David Espes

Orcid: 0000-0003-3445-947X

According to our database1, David Espes authored at least 48 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Spoofing and GPS Jamming in UAVs: Multiclass Approach to Attack Diagnosis.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
A novel bi-anomaly-based intrusion detection system approach for industry 4.0.
Future Gener. Comput. Syst., August, 2023

Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks.
SAFE@CoNEXT, 2023

Security policy architecture for 5G Networks.
Proceedings of the 14th International Conference on Network of the Future, 2023

Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

Characterizing Intrusion Detection Systems On Heterogeneous Embedded Platforms.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023

Ontology-based Solution for Handling Safety and Cybersecurity Interdependency in NFV Safety Architecture.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Security and Safety Concerns in Air Taxis: A Systematic Literature Review.
Sensors, 2022

A new wrapper feature selection model for anomaly-based intrusion detection systems.
Int. J. Secur. Networks, 2022

Optimal Access Control Deployment in Network Function Virtualization.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Token-based authentication and access delegation for HW-accelerated telco cloud solution.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

2021
OAuth 2.0-based authentication solution for FPGA-enabled cloud computing.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

2020
Formalization of a security access control model for the 5G system.
Proceedings of the 11th International Conference on Network of the Future, 2020

STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Priority-Based Domain Type Enforcement for Exception Management.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

Managing Secure Inter-slice Communication in 5G Network Slice Chains.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Network Functions Virtualization Access Control as a Service.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

New Dataset for Industry 4.0 to Address the Change in Threat Landscape.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Defining a communication service management function for 5G network slices.
Proceedings of the European Conference on Networks and Communications, 2019

A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

DTE Access Control Model for Integrated ICS Systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
SONICS: A Segmentation Method for Integrated ICS and Corporate System.
Proceedings of the Information Systems Security - 14th International Conference, 2018

RIICS: Risk Based IICS Segmentation Method.
Proceedings of the Risks and Security of Internet and Systems, 2018

A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
A New Segmentation Method for Integrated ICS (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

Firewall Policies Provisioning Through SDN in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Low-Cost High-Tech Robotics for Ambient Assisted Living: From Experiments to a Methodology.
J. Intell. Syst., 2016

Software Defined Networking Reactive Stateful Firewall.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Modular approach for expert system toward anomaly: N-layers.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

Vulnerability Analysis of Software Defined Networking.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Security Analysis of WirelessHART Communication Scheme.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Proactive Stateful Firewall for Software Defined Networking.
Proceedings of the Risks and Security of Internet and Systems, 2016

A Framework for Anomaly Diagnosis in Smart Homes Based on Ontology.
Proceedings of the 7th International Conference on Ambient Systems, 2016

Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A cross-layer MAC and routing protocol based on slotted aloha for wireless sensor networks.
Ann. des Télécommunications, 2015

WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Security Issue of WirelessHART Based SCADA Systems.
Proceedings of the Risks and Security of Internet and Systems, 2015

2013
New Method for Localization and Human Being Detection using UWB Technology: Helpful Solution for Rescue Robots.
CoRR, 2013

2009
Delay and Bandwidth Constrained Routing with Throughput Optimization in TDMA-Based MANETs.
Proceedings of the NTMS 2009, 2009

2007
Improvement of AODV Routing in Dense networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Component Based Methodology for QoS-Aware Network Design.
Proceedings of the ICSOFT 2007, 2007

Approach for Reducing Control Packets in AODV-Based MANETs.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

2006
Backbone-based location-aided routing algorithm to reduce control packets of AODV protocol.
Proceedings of the 3rd international conference on Mobile technology, 2006

Routing Algorithm to Increase Throughput in Ad hoc Networks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006


  Loading...