default search action
David Espes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, David Espes, Frédéric Le Roy, Jalil Boukhobza:
A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platforms. Future Gener. Comput. Syst. 162: 107473 (2025) - 2024
- [j6]Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems. J. Univers. Comput. Sci. 30(9): 1244-1264 (2024) - [c45]Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization. ARES 2024: 22:1-22:12 - [c44]Zaynab Baydoun, Roua Youssef, Emanuel Radoi, Stéphane Azou, Tina Yaacoub, David Espes:
Experimental Approach for IR-UWB Radar-Based People Detection in Industry 4.0 Environments. EUSIPCO 2024: 2042-2046 - [c43]Isadora Garcia Ferrão, Leandro Marcos da Silva, Daniel Bonilla, Catherine Dezan, David Espes, Kalinka Castelo Branco:
Detecting Spoofing and GPS Jamming in UAVs: Multiclass Approach to Attack Diagnosis. HICSS 2024: 538-547 - 2023
- [j5]Salwa Alem, David Espes, Laurent Nana, Eric Martin, Florent de Lamotte:
A novel bi-anomaly-based intrusion detection system approach for industry 4.0. Future Gener. Comput. Syst. 145: 267-283 (2023) - [c42]Dionysia Varvarigou, David Espes, Giacomo Bersano:
Ontology-based Solution for Handling Safety and Cybersecurity Interdependency in NFV Safety Architecture. ANT/EDI40 2023: 527-534 - [c41]Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, Frédéric Le Roy, David Espes, Jalil Boukhobza:
Characterizing Intrusion Detection Systems On Heterogeneous Embedded Platforms. DSD 2023: 278-285 - [c40]Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems. EICC 2023: 53-58 - [c39]Wassim Mohamed Laïd Koribeche, David Espes, Cédric Morin:
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls. FPS (1) 2023: 302-317 - [c38]Wassim Mohamed Laïd Koribeche, David Espes, Cédric Morin:
Security policy architecture for 5G Networks. NoF 2023: 37-41 - [c37]Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks. SAFE@CoNEXT 2023: 9-15 - 2022
- [j4]Meriem Kherbache, Kamal Amroun, David Espes:
A new wrapper feature selection model for anomaly-based intrusion detection systems. Int. J. Secur. Networks 17(2): 107-123 (2022) - [j3]Isadora Garcia Ferrão, David Espes, Catherine Dezan, Kalinka Regina Lucas Jaquie Castelo Branco:
Security and Safety Concerns in Air Taxis: A Systematic Literature Review. Sensors 22(18): 6875 (2022) - [c36]Semih Ince, David Espes, Guy Gogniat, Renaud Santoro, Julien Lallet:
Token-based authentication and access delegation for HW-accelerated telco cloud solution. CloudNet 2022: 109-117 - [c35]Manel Smine, David Espes, Marc-Oliver Pahl:
Optimal Access Control Deployment in Network Function Virtualization. NOMS 2022: 1-9 - 2021
- [c34]Shanay Behrad, David Espes, Philippe Bertin, Cao-Thanh Phan:
Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function. NetSoft 2021: 470-476 - [c33]Semih Ince, David Espes, Guy Gogniat, Julien Lallet, Renaud Santoro:
OAuth 2.0-based authentication solution for FPGA-enabled cloud computing. UCC Companion 2021: 13:1-13:6 - 2020
- [c32]Salwa Alem, David Espes, Eric Martin, Laurent Nana, Florent de Lamotte:
New Dataset for Industry 4.0 to Address the Change in Threat Landscape. CRiSIS 2020: 273-288 - [c31]Luis Carlos Suárez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc:
Managing Secure Inter-slice Communication in 5G Network Slice Chains. DBSec 2020: 24-41 - [c30]Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Network Functions Virtualization Access Control as a Service. DBSec 2020: 100-117 - [c29]Meriem Kherbache, David Espes, Kamal Amroun:
New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems. FPS 2020: 3-19 - [c28]Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens, Marc-Oliver Pahl:
A Priority-Based Domain Type Enforcement for Exception Management. FPS 2020: 65-81 - [c27]Isadora Garcia Ferrão, Daniel F. Pigatto, João V. C. Fontes, Natassya B. F. Silva, David Espes, Catherine Dezan, Kalinka R. L. J. C. Branco:
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack. ISCC 2020: 1-6 - [c26]Luis Carlos Suárez, David Espes, Frédéric Cuppens, Philippe Bertin, Cao-Thanh Phan, Philippe Le Parc:
Formalization of a security access control model for the 5G system. NOF 2020: 150-158
2010 – 2019
- 2019
- [c25]Khaoula Es-Salhi, David Espes, Nora Cuppens:
DTE Access Control Model for Integrated ICS Systems. ARES 2019: 79:1-79:9 - [c24]Salwa Alem, David Espes, Eric Martin, Laurent Nana, Florent de Lamotte:
A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard. AICCSA 2019: 1-8 - [c23]Luis Carlos Suárez, David Espes, Philippe Le Parc, Frédéric Cuppens:
Defining a communication service management function for 5G network slices. EuCNC 2019: 144-148 - 2018
- [c22]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. CRiSIS 2018: 35-40 - [c21]Khaoula Es-Salhi, David Espes, Nora Cuppens:
RIICS: Risk Based IICS Segmentation Method. CRiSIS 2018: 143-157 - [c20]Khaoula Es-Salhi, David Espes, Nora Cuppens:
SONICS: A Segmentation Method for Integrated ICS and Corporate System. ICISS 2018: 231-250 - 2017
- [c19]Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. DBSec 2017: 293-310 - [c18]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks. ICCNS 2017: 96-103 - [c17]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ICISS 2017: 387-404 - [c16]Khaoula Es-Salhi, David Espes, Nora Cuppens:
A New Segmentation Method for Integrated ICS (Short Paper). PST 2017: 87-94 - 2016
- [j2]Jean Vareille, David Espes, Yvon Autret, Philippe Le Parc:
Low-Cost High-Tech Robotics for Ambient Assisted Living: From Experiments to a Methodology. J. Intell. Syst. 25(4): 455-471 (2016) - [c15]Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. ARES 2016: 157-166 - [c14]Etienne Pardo, David Espes, Philippe Le Parc:
A Framework for Anomaly Diagnosis in Smart Homes Based on Ontology. ANT/SEIT 2016: 545-552 - [c13]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
A Proactive Stateful Firewall for Software Defined Networking. CRiSIS 2016: 123-138 - [c12]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Vulnerability Analysis of Software Defined Networking. FPS 2016: 97-116 - [c11]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. FPS 2016: 223-238 - [c10]Etienne Pardo, David Espes, Philippe Le Parc:
Modular approach for expert system toward anomaly: N-layers. ISNCC 2016: 1-5 - [c9]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Software Defined Networking Reactive Stateful Firewall. SEC 2016: 119-132 - 2015
- [j1]David Espes, Xavier Lagrange, Luis A. Suárez:
A cross-layer MAC and routing protocol based on slotted aloha for wireless sensor networks. Ann. des Télécommunications 70(3-4): 159-169 (2015) - [c8]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. CRiSIS 2015: 225-241 - [c7]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. CyberICS/WOS-CPS@ESORICS 2015: 63-78 - 2013
- [i1]David Espès, Ana-Maria Pistea, Charles Canaff, Ioana Iordache, Philippe Le Parc, Emanuel Radoi:
New Method for Localization and Human Being Detection using UWB Technology: Helpful Solution for Rescue Robots. CoRR abs/1312.4162 (2013)
2000 – 2009
- 2009
- [c6]David Espes, Zoubir Mammeri:
Delay and Bandwidth Constrained Routing with Throughput Optimization in TDMA-Based MANETs. NTMS 2009: 1-5 - 2007
- [c5]David Espes, Cédric Teyssié:
Approach for Reducing Control Packets in AODV-Based MANETs. ECUMN 2007: 93-104 - [c4]Cédric Teyssié, David Espes, Zoubir Mammeri:
Component Based Methodology for QoS-Aware Network Design. ICSOFT (SE) 2007: 190-197 - [c3]David Espes, Zoubir Mammeri:
Improvement of AODV Routing in Dense networks. WOWMOM 2007: 1-4 - 2006
- [c2]David Espes, Zoubir Mammeri:
Routing Algorithm to Increase Throughput in Ad hoc Networks. ICN/ICONS/MCL 2006: 66 - [c1]David Espes, Zoubir Mammeri:
Backbone-based location-aided routing algorithm to reduce control packets of AODV protocol. Mobility Conference 2006: 15
Coauthor Index
aka: Kalinka R. L. J. C. Branco
aka: Kalinka Castelo Branco
aka: Nora Cuppens-Boulahia
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint