Publications

En tant que centre de recherche impliqué dans la recherche appliquée tant au niveau régional qu’européen, le CETIC est impliqué dans la publication de résultats de recherches dans diverses conférences et journaux liés à ces domaines de recherche.

La politique de publication du CETIC privilégie les contributions à caractère appliqué, impliquant des études de cas industrielles menées lors des projets correspondant.

Filtrer par

Réinitialiser

25.10.2024

Towards Cyber Security Risk Analysis for Digital Products

25.10.2024

Communication scientifique

Towards Cyber Security Risk Analysis for Digital Products

Christophe Ponsard, Jean-François Daune, Towards Cyber Security Risk Analysis for Digital Products, ERCIM News 139, Special Theme on Software Security

En savoir plus

07.02.2024

Secure federated learning applied to medical imaging with fully homomorphic encryption

07.02.2024

Publications scientifiques

Secure federated learning applied to medical imaging with fully homomorphic...

Xavier Lessage, Leandro Collier, Charles-Henry Bertrand Van Ouytse, Axel Legay, Saïd Mahmoudi and Philippe Massonet, Secure federated learning...

En savoir plus

30.09.2022

Product Incremental Security Risk Assessment using DevSecOps Practices

30.09.2022

Communication scientifique

Product Incremental Security Risk Assessment using DevSecOps Practices

Product Incremental Security Risk Assessment using DevSecOps Practices. Sébastien Dupont, Artsiom Yautsiukhin, Guillaume Ginis, Giacomo Iadarola,...

En savoir plus

31.05.2022

Méta-modèle des concepts et processus d'analyse des risques selon les normes de cybersécurité

31.05.2022

Publications scientifiques

Méta-modèle des concepts et processus d’analyse des risques selon les normes...

Christophe Ponsard, Mounir Touzani, Valery Ramon, Méta-modèle des concepts et processus d’analyse des risques selon les normes de cybersécurité,...

En savoir plus

01.04.2022

Towards Model-Driven DevSecOps for Cyberattack Prevention, Detection and Recovery

01.04.2022

Communication scientifique

Towards Model-Driven DevSecOps for Cyberattack Prevention, Detection and...

Christophe Ponsard, Philippe Massonet, Valéry Ramon : Towards Model-Driven DevSecOps for Cyberattack Prevention, Detection and Recovery. ERCIM News...

En savoir plus

09.02.2022

Survey and Guidelines about Learning Cyber Security Risk Assessment

09.02.2022

Publications scientifiques

Survey and Guidelines about Learning Cyber Security Risk Assessment

Christophe Ponsard, Philippe Massonet, Survey and Guidelines about Learning Cyber Security Risk Assessment, 8th International Conference on...

En savoir plus

15.11.2021

 Bilan et implications du RGPD pour les prestataires marocains en 2021

15.11.2021

Rapports techniques

Bilan et implications du RGPD pour les prestataires marocains en 2021

Christophe Ponsard, Mounir Touzani, Bilan et implications du RGPD pour les prestataires marocains en 2021, LTE Maroc, Novembre 2021

En savoir plus

18.10.2021

Improving Cyber Security Risk Assessment by Combined Use of i* and Infrastructure Models

18.10.2021

Publications scientifiques

Improving Cyber Security Risk Assessment by Combined Use of i* and...

Christophe Ponsard, Valery Ramon, Mounir Touzani, Improving Cyber Security Risk Assessment by Combined Use of i* and Infrastructure Models, the...

En savoir plus

06.09.2021

Incremental Common Criteria Certification Processes using DevSecOps Practices

06.09.2021

Publications scientifiques

Incremental Common Criteria Certification Processes using DevSecOps Practices

Sébastien Dupont, Guillaume Ginis, Mirko Malacario, Claudio Porretti, Nicolo Maunero, Christophe Ponsard, Philippe Massonet, Incremental Common...

En savoir plus

06.07.2021

Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO 21434

06.07.2021

Publications scientifiques

Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis...

C. Ponsard, V. Ramon,J.C. Deprez, Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO 21434, 18th...

En savoir plus

01.06.2021

Analyse SWOT des Systèmes d'Information pervasifs dans les bâtiments intelligents sur les modes BIM, BAM et BOOM !

01.06.2021

Communication scientifique

Analyse SWOT des Systèmes d’Information pervasifs dans les bâtiments...

Christophe Ponsard, Mounir Touzani, Analyse SWOT des Systèmes d’Information pervasifs dans les bâtiments intelligents sur les modes BIM, BAM et...

En savoir plus

01.04.2021

A goal-driven approach for the joint deployment of safety and security standards for operators of essential services

01.04.2021

Publications scientifiques

A goal-driven approach for the joint deployment of safety and security...

Ponsard C., Grandclaudon J., Massonet P., A goal-driven approach for the joint deployment of safety and security standards for operators of...

En savoir plus

07.09.2020

From Lightweight Cybersecurity Assessment to SME Certification Scheme in Belgium

07.09.2020

Publications scientifiques

From Lightweight Cybersecurity Assessment to SME Certification Scheme in Belgium

Christophe Ponsard, Philippe Massonet, Jeremy Grandclaudon, Nicolas Point, From Lightweight Cybersecurity Assessment to SME Certification Scheme in...

En savoir plus

31.08.2020

Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on Obstacle Models with Constraint Programming Semantics

31.08.2020

Rapports techniques

Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on...

Christophe Ponsard, Robert Darimont, Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on Obstacle Models with Constraint...

En savoir plus

25.02.2020

Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium

25.02.2020

Publications scientifiques

Methodology and Feedback about Systematic Cybersecurity Experts Auditing in...

Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point, Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium, 6th...

En savoir plus

05.08.2019

Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs

05.08.2019

Publications scientifiques

Survey and Guidelines for the Design and Deployment of a Cyber Security Label...

Christophe Ponsard and Jeremy Grandclaudon, Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs, 4th...

En savoir plus

23.02.2019

Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs

23.02.2019

Publications scientifiques

Guidelines and Tool Support for Building a Cybersecurity Awareness Program...

Ponsard C., Grandclaudon J. (2020) Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs. In : Mori P., Furnell S.,...

En savoir plus

23.02.2019

Survey and Lessons Learned on Raising SME Awareness about Cybersecurity

23.02.2019

Publications scientifiques

Survey and Lessons Learned on Raising SME Awareness about Cybersecurity

Christophe Ponsard, Jeremy Grandclaudon and Sebastien Bal, Survey and Lessons Learned on Raising SME Awareness about Cybersecurity, 2019...

En savoir plus

24.10.2018

Assessment of Emerging Standards for Safety and Security Co-Design on a Railway Case Study

24.10.2018

Publications scientifiques

Assessment of Emerging Standards for Safety and Security Co-Design on a...

Christophe Ponsard, Jeremy Grandclaudon, Philippe Massonet, Mounir Touzani, Assessment of Emerging Standards for Safety and Security Co-Design on a...

En savoir plus

22.01.2018

Towards a Cyber Security Label for SMEs : a European Perspective

22.01.2018

Publications scientifiques

Towards a Cyber Security Label for SMEs : a European Perspective

Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons, Towards a Cyber Security Label for SMEs : a European Perspective, ICORES 2018, Madeira,...

En savoir plus

23.03.2017

Electronic evidence, expertly explored

23.03.2017

Rapports techniques

Electronic evidence, expertly explored

Un article a propos du projet Evidence publié sur le site "Research and Innovation" de la Commission Européenne.

En savoir plus

24.02.2017

Une feuille de route pour la réglementation transfrontalière des preuves électroniques en Europe

24.02.2017

Rapports techniques

Une feuille de route pour la réglementation transfrontalière des preuves...

Les résultats d’EVIDENCE en bref

En savoir plus

20.09.2016

Goal-Oriented Co-engineering of Security and Safety Requirements in Cyber-Physical Systems

20.09.2016

Publications scientifiques

Goal-Oriented Co-engineering of Security and Safety Requirements in...

Christophe Ponsard, Gautier Dallons, Philippe Massonet, Goal-Oriented Co-engineering of Security and Safety Requirements in Cyber-Physical Systems,...

En savoir plus

14.09.2016

REDIRNET

14.09.2016

Rapports techniques

REDIRNET

Video explaining the project results

En savoir plus

12.09.2016

A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of Electronic Evidence across EU Countries

12.09.2016

Publications scientifiques

A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of...

Jean Christophe Deprez, Christophe Ponsard and Nikolaos Matskanis, A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of...

En savoir plus

12.07.2016

Co-engineering Security and Safety Requirements for Cyber-Physical Systems

12.07.2016

Communication scientifique

Co-engineering Security and Safety Requirements for Cyber-Physical Systems

Christophe Ponsard, Philippe Massonet and Gautier Dallons, Co-engineering Security and Safety Requirements for Cyber-Physical Systems, ERCIM News...

En savoir plus

28.08.2014

A Formal Model for Forensic Storage Media Preparation Tools

28.08.2014

Publications scientifiques

A Formal Model for Forensic Storage Media Preparation Tools

Benjamin Aziz, Philippe Massonet, Christophe Ponsard, A Formal Model for Forensic Storage Media Preparation Tools, in Proc. SECRYPT 2014 : 11th...

En savoir plus

17.01.2011

Security and Resilience in Governmental Clouds

17.01.2011

Rapports techniques

Security and Resilience in Governmental Clouds

European Network and Information Security Agency (ENISA)

En savoir plus

20.11.2009

Cloud Computing : Benefits, Risks and Recommendations for Information Security

20.11.2009

Rapports techniques

Cloud Computing : Benefits, Risks and Recommendations for Information Security

European Network and Information Security Agency (ENISA)

En savoir plus

01.07.2007

Towards a Commercial IT Service Delivery

01.07.2007

Publications scientifiques

Towards a Commercial IT Service Delivery

Christophe Ponsard, Gautier Dallons, Stéphane Mouton, Philippe Massonet : Towards a Commercial IT Service Delivery. ERCIM News 2007(70) (2007)

En savoir plus

25.06.2012

Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security

25.06.2012

Publications scientifiques

Analysing Impact of Scalability and Heterogeneity on the Performance of...

Syed Naqvi, Arnaud Michot, Michael Van de Borne, Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security,...

En savoir plus

18.04.2012

Security Challenges for Remote Patient Care Systems using m-Health Technologies

18.04.2012

Scientific communication

Security Challenges for Remote Patient Care Systems using m-Health Technologies

Syed Naqvi, Philippe Drugmand, Sébastien Rousseaux, "Security Challenges for Remote Patient Care Systems using m-Health Technologies", Medetel,...

En savoir plus

01.02.2012

Digital Investigations for Enterprise Information Architectures

01.02.2012

Publications scientifiques

Digital Investigations for Enterprise Information Architectures

Syed Naqvi, Gautier Dallons, Christophe Ponsard, Digital Investigations for Enterprise Information Architectures, The Sixth International...

En savoir plus

30.01.2012

Digital Investigations and Forensic Analysis - Practices and Technologies

30.01.2012

Communication scientifique

Digital Investigations and Forensic Analysis - Practices and Technologies

Syed Naqvi, Digital Investigations and Forensic Analysis - Practices and Technologies, Sixth International Conference on Digital Society (ICDS...

En savoir plus

30.11.2011

Securing the External Interfaces of a Federated Infrastructure Cloud

30.11.2011

Publications scientifiques

Securing the External Interfaces of a Federated Infrastructure Cloud

Massonet P., Michot A., Naqvi S., Villari M., Latanicki J., Securing the External Interfaces of a Federated Infrastructure Cloud, In Open Source...

En savoir plus

17.05.2011

A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures

17.05.2011

Publications scientifiques

A Monitoring and Audit Logging Architecture for Data Location Compliance in...

Massonet P., Naqvi S., Ponsard C., Latanicki J., Rochwerger B., Villari M., A Monitoring and Audit Logging Architecture for Data Location...

En savoir plus

17.05.2011

Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures

17.05.2011

Publications scientifiques

Designing Efficient Security Services Infrastructure for Virtualization...

Naqvi S. "Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures, in Pervasive Information Security and...

En savoir plus

06.04.2011

Using Organisational Security Policy for Ensuring Privacy of Electronic Health Records

06.04.2011

Communication scientifique

Using Organisational Security Policy for Ensuring Privacy of Electronic...

Naqvi S., Dallons G., Michot A., Ponsard C., Using Organisational Security Policy for Ensuring Privacy of Electronic Health Records, The...

En savoir plus

08.10.2010

Protecting Corporate ICT Infrastructures by using Digital Forensics

08.10.2010

Publications scientifiques

Protecting Corporate ICT Infrastructures by using Digital Forensics

Naqvi S., Dallons G., Ponsard C., "Protecting Corporate ICT Infrastructures by using Digital Forensics", IEEE International Conference on Computer...

En savoir plus

16.06.2010

Deriving Event-Based Usage Control Policies from Declarative Security Requirements Models

16.06.2010

Communication scientifique

Deriving Event-Based Usage Control Policies from Declarative Security...

De Landtsheer R, Ponsard C, Massonet P., "Deriving Event-Based Usage Control Policies from Declarative Security Requirements Models", Second...

En savoir plus

16.05.2010

Applying Digital Forensics in the Future Internet Enterprise Systems

16.05.2010

Publications scientifiques

Applying Digital Forensics in the Future Internet Enterprise Systems

Naqvi S., Dallons G., Ponsard C., "Applying Digital Forensics in the Future Internet Enterprise Systems" - European SMEs’ Perspective, Fifth...

En savoir plus

16.05.2010

Ensuring Security of the Future Internet-based Virtualization Infrastructures

16.05.2010

Publications scientifiques

Ensuring Security of the Future Internet-based Virtualization Infrastructures

Naqvi S., Dallons G., Ponsard C., Massonet P., "Ensuring Security of the Future Internet-based Virtualization Infrastructures" (Position Paper),...

En savoir plus

30.11.2009

Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon region's eHealth Platform

30.11.2009

Publications scientifiques

Assuring Privacy of Medical Records in an Open Collaborative Environment - A...

Naqvi S., Dallons G., Michot A., Ponsard C. . "Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon...

En savoir plus

14.12.2007

Développer une application eID - rapport d'expérience : réalisation d'un chat eID

14.12.2007

Communication scientifique

Développer une application eID - rapport d’expérience : réalisation d’un chat...

Christophe Ponsard et Jérôme Jonckers, Développer une application eID - rapport d’expérience : réalisation d’un chat eID, eID newsletter, décembre...

En savoir plus

13.09.2007

An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in Grid-based Virtual Organisations

13.09.2007

Communication scientifique

An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in...

Dallons G., Massonet P., Molderez J.F., Ponsard C., Arenas A., ’An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in...

En savoir plus