The work in this thesis focused on creating a cyber security solution with the ability to protect, identify, classify, and manage risk priority with time efficiency. The main idea is to handle the threats and vulnerabilities based on the separation of the information system into three levels: Network level, device level, and human factor level. For each level, the system was modeled and a solution was presented and tested. And at the end, all of the solutions were applied to an information system to verify its usability and effectiveness. To determine the solutions, a bibliographic study was made so we can specify what contribution can be offered. And the results were crossed with the idea of the protection for the three levels mentioned pr...
The most common anomaly detection mechanisms at application level consists in detecting a deviation ...
The security of wireless sensor network is a growing field of research hampered by limited battery l...
This research focuses on the protection of MV distribution networks with Distributed Generators (DGs...
Le travail de cette thèse s'est concentré sur la création d'une solution de cybersécurité capable de...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
The 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of T...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
RÉSUMÉ: ABSTRACT: Computer attacks are an important reality today. Their ubiquity is explained by th...
This thesis aims at investigating techniques to build and control efficient, dependableand privacy-p...
Les attaques cybernétiques constituent un problème de plus en plus sensible pour les PME suisses. Pr...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low power, and multifunc...
RÉSUMÉ: ABSTRACT: From some time now, the idea of ontology based knowledge representation has emerge...
National audienceNowadays flood protection dikes surveillance is mostly ensured by visual inspection...
In the context of modern connected world, the concept of atomic data transfer/transaction has been c...
The most common anomaly detection mechanisms at application level consists in detecting a deviation ...
The security of wireless sensor network is a growing field of research hampered by limited battery l...
This research focuses on the protection of MV distribution networks with Distributed Generators (DGs...
Le travail de cette thèse s'est concentré sur la création d'une solution de cybersécurité capable de...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
The 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of T...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
RÉSUMÉ: ABSTRACT: Computer attacks are an important reality today. Their ubiquity is explained by th...
This thesis aims at investigating techniques to build and control efficient, dependableand privacy-p...
Les attaques cybernétiques constituent un problème de plus en plus sensible pour les PME suisses. Pr...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low power, and multifunc...
RÉSUMÉ: ABSTRACT: From some time now, the idea of ontology based knowledge representation has emerge...
National audienceNowadays flood protection dikes surveillance is mostly ensured by visual inspection...
In the context of modern connected world, the concept of atomic data transfer/transaction has been c...
The most common anomaly detection mechanisms at application level consists in detecting a deviation ...
The security of wireless sensor network is a growing field of research hampered by limited battery l...
This research focuses on the protection of MV distribution networks with Distributed Generators (DGs...