Academic literature on the topic 'Cybersécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersécurité"
Gildas Avoine and Marc-Olivier Killijian. "Cybersécurité." Bulletin 1024, no. 11 (September 2017): 25–37. http://dx.doi.org/10.48556/sif.1024.11.25.
Full textDebar, Hervé. "La cybersécurité." Annales des Mines - Enjeux numériques 27, no. 3 (September 27, 2024): 120–27. http://dx.doi.org/10.3917/ennu.027.0120.
Full textChertoff, Michael, Latha Reddy, and Alexander Klimburg. "Cybersécurité : l’état d’urgence." SAY N° 4, no. 2 (April 1, 2021): 146–48. http://dx.doi.org/10.3917/say.004.0146.
Full textVentre, Daniel. "Cybersécurité : perspectives chinoises." Revue Défense Nationale N° 785, no. 10 (December 1, 2015): 93–97. http://dx.doi.org/10.3917/rdna.785.0093.
Full textTexier, Bruno. "Cybersécurité : tous concernés." Archimag N°346, no. 6 (July 1, 2021): 14–17. http://dx.doi.org/10.3917/arma.346.0014.
Full textHoutain, Serge. "Cybersécurité : ne vaut-il pas mieux prévenir que guérir ?" Risques & qualité en milieu de soins Vol. XIX, no. 1 (October 13, 2023): 12–16. https://doi.org/10.3917/rqms.101.0012.
Full textMazzucchi, Nicolas. "La cybersécurité des infrastructures énergétiques." Revue de l'Energie N° 672, no. 3 (March 1, 2024): 34–39. http://dx.doi.org/10.3917/ener.672.0034.
Full textSimonneau, Damien. "Entre suprématie blanche et cybersécurité." Politix 115, no. 3 (2016): 79. http://dx.doi.org/10.3917/pox.115.0079.
Full textSarrazin, Claude, and Anne Gaignaire. "Cybersécurité : misez sur la prévention !" Gestion 44, no. 3 (2019): 78. http://dx.doi.org/10.3917/riges.443.0078.
Full textChevalier, Lucile. "Ingénieur en cybersécurité (blue team)." Pour l'Éco N° 61, no. 4 (May 2, 2024): 46–47. http://dx.doi.org/10.3917/poec.061.0046.
Full textDissertations / Theses on the topic "Cybersécurité"
Vashaee, Ali. "Reconnaissance de forme dans cybersécurité." Mémoire, Université de Sherbrooke, 2014. http://savoirs.usherbrooke.ca/handle/11143/5331.
Full textD'elia, Danilo. "La cybersécurité des opérateurs d’importance vitale : analyse géopolitique des enjeux et des rivalités de la coopération public-privé." Thesis, Paris 8, 2017. http://www.theses.fr/2017PA080136.
Full textIn France in 2008, the White Paper on Defense and National Security identified attacks on information systems as one of the main threats to the national defense and security. In response to new threats to information systems, public authorities have been proactive in structuring a vast public policy project. Public interventionism resulted in the vote and implementation of the Article 22 of the Military Programming Act of 2013, which now requires operators of vital importance to strengthen the security of the information systems they operate. Yet the implementation of this strategy involves cooperation between the public sphere and private actors, which raises numerous conflicts of an economic, organizational, political and diplomatic nature. Thus critics from both sides (public and private) are more and more recurrent. The main question to which this thesis responds is a geopolitical issue: what is the geography (boundaries and territories) of public-private cooperation? If the territory and territorial responsibility are clear in terms of physical security, when it comes to cybersecurity, it becomes more complicated. The digital transformation prevents a perimeter defense and raises the question of how to act to overcome the limits of the old model: to a threat on a territory corresponds an institution to set up its defense. My main hypothesis is that public-private cooperation is the result of a political balance of power between actors acting at different territorial scales
D'elia, Danilo. "La cybersécurité des opérateurs d’importance vitale : analyse géopolitique des enjeux et des rivalités de la coopération public-privé." Electronic Thesis or Diss., Paris 8, 2017. http://www.theses.fr/2017PA080136.
Full textIn France in 2008, the White Paper on Defense and National Security identified attacks on information systems as one of the main threats to the national defense and security. In response to new threats to information systems, public authorities have been proactive in structuring a vast public policy project. Public interventionism resulted in the vote and implementation of the Article 22 of the Military Programming Act of 2013, which now requires operators of vital importance to strengthen the security of the information systems they operate. Yet the implementation of this strategy involves cooperation between the public sphere and private actors, which raises numerous conflicts of an economic, organizational, political and diplomatic nature. Thus critics from both sides (public and private) are more and more recurrent. The main question to which this thesis responds is a geopolitical issue: what is the geography (boundaries and territories) of public-private cooperation? If the territory and territorial responsibility are clear in terms of physical security, when it comes to cybersecurity, it becomes more complicated. The digital transformation prevents a perimeter defense and raises the question of how to act to overcome the limits of the old model: to a threat on a territory corresponds an institution to set up its defense. My main hypothesis is that public-private cooperation is the result of a political balance of power between actors acting at different territorial scales
Jousse, Adrien. "Protection obligatoire vérifiée au regard des objectifs safety du secteur automobile." Electronic Thesis or Diss., Bourges, INSA Centre Val de Loire, 2022. http://www.theses.fr/2022ISAB0002.
Full textThe safety of an automotive system (security of persons and goods) depends on the system‘s operating context. In order to preserve safety, safety mechanisms must dynamically consider the context of the embedded system. However, how can we guarantee that a dynamic safety mechanism preserves the safety in all possible configurations, without introducing undesirable effects? In order to address these issues, we propose to add a dynamic mandatory access control mechanism that is verified with respect to safety objectives. We start by showing that existing access control mechanisms are not sufficient. We then detail some specificities of the automotive sector and the formal verification approaches we will use. We then present the design of our access control mechanism, the real use case on and the capabilities of the attacker. We also detail the access control policy and the properties that have to be enforced. We then move on to model our use case in order to verify it with two tools. Different checks are performed to verify that the system has the desired properties, that they are not satisfied without our access control but are preserved by the enforcement of our access control policy. Finally, we show that our access control mechanism is loss tolerant when appropriate replay mechanisms are implemented
Delcombel, Nicolas. "Cybersécurité en réalité virtuelle : améliorer le processus de détection d’intrusion, d’investigation et de décision via l’utilisation de techniques de visualisations 3D immersives." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2023. http://www.theses.fr/2023IMTA0387.
Full textIn this thesis, we examined how virtual reality could contribute to assisting operators in cyber operation centers who are responsible for processing a large number of alerts within tight deadlines. To sort through these alerts, operators compare the behavior of the monitored system with its nominal behavior and must correlate numerous and diverse data. The 2D tools they currently have do not provide effective visualizations. They are limited by their difficulty in correlating data between multiple visualizations, and in representing the evolution of a system’s behavior over time. Therefore, we created a 3D visualization concept that overcomes these limitations. We developed an immersive prototype based on this concept, which we evaluated compared to 2D visualizations. The results show greater efficiency of our prototype in processing complex data, while allowing increased user engagement at the cost of additional physical effort and the inability to interact with traditional 2D tools in the virtual environment. We thus devised a concept for an immersive cybersecurity environment that enables the use of 3D visualizations while having access to conventional cybersecurity tools. We demonstrated that all the necessary software components for its realization are available and have begun combining them to create a limited but functional prototype
Yaseen, Amer Atta. "Toward self-detection of cyber-physical attacks in control systems." Thesis, Lille 1, 2019. http://www.theses.fr/2019LIL1I040/document.
Full textA networked control system (NCS) is a control system in which the control loop is closed over a real-time network. NCSs are used in many industrial applications, and also in applications such as remote control, unmanned aerial vehicles or surgical teleoperation, ... The major advantages of NCS are a flexible architecture and a reduction of installation and maintenance costs, the main disadvantage of NCS is the network effects, such as time-delays, that influence the performance and stability of the control loop. These systems are also vulnerable to cyber attacks.This thesis makes some contributions regarding the detection of cyber-physical attacks as well as the development of a controller which capable of dealing with the other the bad effects of the network like time-delays.To achieve this goal, the proposed approach is to adapt model-free controller and to improve its use in NCS. The main idea is based on mutual benefit between Smith predictor and the basic model-free controller. Then, the intelligent structure of model-free control is applied along with Generalized Predictive Controller (GPC) to achieve the Intelligent Generalized Predictive Controller (IGPC) as an enhancement for the standard GPC. The IGPC is designed along with two different methods for cyber-attack detection.Moreover, a new security mechanism based on the deception for the cyber-physical attacks in NCS is proposed, this mechanism can allow to stop the cyber-attacks by providing the last line of defense when the attacker has an access to the remote plant.Finally, two detectors for controller hijacking attack are introduced. The objective is to be able to detect an attack such as the Stuxnet case where the controller has been reprogrammed and hijacked. The advantage of these proposed detectors is that there is not necessary to have a priori mathematical model of the controller
Abdo, Houssein. "Dealing with uncertainty in risk analysis : combining safety and security." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.
Full textRisk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
Sultan, Bastien. "Maîtrise des correctifs de sécurité pour les systèmes navals." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0220.
Full textOperating in constrained environments and composed of heterogeneous subsystems, today's ships are among the most complex objects that exist. Due to the increasing number of cyber assets among their components, patch and vulnerability management applied to naval systems is an essential process. The work detailed in this PhD thesis aims to define such a process tailored to complex cyber-physical systems. This process relies on a modelling method and formalism allowing to depict CPS behaviour and cyber events – a vulnerability discovery, a cyber attack occurrence or a patch deployment. It also relies on an impact assessment method, allowing to compute the effects of cyber events on CPS ability to fulfill their missions. These impacts are expressed through a specially designed metric aiming to help in decision-making. The process, methods, formalisms and metrics we propose in this work are then evaluated through an experimentation based on a fictitious case-study
Maudoux, Christophe. "Vers l’automatisation de la détection d’anomalies réseaux." Electronic Thesis or Diss., Paris, HESAM, 2024. http://www.theses.fr/2024HESAC009.
Full textWe live in a hyperconnected world. Currently, the majority of the objects surrounding us exchangedata either among themselves or with a server. These exchanges consequently generate networkactivity. It is the study of this network activity that interests us here and forms the focus of thisthesis. Indeed, all messages and thus the network traffic generated by these devices are intentionaland therefore legitimate. Consequently, it is perfectly formatted and known. Alongside this traffic,which can be termed ”normal,” there may exist traffic that does not adhere to expected criteria. Thesenon-conforming exchanges can be categorized as ”abnormal” traffic. This illegitimate traffic can bedue to several internal and external causes. Firstly, for purely commercial reasons, most of theseconnected devices (phones, watches, locks, cameras, etc.) are poorly, inadequately, or not protectedat all. Consequently, they have become prime targets for cybercriminals. Once compromised, thesecommunicating devices form networks capable of launching coordinated attacks : botnets. The trafficinduced by these attacks or the internal synchronization communications within these botnets thengenerates illegitimate traffic that needs to be detected. Our first contribution aims to highlight theseinternal exchanges, specific to botnets. Abnormal traffic can also be generated when unforeseen orextraordinary external events occur, such as incidents or changes in user behavior. These events canimpact the characteristics of the exchanged traffic flows, such as their volume, sources, destinations,or the network parameters that characterize them. Detecting these variations in network activity orthe fluctuation of these characteristics is the focus of our subsequent contributions. This involves aframework and resulting methodology that automates the detection of these network anomalies andpotentially raises real-time alerts
Koucham, Oualid. "Détection d'intrusions pour les systèmes de contrôle industriels." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT090/document.
Full textThe objective of this thesis is to develop intrusion detection and alert correlation techniques geared towards industrial control systems (ICS). Our interest is driven by the recent surge in cybersecurity incidents targeting ICS, and the necessity to detect targeted attacks which induce incorrect behavior at the level of the physical process.In the first part of this work, we develop an approach to automatically infer specifications over the sequential behavior of ICS. In particular, we rely on specification language formalisms such as linear temporal logic (LTL) and metric temporal logic (MTL) to express temporal properties over the state of the actuators and sensors. We develop an algorithm to automatically infer specifications from a set of specification patterns covering the most recurring properties. In particular, our approach aims at reducing the number of redundant and unfalsifiable properties generated by the existing approaches. To do so, we add a pre-selection stage which allows to restrict the search for valid properties over non redundant portions of the execution traces. We evaluate our approach on a complex physical process steered by several controllers under process oriented attacks. Our results show that a significant reduction in the number of inferred properties is possible while achieving high detection rates.In the second part of this work, we attempt to combine the physical domain intrusion detection approach developed in the first part with more classical cyber domain intrusion detection approaches. In particular, we develop an alert correlation approach which takes into account some specificities of ICS. First, we explore an alert enrichment approach that allows to map physical domain alerts into the cyber domain. This is motivated by the observation that alertscoming from different domains are characterized by heterogeneous attributes which makes any direct comparison of the alerts difficult. Instead, we enrich the physical domain alerts with cyber domain attributes given knowledge about the protocols supported by the controllers and the memory mapping of process variables within the controllers.In this work, we also explore ICS-specific alert selection policies. An alert selection policy defines which alerts will be selected for comparison by the correlator. Classical approaches often rely on sliding, fixed size, temporal windows as a basis for their selection policy. Instead, we argue that given the complex interdependencies between physical subprocesses, agreeing on analert window size is challenging. Instead, we adopt selection policies that adapt to the state of the physical process by dynamically adjusting the size of the alert windows given the state of the subprocesses within the physical process. Our evaluation results show that our correlator achieves better correlation metrics in comparison with classical temporal based approaches
Books on the topic "Cybersécurité"
Diouf, Moustapha. La Police nationale du Sénégal face au défi de la cybersécurité: Essai. Dakar: Abis éditions, 2019.
Find full textYann Salamon. Cybersécurité et cyberdéfense. Ellipses, 2020. http://dx.doi.org/10.14375/np.9782340044937.
Full textMonde en Cybersécurité: Initiation à la Cybersécurité Par la Pratique. Independently Published, 2021.
Find full textNgô, Christian. Énergie, entropie, information, cryptographie et cybersécurité. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-2349-9.
Full textNgô, Christian. Énergie, Entropie, Information, Cryptographie et Cybersécurité. EDP Sciences, 2021.
Find full textCybersécurité Au Québec: Enquête Sur la Cybersécurité Dans le Secteur Manufacturier et les Infrastructures Critiques. Independently Published, 2019.
Find full textHervé Mafille. Évaluation d’entreprise au regard des risques de cybersécurité. Arnaud Franel, 2021. http://dx.doi.org/10.14375/np.9782384910052.
Full textLeonetti, Xavier. Guide de cybersécurité: Droits, méthodes et bonnes pratiques. Editions L'Harmattan, 2015.
Find full textBook chapters on the topic "Cybersécurité"
Douaihy, Sylvana Al Baba, and Hugo Loiseau. "Cybersécurité." In Dictionnaire politique de la scène municipale québécoise, 94–98. Presses de l'Université Laval, 2024. http://dx.doi.org/10.2307/jj.10819587.22.
Full textDeschaux-Dutard, Delphine. "Chapitre 11. Cybersécurité internationale." In Introduction à la sécurité internationale, 209–25. Presses universitaires de Grenoble, 2018. http://dx.doi.org/10.3917/pug.dutar.2018.01.0209.
Full textATIEH, Mirna, Omar MOHAMMAD, Ali SABRA, and Nehme RMAYTI. "IdO, apprentissage profond et cybersécurité dans la maison connectée : une étude." In Cybersécurité des maisons intelligentes, 215–56. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch6.
Full textRAJU, Robinson, and Melody MOH. "Sécurité des équipements pour maison connectée : authentification, authentification mutuelle et gestion de clés." In Cybersécurité des maisons intelligentes, 81–130. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch2.
Full textGEBALI, Fayez, and Mohammad MAMUN. "Authentification avancée par PUF en télémédecine." In Cybersécurité des maisons intelligentes, 131–61. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch3.
Full textLATA, Manju, and Vikas KUMAR. "La sécurité des réseaux IdO dans la maison connectée." In Cybersécurité des maisons intelligentes, 163–84. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch4.
Full textZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE, and Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée." In Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Full textSCHMITT, Corinna, and Marvin WEBER. "Solution domotique pour SecureWSN." In Cybersécurité des maisons intelligentes, 1–79. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch1.
Full textSCHMITT, Corinna, Severin SIFFERT, and Burkhard STILLER. "sTiki : un protocole d’authentification mutuelle pour les dispositifs de détection contraints." In Cybersécurité des maisons intelligentes, 257–300. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch7.
Full textGALLAIS, Antoine, and Youcef IMINE. "Cybersécurité des systèmes industriels cyber-physiques." In Digitalisation et contrôle des systèmes industriels cyber-physiques, 115–35. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9085.ch6.
Full textConference papers on the topic "Cybersécurité"
Hautesserres, Thomas. "La cybersécurité des Opérateurs d'Importance Vitale en France." In Le nucléaire accélère sa transformation numérique. Les Ulis, France: EDP Sciences, 2017. http://dx.doi.org/10.1051/jtsfen/2017len5.1.
Full textde Maupeou, Stanislas. "Cybersécurité en entreprise étendue illustrée dans le cadre de BoostAeroSpace." In Le nucléaire accélère sa transformation numérique. Les Ulis, France: EDP Sciences, 2017. http://dx.doi.org/10.1051/jtsfen/2017len5.3.
Full textReports on the topic "Cybersécurité"
Gariépy, Félix, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, Pierre-Martin Tardif, Sébastien Gambs, and Steve Jacob. Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, February 2024. http://dx.doi.org/10.61737/afqc2028.
Full textAlaoui, Siham, Nadia Naffi, and Simon Collin. Les technologies éducatives en milieu scolaire et universitaire. Observatoire international sur les impacts sociétaux de l'IA et du numérique, June 2023. http://dx.doi.org/10.61737/nvtm1722.
Full textDans l'œil de l'Obvia - La cyberdiplomatie au service de la cybersécurité. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, November 2024. https://doi.org/10.61737/kewy2565.
Full text