Publications

  1.  
  2. Eurosmart : Internet of trust Security and privacy in the connected world, Nov 2016 http://www.eurosmart.com/news-publications/policy-papers/245-eurosmart-internet-of-trust-security-and-privacy-in-the-connected-world.html
  3. C. Brookson et al  , Tackling the challenge of cyber security, ETSI technical report, Dec 2016, http://www.etsi.org/images/files/ETSIWhitePapers/etsi_wp18_CyberSecurity_Ed1_FINAL.pdf
  4. ETSI, oneM2M Use Case collection,  Technical report 118501, V1.0.0 2015-05
  5. Yves Roudier, Muhammad Sabir Idrees, Ludovic Apvrille, Towards the Model-Driven Engineering of Security Requirements for Embedded Systems, Proceedings of the Model-Driven Requirements Engineering Workshop (MoDRE'13), Rio de Janeiro, Brazil, July 2013
  6. Ludovic Apvrille, Yves Roudier, Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec, Chapter in Model-Driven Engineering and Software Development, p293--308, Springer International Publishing, 2015
  7. Akram Idani, Yves Ledru, Mohamed-Amine Labiadh. B4MSecure : une plateforme IDM pour la modélisation et la validation de politiques de sécurité en Systèmes d'Information (démo) AFADL 2013, Apr 2013, Nancy, France. pp.85-89, 2013.
  8. Veritas, Cyber security of connected vehicles , BV CAR CYBER sec -001/20161003
  9. Pôle SCS Livre blanc marché e-santé http://www.pole-scs.org/sites/www.pole-scs.org/files/images/actualites/pole/LB-esante-online.pdf
  10. A. Ray, R. Cleaveland, Security Assurance Cases for Medical Cyber–Physical Systems, IEEE Design and Test 32(5):56-65· October 2015
  11. A. Sangiovanni-Vincentelli, M. Grant. Platform-based design and software design  methodology for embedded systems. IEEE Design & Test of Computers 18.6 (2001): 23-33.
  12. Jean-François Le Tallec, Julien Deantoni, Robert De Simone, Benoît Ferrero, Frédéric Mallet, et al..  Combining SystemC,    IP-XACT and UML/MARTE in model-based SoC design.  Workshop on Model Based Engineering for Embedded Systems Design (M-BED 2011), Mar 2011, Grenoble, France.  2011
  13. H. Affes, M. Auguin, F. Verdier, A. Pégatoquet, Methodology for inserting Clock-Management strategies in Transaction-Level Models of System[11]-on-Chips, FDL’2015, Forum on specification & Design Languages, Sept. 14-16, Barcelona, Spain, 2015
  14. F. Mallet. MARTE/CCSL for Modeling Cyber-Physical Systems. Formal Modeling and Verification of Cyber-Physical Systems, pp. 26-49, Springer, Sep. 2015F.
  15. F. Mallet, M-A Peraldi-Frati, J. Deantoni, R. DeSimone. UML MARTE Time Model and its Clock Constraint Specification Language. In book: Handbook of Research on Embedded Systems Design, Chapter: 2 pp.29-51, June 2014, IGI Publisher, Advances in Engineering Science Reference, DOI: 10.4018/978-1-4666-6194-3.ch002.
  16. J. Deantoni, F. Mallet, F. Thomas, G. Reydet, J.-P. Babau, et al.. RT-simex: retro-analysis of execution traces. Gruia-Catalin Roman, Kevin J. Sullivan. 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering SIGSOFT FSE, Nov 2010, Santa Fe, United States.
  17. M.-A. Peraldi-Frati, J. DeAntoni. Scheduling Multi Clock Real Time Systems: From Requirements to Implementation.  In Int. Symp. on Object/Component/Service-oriented Real-time Distributed Computing", Newport Beach, United States, IEEE computer society, March 2011, pp 50--57.
  18. Carlos Gomez, Julien Deantoni, Frédéric Mallet. Power consumption analysis using multi-view modeling. PATMOS - 23th Int. Work. on Power and Timing Modeling, Optimization and Simulation, Sep 2013, Karlsruhe, Germany. pp.235-238
  19. Mallet and R. de Simone. Correctness Issues in MARTE/CCSL. Sci. Comput. Program., 106:78-92, August 2015, Elsevier.
  1. Dehui Du, Ping Huang, F. Mallet, Mingrui Yang and Kaiqiang Jiang. MARTE/pCCSL: Modeling and Refining Stochastic Behaviors of CPSs with Probabilistic Logical Clocks. Formal Aspects of Component Software (FACS'16), Springer, Oct. 2016.
  2. C. Glitia, J. DeAntoni, F. Mallet, J.-V. Millo, P. Boulet and A. Gamatié. Progressive and explicit refinement of scheduling for multidimensional data-flow applications using UML MARTEDesign Automation of Embedded Systems, 19(1-2):1-33, 2015.
  3. J. Deantoni, C. Brun, B. Caillaud, R. France, Gabor Karsai, et al.. Domain Globalization: Using Languages to Support Technical and Social Coordination  Globalizing Domain-Specific Languages, 9400, Springer International Publishing, pp.70-87, 2015, Lecture Notes in Computer Science, 978-3-319-26171-3.,
  4.  J. Deantoni, P. I. Diallo, C. Teodorov, J. Champeau, B. Combemale. Towards a Meta-Language for the Concurrency Concern in DSLs. IEEE proceedings of Design, Automation and Test in Europe Conference and Exhibition (DATE), 2015
  5. S. Lavirotte, J.-Y. Tigli, G. Rocher, L. El Beze, and A.Palma. « UbiUnity: a Dynamic Visual Simulation Framework for Web of Things ». In: 5th International Conference on Internet of Things (IoT 2015). Séoul, South Korea, Oct. 2015
  6. Projet Hope , Hierarchically Organized Power/Energy Management. Projet ANR 2012 INSE 0003. http://anr-hope.unice.fr
  7. C. Barnes, F. Verdier, A. Pegatoquet, D. Gaffé and J. M. Cottin, Wireless sensor network protocol property validation through the system's simulation in a dedicated framework, 2016 10th International Conference on Signal Processing and Communication Systems (ICSPCS), Surfers Paradise, Gold Coast, Australia, 2016, pp. 1-9
  8. L. Rodriguez, B. Miramond, and B. Granado. Toward a sparse self-organizing map for neuromorphic architectures. ACM Journal on Emerging Technologies in Computing Systems (JETC) 11.4 (2015): 33.
  9. Yves Ledru, Akram Idani, Jérémy Milhau, Muhammad Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh. Validation of IS Security Policies featuring Authorisation Constraints. Labiadh International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
  10. Yves Ledru, Akram Idani, Jean-Luc Richier. Validation of a security policy by the test of its formal B specification - a case study, Third FME Work.on Formal Methods in Software Engineering (Formalise’15), 2015, Firenze, Italy, pp.6-12
  11. Matthias Büchler, Karim Hossen, Petru Florin Mihancea, Marius Minea, Roland Groz, Catherine Oriat. Model Inference and Security Testing in the SPaCIoS Project IEEE Working Conference on Reverse Engineering, CSMR-WCRE 2014, 2014, Antwerp, Belgium. pp.411-414, 2014
  12. Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz.  KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection, Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014, Unknown, ACM, pp.37-48, 2014
  13. Akram Idani, Yves Ledru, Mohamed-Amine Labiadh. B4MSecure : une plateforme IDM pour la modélisation et la validation de politiques de sécurité en Systèmes d'Information (démo) AFADL 2013, Apr 2013, Nancy, France. pp.85-89, 2013.
  14. Pascal Cotret, Guy Gogniat, Martha Johanna Sepúlveda Flórez, Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls. Microprocessors and Microsystems - Embedded Hardware Design 42: 127-141 (2016)
  15. Martha Johanna Sepúlveda, Jean-Philippe Diguet, Marius Strum, Guy Gogniat, NoC-Based Protection for SoC Time-Driven Attacks. Embedded Systems Letters 7(1): 7-10 (2015)
  16. Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat, Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Comput. Surv. 45(4): 41:1-41:32 (2013)
  17. Jérémie Crenne, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, Deepak Unnikrishnan, Configurable memory security in embedded systems. ACM Trans. Embedded Comput. Syst. 12(3): 71:1-71:23 (2013)
  18. Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin, Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. VLSI Syst. 16(2): 144-155 (2008)