default search action
Jean Leneutre
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Hugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos:
A Model-based Approach for Assessing the Security of Cyber-Physical Systems. ARES 2024: 121:1-121:10 - [c45]Gabriel Ballot, Vadim Malvone, Jean Leneutre, Youssef Laarouchi:
Strategic Reasoning under Capacity-constrained Agents. AAMAS 2024: 123-131 - [c44]Davide Catta, Jean Leneutre, Vadim Malvone, Aniello Murano:
Obstruction Alternating-time Temporal Logic: A Strategic Logic to Reason about Dynamic Models. AAMAS 2024: 271-280 - [c43]Davide Catta, Jean Leneutre, Antonina Mijatovic, Johanna Ulin, Vadim Malvone:
A Formal Verification Approach to Handle Attack Graphs. ICAART (3) 2024: 125-132 - [c42]Jean Leneutre, Vadim Malvone, James Ortiz:
Reasoning about Real-Time and Probability on Obstruction Logic. AI4CC-IPS-RCRA-SPIRIT@AI*IA 2024 - [i3]Jean Leneutre, Vadim Malvone, James Ortiz:
Probabilistic Obstruction Temporal Logic: a Probabilistic Logic to Reason about Dynamic Models. CoRR abs/2411.00025 (2024) - 2023
- [j13]Davide Catta, Jean Leneutre, Vadim Malvone:
Attack Graphs & Subset Sabotage Games. Intelligenza Artificiale 17(1): 77-88 (2023) - [c41]Davide Catta, Jean Leneutre, Vadim Malvone:
Reasoning About Dynamic Game Models Using Obstruction Logic (short paper). IPS-RCRA-SPIRIT@AI*IA 2023 - [c40]Davide Catta, Jean Leneutre, Vadim Malvone:
Obstruction Logic: A Strategic Temporal Logic to Reason About Dynamic Game Models. ECAI 2023: 365-372 - [c39]Davide Catta, Antonio Di Stasio, Jean Leneutre, Vadim Malvone, Aniello Murano:
A Game Theoretic Approach to Attack Graphs. ICAART (1) 2023: 347-354 - [i2]Gabriel Ballot, Vadim Malvone, Jean Leneutre, Youssef Laarouchi:
Capacity ATL. CoRR abs/2308.11039 (2023) - 2022
- [c38]Davide Catta, Jean Leneutre, Vadim Malvone:
Towards a Formal Verification of Attack Graphs. IPS/RiCeRcA/SPIRIT@AI*IA 2022 - [c37]Gabriel Ballot, Vadim Malvone, Jean Leneutre, Etienne Borde:
Reasoning about Moving Target Defense in Attack Modeling Formalisms. MTD@CCS 2022: 55-65 - [c36]Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet:
Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation. ICSBT/SECRYPT (Revised Selected Papers) 2022: 122-155 - [c35]Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet:
Threats to Adversarial Training for IDSs and Mitigation. SECRYPT 2022: 226-236 - [c34]Davide Catta, Jean Leneutre, Vadim Malvone:
Subset sabotage games & attack graphs. WOA 2022: 209-218 - [i1]Gabriel Ballot, Vadim Malvone, Jean Leneutre, Etienne Borde:
Reasoning about Moving Target Defense in Attack Modeling Formalisms. CoRR abs/2206.14076 (2022) - 2021
- [j12]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Pascal Urien:
Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review. Sensors 21(24): 8415 (2021) - [j11]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien:
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey. Wirel. Commun. Mob. Comput. 2021: 8887472:1-8887472:30 (2021) - [c33]Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet:
Assessing adversarial training effect on IDSs and GANs. CSR 2021: 543-550 - [c32]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien:
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. NCA 2021: 1-10 - [c31]Maxime Ayrault, Etienne Borde, Ulrich Kühne, Jean Leneutre:
Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach. PRDC 2021: 27-36 - [e2]Joaquín García-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich:
Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12528, Springer 2021, ISBN 978-3-030-68886-8 [contents] - 2020
- [c30]Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, Jean Leneutre:
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. ICETE (2) 2020: 405-414 - [c29]Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. ICISSP 2020: 84-95 - [c28]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien:
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment. SecureComm (2) 2020: 419-438
2010 – 2019
- 2019
- [j10]Christophe Kiennert, Ziad Ismail, Hervé Debar, Jean Leneutre:
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. ACM Comput. Surv. 51(5): 90:1-90:31 (2019) - [c27]Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane:
Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT/EDI40 2019: 256-263 - 2018
- [c26]Ziad Ismail, Jean Leneutre, Alia Fourati:
Optimal Deployment of Security Policies: Application to Industrial Control Systems. EDCC 2018: 120-127 - [c25]Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre:
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things. M4IoT@Middleware 2018: 35-40 - [c24]Aïda Diop, Saïd Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré:
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 202-207 - 2017
- [c23]Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
A Game Theoretical Model for Optimal Distribution of Network Security Resources. GameSec 2017: 234-255 - 2016
- [j9]Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis. IEEE Trans. Inf. Forensics Secur. 11(8): 1685-1699 (2016) - [c22]Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. GameSec 2016: 159-171 - 2015
- [c21]Trung Nguyen, Jean Leneutre:
A secure and effective device pairing protocol. CCNC 2015: 507-512 - [c20]Ziad Ismail, Jean Leneutre, Alia Fourati:
An Attack Execution Model for Industrial Control Systems Security Assessment. CyberICS/WOS-CPS@ESORICS 2015: 157-167 - [c19]Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures. HASE 2015: 101-109 - 2014
- [j8]Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI. IEEE J. Sel. Areas Commun. 32(7): 1486-1499 (2014) - [c18]Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen:
Data Integrity and Availability Verification Game in Untrusted Cloud Storage. GameSec 2014: 287-306 - [c17]Trung Nguyen, Jean Leneutre:
Formal Analysis of Secure Device Pairing Protocols. NCA 2014: 291-295 - 2012
- [j7]Nouha Oualha, Jean Leneutre, Yves Roudier:
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols. Peer-to-Peer Netw. Appl. 5(3): 231-243 (2012) - 2011
- [j6]Lin Chen, Jean Leneutre:
Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput. Networks 55(9): 2259-2270 (2011) - [j5]Lin Chen, Lavy Libman, Jean Leneutre:
Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework. IEEE Trans. Parallel Distributed Syst. 22(5): 758-772 (2011) - [e1]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Ana R. Cavalli, Jean Leneutre:
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6514, Springer 2011, ISBN 978-3-642-19347-7 [contents] - 2010
- [c16]Ruan He, Marc Lacoste, Jean Leneutre:
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. CIT 2010: 851-858 - [c15]Ruan He, Marc Lacoste, Jacques Pulou, Jean Leneutre:
A DSL for Specifying Autonomic Security Management Strategies. DPM/SETOP 2010: 216-230 - [c14]Ruan He, Marc Lacoste, Jean Leneutre:
A Policy Management Framework for Self-Protection of Pervasive Systems. ICAS 2010: 104-109
2000 – 2009
- 2009
- [j4]Lin Chen, Jean Leneutre:
On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j3]Lin Chen, Jean Leneutre:
A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4(2): 165-178 (2009) - [c13]Mohamad Aljnidi, Jean Leneutre:
ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets). DPM/SETOP 2009: 163-177 - [c12]Lin Chen, Jean Leneutre:
Efficient medium access control design for autonomous wireless networks - A game theoretic approach. LCN 2009: 376-383 - [c11]Ruan He, Marc Lacoste, Jean Leneutre:
Brief Announcement: An OS Architecture for Device Self-protection. SSS 2009: 783-784 - 2008
- [j2]Lin Chen, Jean Leneutre:
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. IEEE J. Sel. Areas Commun. 26(7): 1128-1137 (2008) - 2007
- [j1]Lin Chen, Jean Leneutre:
Toward secure and scalable time synchronization in ad hoc networks. Comput. Commun. 30(11-12): 2453-2467 (2007) - [c10]Mohamad Aljnidi, Jean Leneutre:
Towards an Autonomic Security System for Mobile Ad Hoc Networks. IAS 2007: 29-32 - [c9]Mohamad Aljnidi, Jean Leneutre:
A security policy system for mobile autonomic networks. Autonomics 2007: 23 - [c8]Lin Chen, Jean Leneutre:
On the Power and Rate Control in IEEE 802.11 WLANs - A Game Theoretical Approach. ICCCN 2007: 450-456 - [c7]Lin Chen, Jean Leneutre:
Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks. ICDCS 2007: 16 - [c6]Lin Chen, Jean Leneutre:
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. ICNP 2007: 338-339 - 2006
- [c5]Mohamad Aljnidi, Jean Leneutre:
Autonomic Security for Home Networks. IWSOS/EuroNGI 2006: 239-242 - [c4]Lin Chen, Jean Leneutre:
A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks. ICPP Workshops 2006: 207-214 - [c3]Lin Chen, Jean Leneutre, Jean-Jacques Puig:
A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks. ICWMC 2006: 36 - [c2]Lin Chen, Xiaoyun Xue, Jean Leneutre:
A Lightweight Mechanism to Secure OLSR. IMECS 2006: 887-895 - 2004
- [c1]Xiaoyun Xue, Jean Leneutre, Jalel Ben-Othman:
A Trust-Based Routing Protocol for Ad Hoc Networks. MWCN 2004: 251-262
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint