Renzo E. Navas
Renzo E. Navas
IMT Atlantique
Verified email at - Homepage
Cited by
Cited by
Mtd, where art thou? a systematic review of moving target defense techniques for iot
RE Navas, F Cuppens, NB Cuppens, L Toutain, GZ Papadopoulos
IEEE internet of things journal 8 (10), 7818-7832, 2020
Do not trust your neighbors! A small IoT platform illustrating a man-in-the-middle attack
RE Navas, H Le Bouder, N Cuppens, F Cuppens, GZ Papadopoulos
Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad …, 2018
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming
RE Navas, F Cuppens, NB Cuppens, L Toutain, GZ Papadopoulos
Computer Networks 187, 107751, 2021
Handover triggering in IEEE 802.11 networks
N Montavont, A Blanc, R Navas, T Kerdoncuff, G Castignani
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
IANVS: A moving target defense framework for a resilient Internet of Things
RE Navas, H Sandaker, F Cuppens, N Cuppens, L Toutain, ...
2020 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2020
Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture
RE Navas, M Lagos, L Toutain, K Vijayasankar
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 317-322, 2016
Late: A lightweight authenticated time synchronization protocol for iot
RE Navas, L Toutain
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
Sentiment analysis in microblogging: a practical implementation
M Cohen, P Damiani, S Durandeu, R Navas, H Merlino, E Fernández
XVII Congreso Argentino de Ciencias de la Computación, 2011
Watch out! Doxware on the way…
R Moussaileb, RE Navas, N Cuppens
Journal of Information Security and Applications 55, 102668, 2020
Improving the resilience of the constrained Internet of Things: a moving target defense approach
RE Navas
Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020
Energy-Aware Spreading Factor Selection in LoRaWAN Using Delayed-Feedback Bandits
RE Navas, G Dandachi, Y Hadjadj-Aoul, P Maillé
2023 IFIP Networking Conference (IFIP Networking), 1-9, 2023
Lightweight learning algorithms for massive IoT and analysis of their performance
G Dandachi, Y Hadjadj-Aoul, P Maille, RE Navas
INRIA Rennes-Bretagne Atlantique and University of Rennes 1, France, 2022
Reference architecture for slicing in LoRAWAN networks
F Guillemin, R Navas, A Aimi, T Aubonnet, TG Kerdoncuff, S Secci, ...
Consortium INTELLIGENTSIA, 2021
State of the art of IETF security related protocols for IoT
RE Navas, L Toutain, K Vijayasankar
C&ESAR 2016: Computer & Electronics Security Applications Rendez-vous, 1-9, 2016
Hack'lantique: première expérience de CTF pédagogique
J Boudaud, C Gilbert, T Laurain, C Métayer, J Sarrazin, F Autrel, ...
RESSI 2022: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité …, 2022
Moving Target Defense Techniques for the IoT
RE Navas, L Toutain, GZ Papadopoulos
Wiley Data and Cybersecurity, 2022
The system can't perform the operation now. Try again later.
Articles 1–16