default search action
Alexis Olivereau
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Hamdi Friji, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Edoardo Carnelli, Alexis Olivereau, Aftab Khan:
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study. CoRR abs/2404.18328 (2024) - 2023
- [c26]Hamdi Friji, Alexis Olivereau, Mireille Sarkiss:
Efficient Network Representation for GNN-Based Intrusion Detection. ACNS (1) 2023: 532-554 - [c25]Siwar Ben Hadj Said, Minh-Thuyen Thi, Mounir Kellil, Alexis Olivereau:
On the Management of TSN Networks in 6G: A Network Digital Twin Approach. ETFA 2023: 1-7 - [c24]Hamdi Friji, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Carnelli, Alexis Olivereau, Aftab Khan:
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study. TrustCom 2023: 620-627 - [i2]Hamdi Friji, Alexis Olivereau, Mireille Sarkiss:
Efficient Network Representation for GNN-based Intrusion Detection. CoRR abs/2310.05956 (2023) - 2021
- [i1]Maxime Labonne, Charalampos Chatzinakis, Alexis Olivereau:
Predicting Bandwidth Utilization on Network Links Using Machine Learning. CoRR abs/2112.02417 (2021) - 2020
- [c23]Maxime Labonne, Charalampos Chatzinakis, Alexis Olivereau:
Predicting Bandwidth Utilization on Network Links Using Machine Learning. EuCNC 2020: 242-247 - [c22]Maxime Labonne, Alexis Olivereau, Baptiste Polvé, Djamal Zeghlache:
Unsupervised Protocol-based Intrusion Detection for Real-world Networks. ICNC 2020: 299-303 - [c21]Clement Weill, Alexis Olivereau, Djamal Zeghlache:
Configuration of the Detection Function in a Distributed IDS Using Game Theory. ICIN 2020: 210-215
2010 – 2019
- 2019
- [c20]Maxime Labonne, Alexis Olivereau, Baptiste Polvé, Djamal Zeghlache:
A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection. CCNC 2019: 1-6 - [c19]Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things. IPCCC 2019: 1-9 - [c18]Younes Laaboudi, Alexis Olivereau, Nouha Oualha:
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks. NTMS 2019: 1-5 - [c17]Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network. PST 2019: 1-5 - 2018
- [c16]Michele Russo, Maxime Labonne, Alexis Olivereau, Mohammad Rmayti:
Anomaly Detection in Vehicle-to-Infrastructure Communications. VTC Spring 2018: 1-6 - 2017
- [c15]Aymen Boudguiga, Nabil Bouzerna, Louis Granboulan, Alexis Olivereau, Flavien Quesnel, Anthony Roger, Renaud Sirdey:
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain. EuroS&P Workshops 2017: 50-58 - 2016
- [j4]Yosra Ben Saied, Alexis Olivereau:
A Lightweight Threat Detection System for Industrial Wireless Sensor Networks. Int. J. Netw. Secur. 18(5): 842-854 (2016) - 2014
- [j3]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Networks 64: 273-295 (2014) - [j2]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. J. Netw. Comput. Appl. 45: 215-227 (2014) - 2013
- [j1]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput. Secur. 39: 351-365 (2013) - [c14]Yosra Ben Saied, Alexis Olivereau, Radhouene Azzabi:
COACH: A context aware and multi-service trust model for Cooperation management in heterogeneous wireless networks. IWCMC 2013: 911-918 - [c13]Mohammed Bahria, Alexis Olivereau, Aymen Boudguiga:
A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks. IWSOS 2013: 157-162 - [c12]Nouha Oualha, Alexis Olivereau, Aymen Boudguiga:
Pseudonymous communications in secure industrial wireless sensor networks. PST 2013: 98-102 - [c11]Aymen Boudguiga, Alexis Olivereau, Nouha Oualha:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. TrustCom/ISPA/IUCC 2013: 94-101 - 2012
- [c10]Yosra Ben Saied, Alexis Olivereau:
HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things. COMNET 2012: 1-8 - [c9]Nouha Oualha, Alexis Olivereau, Markus Wehner, Thomas Bartzsch, Dirk Burggraf, Sven Zeisberg, Laura-Cristina Gheorghe, Emil Slusanschi, Dan Tudose:
AAA-based infrastructure for industrial wireless sensor networks. Future Network & Mobile Summit 2012: 1-8 - [c8]Yosra Ben Saied, Alexis Olivereau:
(k, n) threshold distributed key exchange for HIP based internet of things. MOBIWAC 2012: 79-86 - [c7]Yosra Ben Saied, Alexis Olivereau, Maryline Laurent:
A Distributed Approach for Secure M2M Communications. NTMS 2012: 1-7 - [c6]Markus Wehner, Sven Zeisberg, Nouha Oualha, Alexis Olivereau, Mike Ludwig, Dan Tudose, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, David Bateman:
Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract). TrustBus 2012: 232-233 - [c5]Dennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati:
Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things. TrustCom 2012: 998-1003 - [c4]Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, Michele Rossi:
Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. WOWMOM 2012: 1-7 - [c3]Yosra Ben Saied, Alexis Olivereau:
D-HIP: A distributed key exchange scheme for HIP-based Internet of Things. WOWMOM 2012: 1-7 - 2011
- [c2]Markus Wehner, Sven Zeisberg, Alexis Olivereau, Nouha Oualha, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, Mike Ludwig, David Bateman:
A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project. SysSec@DIMVA 2011: 63-66 - [c1]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache:
Energy efficiency in M2M networks: A cooperative key establishment system. ICUMT 2011: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint