Charles Morisset

Orcid: 0000-0001-9559-3352

According to our database1, Charles Morisset authored at least 69 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Impact of using a privacy model on smart buildings data for CO2 prediction.
CoRR, 2023

Realism versus Performance for Adversarial Examples Against DL-based NIDS.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Impact of Using a Privacy Model on Smart Buildings Data for CO<sub>2</sub> Prediction.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2022
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models.
CoRR, 2022

A Blockchain-Based Architecture to Manage User Privacy Preferences on Smart Shared Spaces Privately.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Simple and Efficient Identification of Personally Identifiable Information on a Public Website.
Proceedings of the IEEE International Conference on Big Data, 2022

Threat Modeling for Machine Learning-Based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems.
Secur. Priv., 2021

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review.
CoRR, 2021

A Review of Intrusion Detection Systems and Their Evaluation in the IoT.
CoRR, 2021

Securing the Electric Vehicle Charging Infrastructure.
CoRR, 2021

BDMPathfinder: a tool for exploring attack paths in models defined by Boolean logic Driven Markov Processes.
Proceedings of the 17th European Dependable Computing Conference, 2021

2020
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
A framework for the extended evaluation of ABAC policies.
Cybersecur., 2019

Modelling Load-Changing Attacks in Cyber-Physical Systems.
Proceedings of the Tenth International Workshop on the Practical Application of Stochastic Modelling, 2019

On Attribute Retrieval in ABAC.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
SHRUBS: simulating influencing human behaviour in security.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Interventions over smart card swiping behaviour.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT.
Proceedings of the Software Technologies: Applications and Foundations, 2018

Efficient Extended ABAC Evaluation.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

On Building a Visualisation Tool for Access Control Policies.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

VisABAC: A Tool for Visualising ABAC Policies.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Learning Decision Trees from Synthetic Data Models for Human Security Behaviour.
Proceedings of the Software Engineering and Formal Methods, 2017

ADaCS: A Tool for Analysing Data Collection Strategies.
Proceedings of the Computer Performance Engineering - 14th European Workshop, 2017

2016
Modeling and analysis of influence power for information security decisions.
Perform. Evaluation, 2016

Influence tokens: analysing adversarial behaviour change in coloured petri nets.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

WRAD: Tool Support for Workflow Resiliency Analysis and Design.
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016

2015
Probabilistic cost enforcement of security policies.
J. Comput. Secur., 2015

Resiliency Variance in Workflows with Choice.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Impact of Policy Design on Workflow Resiliency Computation Time.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Modelling user availability in workflow resiliency analysis.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Monotonicity and Completeness in Attribute-Based Access Control.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Reduction of access control decisions.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Quantitative Workflow Resiliency.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

2013
A framework for automated and certified refinement steps.
Innov. Syst. Softw. Eng., 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Automated Certification of Authorisation Policy Resistance.
Proceedings of the Computer Security - ESORICS 2013, 2013

Detection of attack strategies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Implementing Access Control Markov Decision Processes with GLPK/GMPL
CoRR, 2012

Towards A Generic Formal Framework for Access Control Systems
CoRR, 2012

Cost-Aware Runtime Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Subjective review-based reputation.
Proceedings of the ACM Symposium on Applied Computing, 2012

PTaCL: A Language for Attribute-Based Access Control in Open Systems.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

A Quantitative Approach for Inexact Enforcement of Security Policies.
Proceedings of the Information Security - 15th International Conference, 2012

Risk-based security decisions under uncertainty.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Quantitative access control with partially-observable Markov decision processes.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Robustness testing for software components.
Sci. Comput. Program., 2010

An Auto-delegation Mechanism for Access Control Systems.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

A Graph-Based Implementation for Mechanized Refinement Calculus of OO Programs.
Proceedings of the Formal Methods: Foundations and Applications, 2010

2009
Design and Verification of Fault-Tolerant Components.
Proceedings of the Methods, 2009

rCOS: Theory and Tool for Component-Based Model Driven Development.
Proceedings of the Fundamentals of Software Engineering, 2009

Specification and Validation of Behavioural Protocols in the rCOS Modeler.
Proceedings of the Fundamentals of Software Engineering, 2009

2008
Un cadre sémantique pour le contrôle d'accès.
Tech. Sci. Informatiques, 2008

State Based Robustness Testing for Components.
Proceedings of the 5th International Workshop on Formal Aspects of Component Software, 2008

A Component-Based Access Control Monitor.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Formal Comparison of the Bell & LaPadula and RBAC Models.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Sémantique des systèmes de contrôle d'accès:Définition d'un cadre sémantique pour la spécification, l'implantation et la comparaison de modèles de contrôle d'accès
PhD thesis, 2007

Un moniteur de référence sr d'une base de données.
Tech. Sci. Informatiques, 2007

2005
Formalisation and implementation of Access control models.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...