


default search action
Chrystel Gaber
Person information
- affiliation: University of Caen Normandy, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Nicolas Dejon
, Chrystel Gaber
, Gilles Grimaud
, Narjes Jomaa
:
Code to Qed, the Project Manager's Guide to Proof Engineering. ACM Trans. Softw. Eng. Methodol. 33(7): 171:1-171:50 (2024) - 2023
- [c23]Onur Kalinagac, Wissem Soussi, Yacine Anser, Chrystel Gaber, Gürkan Gür
:
Root Cause and Liability Analysis in the Microservices Architecture for Edge IoT Services. ICC 2023: 3277-3283 - [c22]Yacine Anser
, Chrystel Gaber
, Romain Cajeat
, Jean-Philippe Wary
, Samia Bouzefrane
, Méziane Yacoub
, Onur Kalinagac
, Gürkan Gür
:
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices. MobiCom 2023: 115:1-115:3 - [c21]Chrystel Gaber, Gilles Macario-Rat, Simona David, Jean-Philippe Wary, Alain Cuaboz:
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy. MSPN 2023: 71-74 - [i1]Nicolas Dejon, Chrystel Gaber, Gilles Grimaud:
From MMU to MPU: adaptation of the Pip kernel to constrained devices. CoRR abs/2301.04546 (2023) - 2022
- [c20]Chrystel Gaber
, Yacine Anser:
Modeling the accountability and liability aspects of a 5G multi-domain on-demand security services: an unexpected journey. 6GNet 2022: 1-4 - [c19]Chrystel Gaber
, Pierrick Kaluza:
eSIM Adoption : Essential Challenges On Responsibilities Repartition. 6GNet 2022: 1-4 - [c18]Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür
:
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. ARES 2022: 68:1-68:7 - [c17]Yacine Anser, Chrystel Gaber
, Jean-Philippe Wary, Sara Nieves Matheu-García
, Samia Bouzefrane:
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. NetSoft 2022: 321-329 - 2021
- [c16]Nicolas Dejon, Chrystel Gaber, Gilles Grimaud:
Nested compartmentalisation for constrained devices. FiCloud 2021: 334-341 - [c15]Yacine Anser, Jean-Luc Grimault, Samia Bouzefrane, Chrystel Gaber:
Energy-Aware Service Level Agreements in 5G NFV architecture. FiCloud 2021: 377-382 - [c14]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
A semantic approach for comparing Fog Service Placement Problems. IM 2021: 682-686 - 2020
- [j1]Tanguy Godquin, Morgan Barbier, Chrystel Gaber
, Jean-Luc Grimault, Jean-Marie Le Bars:
Applied graph theory to security: A qualitative placement of security solutions within IoT networks. J. Inf. Secur. Appl. 55: 102640 (2020) - [c13]Chrystel Gaber, José Manuel Sánchez-Vílchez, Gürkan Gür
, Morgan Chopin, Nancy Perrot, Jean-Luc Grimault, Jean-Philippe Wary:
Liability-Aware Security Management for 5G. 5G World Forum 2020: 133-138 - [c12]Jordi Ortiz
, Ramon Sanchez-Iborra, Jorge Bernal Bernabé
, Antonio F. Skarmeta, Chafika Benzaid
, Tarik Taleb, Pol Alemany, Raul Muñoz
, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou
, George Xilouris
, Edgardo Montes de Oca, Gürkan Gür
, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. ARES 2020: 105:1-105:10
2010 – 2019
- 2019
- [c11]Tanguy Godquin, Morgan Barbier, Chrystel Gaber
, Jean-Luc Grimault, Jean-Marie Le Bars:
Placement optimization of IoT security solutions for edge computing based on graph theory. IPCCC 2019: 1-7 - 2018
- [c10]Mahieddine Yaker, Chrystel Gaber
, Gilles Grimaud, Jean-Philippe Wary, Julien Cartigny, Xiao Han, Vicente Sanchez-Leighton:
Ensuring IoT Security with an Architecture Based on a Separation Kernel. FiCloud 2018: 120-127 - 2014
- [c9]Maria Zhdanova
, Jürgen Repp, Roland Rieke
, Chrystel Gaber
, Baptiste Hemery:
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers. ARES 2014: 11-20 - [c8]Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber:
Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste. Sicherheit 2014: 271-282 - 2013
- [b1]Chrystel Gaber:
Sécurisation d'un système de transactions sur terminaux mobiles. (Securing a mobile-based transaction system). University of Caen Normandy, France, 2013 - [c7]Roland Rieke
, Maria Zhdanova
, Jürgen Repp, Romain Giot, Chrystel Gaber:
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. ARES 2013: 662-669 - [c6]Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien
:
Synthetic logs generator for fraud detection in mobile transfer services. CTS 2013: 174-179 - [c5]Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien
:
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. Financial Cryptography 2013: 397-398 - 2012
- [c4]Johann Vincent, Vincent Alimi, Aude Plateaux, Chrystel Gaber, Marc Pasquet:
A mobile payment evaluation based on a digital identity representation. CTS 2012: 410-418 - [c3]Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal:
Individual Countermeasure Selection Based on the Return On Response Investment Index. MMM-ACNS 2012: 156-170 - [c2]Roland Rieke, Luigi Coppolino
, Andrew Hutchison, Elsa Prieto, Chrystel Gaber:
Security and Reliability Requirements for Advanced Security Event Management. MMM-ACNS 2012: 171-180 - 2010
- [c1]Jean Claude Paillès, Chrystel Gaber, Vincent Alimi, Marc Pasquet:
Payment and privacy: A key for the development of NFC mobile. CTS 2010: 378-385
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint