| 2017 | Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay |
| 2016 | A First DFA on PRIDE: From Theory to Practice. Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey |
| 2016 | A Formal Verification of Safe Update Point Detection in Dynamic Software Updating. Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche, Jean-Louis Lanet |
| 2016 | A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. Rui Abreu, César Andrés, Ana R. Cavalli |
| 2016 | A Proactive Stateful Firewall for Software Defined Networking. Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens |
| 2016 | An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar |
| 2016 | Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams. Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah |
| 2016 | CLiKC: A Privacy-Mindful Approach When Sharing Data. Esma Aïmeur, Gilles Brassard, Jonathan Rioux |
| 2016 | Detecting Anomalous Behavior in DBMS Logs. Muhammad Imran Khan, Simon N. Foley |
| 2016 | Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study. Frédéric Mangano, Simon Duquennoy, Nikolai Kosmatov |
| 2016 | High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout |
| 2016 | Improving Side-Channel Attacks Against Pairing-Based Cryptography. Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin |
| 2016 | Online Link Disclosure Strategies for Social Networks. Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch |
| 2016 | Protocol Reverse Engineering: Challenges and Obfuscation. Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche |
| 2016 | Ransomware and the Legacy Crypto API. Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay |
| 2016 | SPTool - Equivalence Checker for SAND Attack Trees. Barbara Kordy, Piotr Kordy, Yoann van den Boom |
| 2016 | Towards Empirical Evaluation of Automated Risk Assessment Methods. Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci |
| 2016 | Towards the Weaving of the Characteristics of Good Security Requirements. Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri |