IMT Chaire CyberCNI
The IMT Chaire on the cybersecurity of critical infrastructures, held by
IMT Atlantique
in Rennes, is a collaboration between three schools of
Institute Mines Telecom
(IMT Atlantique, Telecom ParisSud and Telecom ParisTech) and industrial partners.
Publications
- Rooney, V. M., & Foley, S. N. (2018). An online consent maturity model: moving from acceptable use towards ethical practice. In New Security Paradigms Workshop (NSPW 2018). ACM press. Retrieved from https://simonnfoley.github.io/pubs/nspw2018.pdf [link]
- Foley, S. N., & Rooney, V. M. (2018). A Grounded Theory approach to security policy elicitation. Information and Computer Security Journal, 26(4), 454–471. https://doi.org/10.1108/ICS-12-2017-0086 [link]
- Rooney, V. M., & Foley, S. N. (2018). What you can change and what you can’t: human experience in computer network defenses. In In proceedings Nordic Conference on Secure IT Systems. Springer LNCS 11252. Retrieved from https://simonnfoley.github.io/pubs/nordsec2018.pdf [link]
- Foley, S. N., Autrel, F., Bourget, E., Cledel, T., Gruenwald, S., Rubio-Hernan, J., … Vanhulst, K. (2018). Science hackathons for cyber-physical system security research: Putting CPS testbed platforms to good use. In In proceedings ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC at ACM CCS). ACM press. Retrieved from https://simonnfoley.github.io/pubs/acmCPSSPC.pdf [link]
- Bourget, E., Cuppens, F., Cuppens-Boulahia, N., Dubus, S., Foley, S. N., & Laarouchi, Y. (2018). Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. In Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, 2018, Proceedings (pp. 38–47).
- Cledel, T., Foley, S. N., Cuppens, N., Cuppens, F., Dubois, F., Laarouchi, Y., & Comte, G. L. (2018). Towards the evaluation of end-to-end resilience through external consistency. In In proceedings 10th International Symposium on Cyberspace Safety and Security (CSS). Springer LNCS 11161.
- Pieczul, O., Foley, S. N., & Zurko, M. E. (2017). Developer-centered security and the symmetry of ignorance. In New Security Paradigms Workshop (NSPW 2017). Retrieved from https://simonnfoley.github.io/pubs/nspw2017.pdf [link]
- Foley, S. N. (2017). Getting security objectives wrong: a cautionary tale of an Industrial Control System. In International Workshop on Security Protocols. Retrieved from https://simonnfoley.github.io/pubs/spw2017.pdf [link]
- Rooney, V. M., & Foley, S. N. (2017). What users want: adapting qualitative research methods to security policy requirements elicitation. In Proceedings of the International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017. Retrieved from https://simonnfoley.github.io/pubs/secpre2017.pdf [link]