1. Journal Papers

» Artificial Intelligence, Cyber-threats and Industry 4.0: Challenges and Opportunities
Bécue, A., Praça, I. & Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities. Artif Intell Rev 54, 3849–3886 (2021).

» On the Usage of Pre-Trained Speech Recognition Deep Layers to Detect Emotions
J. Oliveira and I. Praça, “On the Usage of Pre-Trained Speech Recognition Deep Layers to Detect Emotions,” in IEEE Access, vol. 9, pp. 9699-9705, 2021.

» Flying High For AI? Perspectives on EASA’S roadmap for AI in Aviation
Orian Dheu, Ivo Emanuilov, ‘Flying High for AI? Perspectives on EASA’s Roadmap for AI in Aviation’, (2021), 46, Air and Space Law, Issue 1, pp. 1-28, https://kluwerlawonline.com/journalarticle/Air+and+Space+Law/46.1/AILA2021001

» Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
Vitorino, J.; Oliveira, N.; Praça, I. Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection. Future Internet 2022, 14, 108

» Business and human rights in Industry 4.0: a blueprint for collaborative human rights due diligence in the Factories of the Future
Ivo Emanuilov, Katerina Yordanova, Business and human rights in Industry 4.0: a blueprint for collaborative human rights due diligence in the Factories of the Future, Journal of Responsible Technology, 2022, 100028, ISSN 2666-6596

» Cybersecurity of Cyber Ranges: Threats and Mitigation.
Noponen Sami, Pärssinen Juha, Salonen Jarno: Cybersecurity of Cyber Ranges: Threats and Mitigation. International Journal for Information Security Research (IJISR), Volume 12, Issue 1 (2022).

  • BY: Noponen Sami, Pärssinen Juha, Salonen Jarno
  • LINK: N/A

» Investigating the practicality of adversarial evasion attacks on network intrusion detection
Merzouk, M.A., Cuppens, F., Boulahia-Cuppens, N. et al. Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann. Telecommun. (2022). https://doi.org/10.1007/s12243-022-00910-1


2. Book Chapters

» Digital Twins for Enhanced Resilience: Aerospace Manufacturing Scenario
Bécue, A., Praddaude, M., Maia, E., Hogrel, N., Praça, I., Yaich, R. (2022). Digital Twins for Enhanced Resilience: Aerospace Manufacturing Scenario. In: Horkoff, J., Serral, E., Zdravkovic, J. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2022. Lecture Notes in Business Information Processing, vol 451. Springer, Cham.

» Secure Data Processing for Industrial Remote Diagnosis and Maintenance
Arabi, W., Yaich, R., Boudguiga, A., Omar, M. (2021). Secure Data Processing for Industrial Remote Diagnosis and Maintenance. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham.

» Security through Transparency and Openness in Computer Design
Emanuilov, I. (2021). Security Through Transparency and Openness in Computer Design. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham.

» A Deeper Analysis of Adversarial Examples in Intrusion Detection
Merzouk, M.A., Cuppens, F., Boulahia-Cuppens, N., Yaich, R. (2021). A Deeper Analysis of Adversarial Examples in Intrusion Detection. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham. 

  • BY: Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens and Reda Yaich; IMT Atlantique, IRT SystemX, France ; Polytechnique Montréal, Canada, Ecole Supérieure d’Informatique, Algeria.
  • DOI: https://doi.org/10.1007/978-3-030-68887-5_4

» Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments
Miguel Garcia, A., Hiller, M. (2022). Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https://doi.org/10.1007/978-3-031-08147-7_17

» A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
Vitorino, J., Andrade, R., Praça, I., Sousa, O., Maia, E. (2022). A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham.

» Secure and Robust Cyber Security Threat Information Sharing
Bkakria, A., Yaich, R., Arabi, W. (2022). Secure and Robust Cyber Security Threat Information Sharing. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https://doi.org/10.1007/978-3-031-08147-7_1


3. Conference Papers

» Similarity-based clustering for IoT device classification
G. Dupont, C. Leite, D. R. dos Santos, E. Costante, J. den Hartog and S. Etalle, “Similarity-Based Clustering For IoT Device Classification,” 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, pp. 1-7, doi: 10.1109/COINS51742.2021.9524201. 

» A Multi-agent System for Autonomous Mobile Robot Coordination
2021 ESM – European Simulation and Modelling Conference, October 2021.

  • BY: Nuno Oliveira, Norberto Sousa, Isabel Praça
  • LINK: N/A

» Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space
N. Oliveira, N. Sousa, J. Oliveira and I. Praça, “Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space,” 2021 14th International Conference on Security of Information and Networks (SIN), 2021, pp. 1-5, doi: 10.1109/SIN54109.2021.9699339.

» Brave New World? Processing of personal data about employees under Art. 9 of GDPR in the context of human-robot interaction.
Emanuilov.I., Yordanova, K., (2021). Brave New World? Processing of personal data about employees under Art. 9 of GDPR in the context of human-robot interaction. Proc. 2021 ISCA Symposium on Security and Privacy in Speech Communication, 67-72, doi: 10.21437/SPSC.2021-14

» Review on Cybersecurity Threats Related to Cyber Ranges
Noponen, S., Pärssinen, J., & Salonen, J. (Accepted/In press). Review on Cybersecurity Threats Related to Cyber Ranges. In Proceedings of the 17th International Conference for Internet Technology and Secured Transactions

» How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control
Salonen Jarno, Niskanen Tatu and Raitio Pia: How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control, 8th International Conference on Computer Science, Information Technology (CSITEC 2022), 23.-24.4.2022, Copenhagen, Denmark

» Experimental Remote Attestation over OPC UA
2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), http://spiscs.net/

  • BY: Juhola Arto, Kylänpää Markku
  • LINK: N/A

» The Digital Forensics of Cyber Attacks at Electrical Power Grid Substation
10th International Symposium on Digital Forensics and Security, (ISDFS 2022), 6.-7.6.2022, Istanbul, Turkey, https://isdfs.org/

  • BY: Pärssinen Juha, Raussi Petra, Noponen Sami, Opas Mikael, Salonen Jarno
  • LINK: N/A

» Developing the Factory of the Future Cybersecurity and Resilience
2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), http://spiscs.net/

  • BY: Adrian Kotelba, Jarno Salonen
  • LINK: N/A

» Combining System Integrity Verification with Identity and Access Management
Kylänpää, M., & Salonen, J. (2022). Combining System Integrity Verification with Identity and Access Management. European Conference on Cyber Warfare and Security.

» Proof-of-concept for a Granular Incident Management Information Sharing Scheme
IEEE World AI IoT Congress 2022 (IEEE AIIoT 2022), 6.-9.6.2022, https://worldaiiotcongress.org/

  • BY: Emanuilov Ivo, Latvala Outi-Marja, Niskanen Tatu, Raitio Pia, Salonen Jarno, Santos Diogo, Yordanova Katerina
  • LINK: N/A

» Modelling & Simulation of a Rivet Shaving Process for the Protection of the Aerospace Industry against Cyber Threats
Modelling & Simulation of a Rivet Shaving Process for the Protection of the Aerospace Industry against Cyber Threats Martin Praddaude, Nicolas Hogrel, Matthieu Gay, Ulrike Baumann and Adrien Bécue .
2021 ESM – Europena Simulation and Modelling Conference, October 2021

  • BY: Martin Praddaude, Nicolas Hogrel, Matthieu Gay, Ulrike Baumann and Adrien Bécue
  • LINK: N/A

» Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption
Bkakria, A. (2022). Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. Cryptology ePrint Archive.

» Deep Reinforcement Learning-Based Defense Strategy Selection
The 17th International Conference on Availability, Reliability and Security (ARES 2022)

  • BY: Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich
  • LINK: N/A

» Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
The 17th International Conference on Availability, Reliability and Security (ARES 2022)

  • BY: Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich
  • LINK: N/A

» COLABE4Automotive: Confidential data Outsourcing enabLed by Attribute-Based Encryption for Secure Automotive Manufacturing
22nd edition of the Driving Simulation Conference Europe DSC 2022, Site : https://dsc2022.org/

  • BY: BKAKRIA, Anis; HEULOT, Nicolas; YAICH, Reda
  • LINK: N/A