default search action
Jean-Philippe Wary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Krzysztof Bocianiak, Tomasz Pawlikowski, Aleksandra Podlasek, Jean-Philippe Wary, Jacek Wierzbowski:
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum. IEEE Access 12: 152097-152107 (2024) - [j8]Elie Cali, Alexander Hinsen, Benedikt Jahnel, Jean-Philippe Wary:
Chase-escape in dynamic device-to-device networks. J. Appl. Probab. 61(1): 311-339 (2024) - [j7]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Krzysztof Bocianiak, Tomasz Pawlikowski, Aleksandra Podlasek, Jean-Philippe Wary:
Keeping Verticals' Sovereignty During Application Migration in Continuum. J. Netw. Syst. Manag. 32(4): 67 (2024) - [c21]Yannick Carlinet, Nancy Perrot, Laurent Valeyre, Jean-Philippe Wary, Krzysztof Bocianiak, Wojciech Niewolski, Aleksandra Podlasek:
Latency-Sensitive Service Chaining with Isolation Constraints. MECC@EuroSys 2024 - 2023
- [j6]Elie Cali, Alexander Hinsen, Benedikt Jahnel, Jean-Philippe Wary:
Connectivity in Mobile Device-to-Device Networks in Urban Environments. IEEE Trans. Inf. Theory 69(11): 7132-7148 (2023) - [c20]Yacine Anser, Chrystel Gaber, Romain Cajeat, Jean-Philippe Wary, Samia Bouzefrane, Méziane Yacoub, Onur Kalinagac, Gürkan Gür:
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices. MobiCom 2023: 115:1-115:3 - [c19]Chrystel Gaber, Gilles Macario-Rat, Simona David, Jean-Philippe Wary, Alain Cuaboz:
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy. MSPN 2023: 71-74 - 2022
- [c18]Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür:
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. ARES 2022: 68:1-68:7 - [c17]Rafal Artych, Krzysztof Bocianiak, Yannick Carlinet, Wojciech Niewolski, Nancy Perrot, Aleksandra Podlasek, Jean-Philippe Wary:
Security Constraints for Placement of Latency Sensitive 5G MEC Applications. FiCloud 2022: 40-45 - [c16]Yacine Anser, Chrystel Gaber, Jean-Philippe Wary, Sara Nieves Matheu-García, Samia Bouzefrane:
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. NetSoft 2022: 321-329 - 2021
- [j5]Tomasz Wojciech Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
Verticals in 5G MEC-Use Cases and Security Challenges. IEEE Access 9: 87251-87298 (2021) - 2020
- [c15]Chrystel Gaber, José Manuel Sánchez-Vílchez, Gürkan Gür, Morgan Chopin, Nancy Perrot, Jean-Luc Grimault, Jean-Philippe Wary:
Liability-Aware Security Management for 5G. 5G World Forum 2020: 133-138 - [c14]Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. ARES 2020: 105:1-105:10 - [c13]Alexander Hinsen, Benedikt Jahnel, Elie Cali, Jean-Philippe Wary:
Malware propagation in urban D2D networks. WiOpt 2020: 352-360 - [i1]Alexander Hinsen, Benedikt Jahnel, Elie Cali, Jean-Philippe Wary:
Malware propagation in urban D2D networks. CoRR abs/2002.06248 (2020)
2010 – 2019
- 2018
- [j4]Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Håkan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Näslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean-Philippe Wary, Alexander Zahariev:
A Security Architecture for 5G Networks. IEEE Access 6: 22466-22479 (2018) - [j3]Nizar Kheir, Ali Ridha Mahjoub, Mohamed Yassine Naghmouchi, Nancy Perrot, Jean-Philippe Wary:
Assessing the risk of complex ICT systems. Ann. des Télécommunications 73(1-2): 95-109 (2018) - [j2]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018: 2 (2018) - [c12]Mahieddine Yaker, Chrystel Gaber, Gilles Grimaud, Jean-Philippe Wary, Julien Cartigny, Xiao Han, Vicente Sanchez-Leighton:
Ensuring IoT Security with an Architecture Based on a Separation Kernel. FiCloud 2018: 120-127 - 2017
- [j1]Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, Jean-Philippe Wary:
Diet-ESP: IP layer security for IoT. J. Comput. Secur. 25(2): 173-203 (2017) - [c11]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. FedCSIS 2017: 783-792 - [c10]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System. ICDCS Workshops 2017: 105-112 - [c9]Ghada Arfaoui, José Manuel Sánchez-Vílchez, Jean-Philippe Wary:
Security and Resilience in 5G: Current Challenges and Future Directions. TrustCom/BigDataSE/ICESS 2017: 1010-1015 - 2016
- [c8]Mohamed Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary:
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems. MIST@CCS 2016: 97-100 - [c7]Pascal Salembier, Moustafa Zouinar, Robin Héron, Christophe Mathias, Guirec Lorant, Jean-Philippe Wary:
Experimental studies of a graphical authentication system based on semantic categorisation. IHM 2016: 134-143 - [c6]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A new approach to investigate IoT threats based on a four layer model. NOTERE 2016: 1-6 - 2015
- [c5]Christophe Bacara, Valentin Lefils, Julien Iguchi-Cartigny, Gilles Grimaud, Jean-Philippe Wary:
Virtual Keyboard Logging Counter-Measures Using Human Vision Properties. HPCC/CSS/ICESS 2015: 1230-1235 - [c4]Daniel Migault, Daniel Palomares, Tobias Guggemos, Aurélien Wailly, Maryline Laurent, Jean-Philippe Wary:
Recommendations for IPsec Configuration on Homenet and M2M Devices. Q2SWinet@MSWiM 2015: 9-17 - [c3]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
Internet of Things: A Definition & Taxonomy. NGMAST 2015: 72-77 - 2013
- [c2]Marc Lacoste, Aurélien Wailly, Aymeric Tabourin, Loic Habermacher, Xavier Le Guillou, Jean-Philippe Wary:
Flying over Mobile Clouds with Security Planes: Select Your Class of SLA for End-to-End Security. UCC 2013: 50-59 - 2011
- [c1]Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary:
Evaluation of the Ability to Transform SIM Applications into Hostile Applications. CARDIS 2011: 1-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint