.
  5. Rémi Cogranne, Florent Retraint,
    Système pour déterminer l'identification d'un appareil photographique à partir d'une photographie et procédé mis en oeuvre dans un tel système.
    Publication WO/2013/135977 EP2825995(Application PCT/2012/FR/52357).
    2012.

Proceedings articles indexed in international databases

  1. Rémi Cogranne, Vahid Sedighi, Jessica Fridrich,
    Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis.
    Proceedings of IEEE Intl' Conference on Acoustics, Speech and Signal Processing (ICASSP 2017), TBA.
    IEEE, 2017.
  2. Ngoc Tan Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez, Rémi Cogranne,
    Content Poisoning in Named Data Networking: Comprehensive Characterization of real Deployment.
    Proceedings of IEEE/IFIP International Symposium on Integrated Network Management (IM 2017), TBA.
    IEEE/IFIP, 2017.
  3. Nisrine Ghadban, Rémi Cogranne, Guillaume Doyen,
    A Decentralized Approach for Adaptive Workload Estimation in Virtualized Environments.
    IEEE/IFIP International Symposium on Integrated Network Management (IM 2017), 1 – 9.
    IEEE/IFIP, 2017.
  4. Vahid Sedighi, Jessica Fridrich, Rémi Cogranne,
    Toss that BOSSbase, Alice!.
    in IS&T/SPIE Electronic Imaging (Media Watermarking, Security, and Forensics), 1–9.
    SPIE, Electronic Imaging, 2016.
  5. Hoang Long Mai, Ngoc Tan Nguyen, Guillaume Doyen, Alain Ploix, Remi Cogranne,
    On the Readiness of NDN for a Secure Deployment: the case of Pending Interest Table.
    Autonomous Infrastructure, Management and Security (AIMS 2016), 98–110.
    LNCS, 2016.
  6. Pascal Salembier, Moustafa Zouinar, Christophe Mathias, Guirec Lorant, Jean-Philippe Wary,
    Etudes expérimentales d’un système d’authentification graphique basée sur la catégorisation sémantique.
    Actes de la conférence IHM'2016, 26-28 octobre, Fribourg, Suisse.
    ACM, 2016.
  7. Tong Qiao, Florent Retraint, Rémi Cogranne,
    Source Camera Device Identification Based on Raw Images.
    Proc. of IEEE International conf. on Image Processing (ICIP), 1–5.
    IEEE, 2015.
  8. Van Long Do, Lionel Fillatre, Igor Nikiforov,
    Sequential monitoring of SCADA systems against cyber/physical attacks.
    9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS) 48(21), 746–753.
    IFAC, Elsevier, 2015.
  9. Van Long Do, Lionel Fillatre, Igor Nikiforov,
    Sensitivity analysis of the sequential test for detecting cyber-physical attacks.
    23rd European Signal Processing Conference (EUSIPCO), 2261–2265.
    IEEE, 2015.
  10. Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca,
    Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
    The First International Workshop on Security Testing And Monitoring – STAM in conjunction the 10th International Conference on Availability, Reliability and Security, 741–748.
    IEEE, 2015.
  11. Rémi Cogranne, Vahid Sedighi, Jessica Fridrich, Tomas Pevny,
    Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?.
    IEEE International Workshop on Information Forensics and Security (WIFS), 1–5.
    IEEE, 2015.
  12. Pascal Salembier, Moustafa Zouinar, Christophe Mathias, Guirec Lorant, Jean-Philippe Wary,
    Evaluation ergonomique d’un système d’authentification graphique.
    Actes de la conférence EPIQUE 2015, Aix-en-Provence, 8-10 juillet.
    Arpege Publishing, 2015.
  13. Ngoc Tan Nguyen, Rémi Cogranne, Guillaume Doyen, Florent Retraint,
    Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing.
    International Workshop on Information Forensics and Security (WIFS), 1–6.
    IEEE, 2015.
  14. Vahid Sedighi, Jessica Fridrich, Rémi Cogranne,
    Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model.
    Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 9409, 12.
    SPIE, 2015.
  15. Karina Sokolova, Charles Perez, Marc Lemercier,
    Android Permissions Usage: a First Step Towards Detecting Abusive Applications.
    The Seventh International Conferences on Pervasive Patterns and Applications (PATTERNS 2015) The Seventh International Conferences on Pervasive Patterns and Applications (PATTERNS 2015), Nice, France 22-27 mars 2015.
    2015.
  16. Ngoc Tan Nguyen, Rémi Cogranne, Guillaume Doyen,
    An Optimal Statistical Test for a Robust Detection of Interest Flooding Attacks in CCN.
    IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 252–260.
    IFIP / IEEE, 2015.
  17. Rémi Cogranne,
    A Sequential Method for Online Steganalysis.
    International Workshop on Information Forensics and Security (WIFS), 1–6.
    IEEE, 2015.
  18. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    A collaborative approach for a source based detection of botclouds.
    In proceedings of the 14th International IEEE/IFIP Symposium on Integrated Network and Service Management - IM 2015, 4p.
    IEEE, 2015.
  19. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    Understanding Botclouds from a System Perspective: a Principal Component Analysis.
    The IFIP/IEEE Network Operations and Management Symposium (NOMS 2014), 1–8.
    IEEE Communications Society, 2014.
  20. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    Toward a source detection of botclouds: a PCA-based approach.
    Proceedings of the 8th IFIP International Conference on Autonomous Infrastructure, Management and Security – AIMS’2014, 105–117.
    LNCS, 2014.
  21. Rémi Cogranne, Tomas Denemark, Jessica Fridrich,
    Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory.
    Proc. of IEEE International Workshop on Information Forensics and Security(WIFS), 1–5.
    IEEE, 2014.
  22. Tong Qiao, Cathel Zitzmann, Florent Retraint, Rémi Cogranne,
    Statistical Detection of Jsteg Steganography Using Hypothesis Testing Theory.
    Proc. of IEEE International Conference on Image Processing (ICIP), 1–5.
    IEEE, 2014.
  23. Tomáš Denemark, Vahid Sedighi, Vojtěch Holub, Rémi Cogranne, Jessica Fridrich,
    Selection-Channel-Aware Rich Model for Steganalysis of Digital Images.
    Proc. of IEEE International Workshop on Information Forensics and Security, 1–5.
    IEEE, 2014.
  24. Ali El Attar, Rida Khatoun, Babiga Birregah, Marc Lemercier,
    Robust Clustering Methods for Detecting Smartphone’s Abnormal Behavior.
    IEEE Wireless Communications and Networking Conference (WCNC), 6 avr. 2014 - 9 avr. 2014, Istanbul, Turkey..
    IEEE, 2014.
  25. Miroslav Goljan, Jessica Fridrich, Rémi Cogranne,
    Rich Model for Steganalysis of Color Images.
    Proc. of IEEE International Workshop on Information Forensics and Security, 1–5.
    IEEE, 2014.
  26. Omar Jaafor, Babiga Birregah, Charles Perez, Marc Lemercier,
    Privacy Threats from Social Networking Service Aggregators.
    5th Cybercrime and Trustworthy Computing Conference.
    IEEE Computer Society, 2014.
  27. Karina Sokolova, Marc Lemercier, Jean-Baptiste Boisseau,
    Privacy by Design Permission System for Mobile Applications.
    The Sixth International Conferences on Pervasive Patterns and Applications (PATTERNS 2014), 25 – 29 mai 2014, Venice, Italie, 89–95.
    2014.
  28. Thanh Hai Thai, Rémi Cogranne, Florent Retraint,
    Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coeficients.
    Proc. of IEEE International Workshop on Multimedia Signal Processing (MMSP), 1–6.
    IEEE, 2014.
  29. Thanh Hai Thai, Rémi Cogranne, Florent Retraint,
    Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients.
    Proc. of IEEE International Workshop on Information Forensics and Security(WIFS), 1–5.
    IEEE, 2014.
  30. Tong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint,
    Detection of JSteg Algorithm Using Hypothesis Testing Theory and a Statistical Model with Nuisance Parameters.
    Proc. of ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), 3–13.
    ACM, 2014.
  31. Ali El attar, Rida Khatoun, Marc Lemercier,
    Clustering-based Anomaly Detection for Smartphone Applications.
    the 6th IEEE/IFIP International Workshop on Management of the Future Internet, Krakow, Poland, May 5-9, 2014.
    IEEE, 2014.
  32. Ali El attar, Rida Khatoun, Marc Lemercier,
    Clustering-based Anomaly Detection for Smartphone Applications.
    6th IEEE/IFIP International Workshop on Management of the Future Internet.
    Krakow, Poland, May 5-9, 2014, 2014.
  33. Van Long Do, Lionel Fillatre, Igor Nikiforov,
    A statistical method for detecting cyber/physical attacks on SCADA systems.
    Proceedings of the 2014 IEEE Multi-Conference on Systems and Control, 1–6.
    IEEE, 2014.
  34. Badis Hammi, Rida Khatoun, Guillaume Doyen,
    A factorial space for a system-based detection of botcloud activity.
    The sixth IFIP International Conference on New Technologies, Mobility and Security - NTMS'14, 1–5.
    2014.
  35. Thanh Hai Thai, Rémi Cogranne, Florent Retraint,
    Steganalysis of Jsteg Algorithm Based on a Novel Statistical Model of Quantized DCT Coefficients.
    IEEE International Conference on Image Processing (ICIP), Melbourne, September 2013, 4427 – 4431.
    IEEE, 2013.
  36. Charles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul Watters,
    REPLOT: REtrieving Profile Links On Twitter for suspicious networks detection.
    Proceedings of the 2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 8 p.
    IEEE, 2013.
  37. Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Craver Scott, Tomàs Filler, Jessica Fridrich, Tomàs Pevny,
    Moving Steganography and Steganalysis from the Laboratory into the Real World.
    ACM Information Hiding and Multimedia Security Workshop, Montpellier, June 2013, 45–58.
    ACM, 2013.
  38. Robert Layton, Charles Perez, Babiga Birregah, Paul Watters, Marc Lemercier,
    Indirect information linkage for OSINT through authorship analysis of aliases.
    The International Workshop on Data Mining Applications in Industry & Government (DMApps 2013), 12 p.
    2013.
  39. Tong Qiao, Rémi Cogranne, Florent Retraint,
    Image Authentication by Statistical Analysis.
    Signal Processing Conference (EUSIPCO), 2013 Proceedings of the 21th European, 5.
    IEEE, EURASIP, 2013.
  40. Charles Perez, Babiga Birregah, Marc Lemercier,
    Familiar Strangers detection in online social networks.
    Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 1175–1182.
    2013.
  41. Ali El Attar, Rida Khatoun, Marc Lemercier,
    Diagnosing Smartphone's Abnormal Behavior through Robust Outlier Detection Methods.
    The 4th Global Information Infrastructure and Networking Symposium (GIIS 2013), Trento Italy , 28-31 October 2013, 3p.
    2013.
  42. Rémi Cogranne, Thanh Hai Thai, Florent Retraint,
    Asymptotically Optimal Detection of LSB Matching Data Hiding.
    IEEE International Conference on Image Processing (ICIP), Melbourne, September 2013, 4437 – 4441.
    IEEE, 2013.
  43. Karina Sokolova, Marc Lemercier, Ludovic Garcia,
    Android Passive MVC: a novel architecture model for the Android application development.
    The Fifth International Conferences on Pervasive Patterns and Applications (PATTERNS 2013), May 27 - June 1, 2013 - Valencia, Spain, 7–12.
    2013.
  44. Juliette Dromard, Lyes Khoukhi, Rida Khatoun,
    An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013, 75–81.
    IEEE Computer Society, 2013.
  45. Juliette Dromard, Rida Khatoun, Lyes Khoukhi,
    A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network.
    20th International Conference on Telecommunications (ICT), 6-8 May 2013, Casablanca, 2013, 1–5.
    2013.
  46. Rémi Cogranne, Florent Retraint,
    A New Tomography Model for Almost Optimal Detection of Anomalies.
    IEEE International Conference on Image Processing (ICIP), Melbourne, September 2013, 1461 – 1465.
    IEEE, 2013.
  47. Charles Perez, Marc Lemercier, Babiga Birregah,
    A dynamic approach to detecting suspicious profiles on social platforms.
    IEEE International Conference on Communications (ICC), Budapest, June 2013, 5.
    2013.
  48. Charles Perez, Babiga Birregah, Marc Lemercier,
    The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices.
    Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 813–819.
    IEEE, 2012.
  49. Rémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu,
    Statistical Detection of LSB Matching Using Hypothesis Testing Theory.
    Information Hiding, Berkeley, May 2012, 46–62.
    LNCS, 2012.
  50. Charles Perez, Marc Lemercier, Babiga Birregah, Alain Corpel,
    SPOT 1.0: Scoring Suspicious Profiles on Twitter.
    Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 377–381.
    IEEE, 2011.
  51. Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor,
    Content pollution quantification in large P2P networks : A measurement study on KAD.
    11th IEEE International Conference on Peer-to-Peer Computing 2011, short paper, 31 August-2 September 2011, Kyoto, Japan., 30–33.
    2011.
  52. Thibault Cholez, Christophe Henard, Isabelle Chrisment, Olivier Festor, Guillaume Doyen, Rida Khatoun,
    A First Approach to Detect Suspicious Peers in the KAD P2P Network.
    Conference on Network and Information Systems Security (SAR-SSI), 18-21 Mai 2011, La Rochelle - France, 1–8.
    IEEE Conference Publications, 2011.
  53. Charles Perez, Babiga Birregah, Patrick Laclémence, Eric Châtelet,
    A combined approach for suspicious networks detection in graphs.
    VSST'2010, VEILLE STRATÉGIQUE SCIENTIFIQUE ET TECHNOLOGIQUE, TOULOUSE, Octobre 2010, 12.
    2010.

Unindexed proceedings articles

  1. Van Long Do, Lionel Fillatre, Igor Nikiforov,
    Two sub-optimal algorithms for detecting cyber/physical attacks on SCADA systems.
    Proceedings of the X International Conference “System Identification and Control Problems”, SICPRO’15, 1144–1156.
    2015.
  2. Karina Sokolova, Charles Perez, Marc Lemercier,
    Android Permissions Usage: a First Step Towards Detecting Abusive Applications..
    Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information (RESSI 2015).
    2015.
  3. Vincent Lemoine, Charles Perez, Marc Lemercier, Pierre Vitard, Virginie Bensoussan, Alain Corpel, Rida Khatoun, Babiga Birregah,
    Protection of IT infrastructures against cyber crime.
    Interdisciplinary Workshop on Global Security (WISG 2013), 22-23 January 2013, Troyes.
    2013.

Conference talks with no proceedings

  1. Charles Perez, Babiga Birregah, Marc Lemercier, Alain Corpel, Patrick Laclémence, Eric Châtelet,
    A new framework to define Familiar Strangers in online social networks: spacio-temporal challenges.
    Spatio-Temporal Constraints on Social Networks, Santa Barbara, December 2010, 2.
    2010.

Conference posters

  1. Lorraine Tosi, Aurélien Bénel, Karine Lan Hing Ting,
    Digital signature services for users, Improving user experience to support trust among work partners.
    11th Symposium on Usable Privacy and Security (SOUPS), Ottawa, July 22-24, 2015.
    2015.
  2. Lorraine Tosi, Aurélien Bénel, François Devoret,
    Améliorer l’expérience utilisateur pour encourager la confiance entre collaborateurs.
    27ème Conférence Francophone sur l’interaction Homme-Machine (IHM), Toulouse, 27-30 octobre 2015.
    2015.
  3. Badis Hammi, Rida Khatoun, Guillaume Doyen,
    Caractérisation des attaques DDoS générées par un Botcloud.
    8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), Mont de Marsan - Landes, France, 16-18 septembre 2013.
    2013.
  4. Thibault Cholez, Guillaume Montassier, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor,
    Détection d'attaques dans les réseaux pair à pair.
    4ème Workshop du Groupement d'Intérêt Scientifique «Surveillance, Sûreté, Sécurité des Grands Systèmes» (GIS-3SGS'11), 12-13 Octobre 2011, Valenciennes.
    2011.

Scientific books (or chapters)

  1. Thibault Cholez, Guillaume Doyen, Isabelle Chrisment, Rida Khatoun, Olivier Festor,
    Faiblesses de l'identification dans les espaces numériques ouverts de partage de contenus : le cas des réseaux pair à pair.
    Enseignement, préservation et diffusion des identités numériques.
    Hermes-Lavoisier, 2014.

Books or journal issues directions

  1. Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller,
    Monitoring and Securing Virtualized Networks and Services.
    Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014.
    Springer, LNCS 7943, 2014.
  2. Guillaume Doyen, Martin Waldburger, Pavel Celeda, Anna Sperotto, Burkhard Stiller,
    Emerging Management Mechanisms for the Future Internet.
    7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013.
    Springer, 2013.

PhD theses

  1. Tong Qiao,
    Statistical Detection for Digital Image Forensics.
    Troyes University of Technology, 2016.
  2. Karina Sokolova,
    Bridging the Gap between Privacy by Design and Mobile System by Patterns.
    2016.
  3. Thanh Hai Thai,
    Statistical Modeling and Detection for Digital Image Forensics.
    Troyes University of Technology, 2014.
  4. Rémi Cogranne,
    Détection statistique d'informations cachées dans une image naturelle à partir d'un modèle physique..
    Université de technologie de Troyes, 2011.

Other productions

  1. Karina Sokolova,
    Sécurité des applications mobiles et protection des données personnelles.
    Alpix IT Days. 18 Juin 2015.
    2015.
  2. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    3ème rapport d'avancement du projet CPER CyNIC, janvier 2014.
    2014.
  3. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    Second rapport d'avancement du projet CPER CyNIC, janvier 2013.
    2013.
  4. Marc Lemercier,
    Projet GIS 3SGS CyS (Cybercrimalité et Smartphone).
    Présentation dans le cadre de la journée de communication des projets du GIS 3SGS, Sénat, 4 avril 2012.
    2012.
  5. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    1er rapport d'avancement du projet CPER CyNIC, janvier 2012.
    2012.
  6. Marc Lemercier,
    Intelligence économique et sécurité informatique.
    Présentation des projets de recherche de l'UTT au printemps de l'entreprise, Vannes, 25 mars 2011.
    2011.