- home
- Advanced Search
- Rural Digital Europe
- Publications
- Research data
- Other research products
- Conference object
- European Commission
- EC|H2020
- EC|H2020|RIA
- INRIA a CCSD electronic archive ser...
- Rural Digital Europe
- Publications
- Research data
- Other research products
- Conference object
- European Commission
- EC|H2020
- EC|H2020|RIA
- INRIA a CCSD electronic archive ser...
Loading
description Publicationkeyboard_double_arrow_right Conference object , Part of book or chapter of book 2022 Norway, FrancePublisher:IEEE Funded by:EC | ERATOSTHENESEC| ERATOSTHENESAuthors: Ferry, Nicolas; Dautov, Rustem; Song, Hui;Ferry, Nicolas; Dautov, Rustem; Song, Hui;handle: 11250/3025968
International audience; One of the most prominent implementations of the serverless programming model is Function-as-a-Service (FaaS). Using FaaS, application developers provide source code of serverless functions, typically describing only parts of a larger application, and define triggers for executing these functions on infrastructure components managed by the FaaS provider. There are still challenges that hinder the wider adoption of the FaaS model across the whole Cloud-Edge-IoT continuum. These include the high heterogeneity of the Edge and IoT infrastructure, vendor lock-in, the need to deploy and adapt serverless functions as well as their supporting services and software stacks into their cyber-physical execution environment. As a first step towards addressing these challenges, we introduce the \siot platform for the design, deployment, and maintenance of applications over the Cloud-Edge-IoT continuum. In particular, our platform enables the specification and deployment of serverless functions on Cloud and Edge resources, as well as the deployment of their supporting services and software stacks over the whole Cloud-Edge-IoT continuum.
SINTEF Open; Norwegi... arrow_drop_down SINTEF Open; Norwegian Open Research ArchivesPart of book or chapter of book . 2022add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccgrid54584.2022.00101&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert SINTEF Open; Norwegi... arrow_drop_down SINTEF Open; Norwegian Open Research ArchivesPart of book or chapter of book . 2022add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccgrid54584.2022.00101&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2021 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Abderrahim, Mohamed; Badonnel, Remi; Chrisment, Isabelle;Hemmer, Adrien; Abderrahim, Mohamed; Badonnel, Remi; Chrisment, Isabelle;International audience; The Internet of Things has known an important development. However, security management is still a key challenge in particular for deploying complex IoT systems that provide sophisticated services. In this paper, we design an ensemble learning-based architecture to support early security detection in the context of multi-step attacks, by leveraging the performance of different detection techniques. The architecture relies on a total of five major methods, including process mining, elliptic envelope, one class support vector machine, local outlier factor and isolation forest. We describe the main components of this architecture and their interactions, from the data preprocessing to the generation of alerts, through the calculation of scores. The different detection methods are executed in parallel, and their results are combined by an ensemble learning strategy in order to improve the overall detection performance. We develop a proof-of-concept prototype and perform a large set of experiments to quantify the benefits and limits of this approach based on industrial datasets.
Hal-Diderot arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615588&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu1 citations 1 popularity Average influence Average impulse Average Powered by BIP!more_vert Hal-Diderot arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615588&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2021 FrancePublisher:IEEE Funded by:EC | SPARTAEC| SPARTAAuthors: Junges, Pierre-Marie; François, Jérome; Festor, Olivier;Junges, Pierre-Marie; François, Jérome; Festor, Olivier;International audience; Internet-of-Things (IoT) devices or more generally embedded devices are nowadays commonly deployed in public, personal or work spaces despite suffering from security issues often related to their bad design and/or configuration. For instance, IoT botnets such as Mirai successfully compromised thousands of devices using a bruteforce method on a set of known credentials. Although brute-force attacks against a particular service (e.g. SSH, telnet) generate many packets which can be easily detected and mitigated, attackers can easily rely on TCP scans to assess the services present on a device while maintaining a high level of stealthiness. In this paper, we present a method to reconstruct precise information about an IoT device configuration (brand name, usernames, passwords, software components) from partial knowledge such as open ports revealed by a TCP scan. It relies on constituting a knowledge base from a large dataset of publicly accessible firmware serving as training multiple Random Forest (RF) classifiers. Using a dataset of 6935 embedded devices, the HTTP, SSH or DNS software names can be predicted with a precision higher than 80% with a limited knowledge. The correct HTTP, SSH or DNS versions can be inferred in more than 95% of cases after 1.4 trials on average. Similarly, our technique also predicts the password of at least one valid user in more than 97% of the cases after 1.15 trials on average.
Hyper Article en Lig... arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: CrossrefHal-DiderotConference object . 2021Full-Text: https://hal.inria.fr/hal-03470012/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615597&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert Hyper Article en Lig... arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: CrossrefHal-DiderotConference object . 2021Full-Text: https://hal.inria.fr/hal-03470012/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615597&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 France EnglishPublisher:HAL CCSD Funded by:EC | NoAWEC| NoAWAuthors: Jedwabny, Martin; Croitoru, Madalina; Bisquert, Pierre;Jedwabny, Martin; Croitoru, Madalina; Bisquert, Pierre;International audience; In this paper we consider a bipolar graph structure encoding conflicting knowledge with logic formulas. Gradual semantics provide a way to assign strength values in the unit interval to nodes (i.e. logical inference steps) in the bipolar graph. Here, we introduce a new class of semantics based on the notions of T-norms and T-conorms and show that they handle circular reasoning and satisfy desirable properties such as provability and rewriting.
HAL Descartes; INRIA... arrow_drop_down HAL Descartes; INRIA a CCSD electronic archive server; Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2020License: CC BY NCAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______2592::b4a36190918f7405e3256e893a09da50&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert HAL Descartes; INRIA... arrow_drop_down HAL Descartes; INRIA a CCSD electronic archive server; Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2020License: CC BY NCAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______2592::b4a36190918f7405e3256e893a09da50&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Conference object 2020 FrancePublisher:Association for the Advancement of Artificial Intelligence (AAAI) Funded by:EC | NoAWEC| NoAWAuthors: Hecham, Abdelraouf; Croitoru, Madalina; Bisquert, Pierre;Hecham, Abdelraouf; Croitoru, Madalina; Bisquert, Pierre;International audience; This demonstration paper introduces DAMN: a defeasible reasoning platform available on the web. It is geared towards decision making where each agent has its own knowledge base that can be combined with other agents to detect and visualize conflicts and potentially solve them using a semantics. It allows the use of different defeasible reasoning semantics (ambiguity blocking/propagating with or without team defeat) and integrates agent collaboration and visualization features.
Proceedings of the A... arrow_drop_down Proceedings of the AAAI Conference on Artificial IntelligenceArticle . 2020 . Peer-reviewedLicense: https://www.aaai.orgData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1609/aaai.v34i09.7093&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 1 citations 1 popularity Average influence Average impulse Average Powered by BIP!more_vert Proceedings of the A... arrow_drop_down Proceedings of the AAAI Conference on Artificial IntelligenceArticle . 2020 . Peer-reviewedLicense: https://www.aaai.orgData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1609/aaai.v34i09.7093&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Badonnel, Remi; François, Jérôme; Chrisment, Isabelle;Hemmer, Adrien; Badonnel, Remi; François, Jérôme; Chrisment, Isabelle;International audience; The development of the Internet has been characterized by a growing interest for the Internet-of-Things (IoT). In particular, connected devices are integrated to other Internet resources (such as cloud resources) to elaborate value-added services. However, they pose important challenges with respect to security management due to their heterogeneity, their distribution , and their limited resources. In this demonstration, we present a process mining toool for supporting IoT security. This tool is capable to automate the detection of misbehaviours and attacks in large and heterogeneous IoT infrastructures, based on process mining techniques combined with normalization and clustering data pre-processing. We detail the different building blocks of this tool provided into a docker container, and illustrate its operations with different scenarios.
Hal-Diderot arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE Copyrightadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110254&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert Hal-Diderot arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE Copyrightadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110254&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Badonnel, Remi; Chrisment, Isabelle;Hemmer, Adrien; Badonnel, Remi; Chrisment, Isabelle;International audience; The growing interest for the Internet-of-Things (IoT) is supported by the large-scale deployment of sensors and connected objects. These ones are integrated with other Internet resources in order to elaborate more complex and value-added systems and applications. While important efforts have been done for their protection, security management is a major challenge for these systems, due to their complexity, their heterogeneity and the limited resources of their devices. In this paper we introduce a process mining approach for detecting misbehaviors in such systems. It permits to characterize the behavioral models of IoT-based systems and to detect potential attacks, even in the case of heterogenous protocols and platforms. We then describe and formalize its underlying architecture and components, and detail a proof-of-concept prototype. Finally, we evaluate the performance of this solution through extensive experiments based on real industrial datasets.
https://hal.inria.fr... arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE CopyrightHAL - UPEC / UPEM; HAL-Pasteur; HAL-Inserm; Hal-DiderotConference object . 2020Full-Text: https://hal.inria.fr/hal-02402986/documentadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110411&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!more_vert https://hal.inria.fr... arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE CopyrightHAL - UPEC / UPEM; HAL-Pasteur; HAL-Inserm; Hal-DiderotConference object . 2020Full-Text: https://hal.inria.fr/hal-02402986/documentadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110411&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France, France, United Kingdom, FrancePublisher:ACM Funded by:EC | TeamPlayEC| TeamPlayBrown, Christopher; Barwell, Adam, D; Marquer, Yoann; Minh, Céline; Zendra, Olivier;handle: 10023/18619
Funding: This work was supported by the EU Horizon 2020 project, Team-Play (https://www.teamplay-h2020.eu), grant number 779882, and UK EPSRC Discovery, grant number EP/P020631/1. Energy, Time and Security (ETS) properties of programs are becoming increasingly prioritised by developers, especially where applications are running on ETS sensitive systems, such as embedded devices or the Internet of Things. Moreover, developers currently lack tools and language properties to allow them to reason about ETS. In this paper, we introduce a new contract specification frame-work, called Drive, which allows a developer to reason about ETS or other non-functional properties of their programs as first-class properties of the language. Furthermore, we introduce a contract specification language, allowing developers to reason about these first-class ETS properties by expressing contracts that are proved correct by an underlying formal type system. Finally, we show our contract framework over a number of representable examples, demonstrating provable worst-case ETS properties. Postprint
https://research-rep... arrow_drop_down https://doi.org/10.1145/335416...Other literature type . Conference object . 2019 . Peer-reviewedLicense: ACM Copyright PoliciesHal-DiderotConference object . 2019Full-Text: https://hal.inria.fr/hal-02314723/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3354166.3354171&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 3 citations 3 popularity Average influence Average impulse Average Powered by BIP!visibility 5visibility views 5 download downloads 82 Powered bymore_vert https://research-rep... arrow_drop_down https://doi.org/10.1145/335416...Other literature type . Conference object . 2019 . Peer-reviewedLicense: ACM Copyright PoliciesHal-DiderotConference object . 2019Full-Text: https://hal.inria.fr/hal-02314723/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3354166.3354171&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France EnglishPublisher:HAL CCSD Funded by:EC | GLOPACK, EC | NoAWEC| GLOPACK ,EC| NoAWAuthors: Jedwabny, Martin; Bisquert, Pierre; Croitoru, Madalina;Jedwabny, Martin; Bisquert, Pierre; Croitoru, Madalina;International audience; In this demonstration paper, we introduce PAPOW: Papow Aggre-gates Preferences and Orderings to select Winners. The tool allows fordemographic filtering of voters depending on their characteristics. Weshow its application on a use-case from the NoAW H2020 project.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______1398::5abaf138c1f235d91b19cf1e88a781f2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______1398::5abaf138c1f235d91b19cf1e88a781f2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France EnglishPublisher:HAL CCSD Funded by:EC | NoAWEC| NoAWAuthors: Yun, Bruno; Croitoru, Madalina; Vesic, Srdjan; Bisquert, Pierre;Yun, Bruno; Croitoru, Madalina; Vesic, Srdjan; Bisquert, Pierre;International audience; In this demonstration paper, we introduce NAKED : a new generator for n-ary logic-ased argumentation frameworks instantiated from incon-sistent knowledge bases expressed using Datalog±. The tool allows toimport a knowledge base in DLGP format, generate, visualise and exportthe corresponding argumentation hypergraph. We show its application ona use-case from the NoAW project.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3379::4defd1d740ef901d2d3a4f0e5964c734&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3379::4defd1d740ef901d2d3a4f0e5964c734&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
Loading
description Publicationkeyboard_double_arrow_right Conference object , Part of book or chapter of book 2022 Norway, FrancePublisher:IEEE Funded by:EC | ERATOSTHENESEC| ERATOSTHENESAuthors: Ferry, Nicolas; Dautov, Rustem; Song, Hui;Ferry, Nicolas; Dautov, Rustem; Song, Hui;handle: 11250/3025968
International audience; One of the most prominent implementations of the serverless programming model is Function-as-a-Service (FaaS). Using FaaS, application developers provide source code of serverless functions, typically describing only parts of a larger application, and define triggers for executing these functions on infrastructure components managed by the FaaS provider. There are still challenges that hinder the wider adoption of the FaaS model across the whole Cloud-Edge-IoT continuum. These include the high heterogeneity of the Edge and IoT infrastructure, vendor lock-in, the need to deploy and adapt serverless functions as well as their supporting services and software stacks into their cyber-physical execution environment. As a first step towards addressing these challenges, we introduce the \siot platform for the design, deployment, and maintenance of applications over the Cloud-Edge-IoT continuum. In particular, our platform enables the specification and deployment of serverless functions on Cloud and Edge resources, as well as the deployment of their supporting services and software stacks over the whole Cloud-Edge-IoT continuum.
SINTEF Open; Norwegi... arrow_drop_down SINTEF Open; Norwegian Open Research ArchivesPart of book or chapter of book . 2022add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccgrid54584.2022.00101&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert SINTEF Open; Norwegi... arrow_drop_down SINTEF Open; Norwegian Open Research ArchivesPart of book or chapter of book . 2022add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccgrid54584.2022.00101&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2021 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Abderrahim, Mohamed; Badonnel, Remi; Chrisment, Isabelle;Hemmer, Adrien; Abderrahim, Mohamed; Badonnel, Remi; Chrisment, Isabelle;International audience; The Internet of Things has known an important development. However, security management is still a key challenge in particular for deploying complex IoT systems that provide sophisticated services. In this paper, we design an ensemble learning-based architecture to support early security detection in the context of multi-step attacks, by leveraging the performance of different detection techniques. The architecture relies on a total of five major methods, including process mining, elliptic envelope, one class support vector machine, local outlier factor and isolation forest. We describe the main components of this architecture and their interactions, from the data preprocessing to the generation of alerts, through the calculation of scores. The different detection methods are executed in parallel, and their results are combined by an ensemble learning strategy in order to improve the overall detection performance. We develop a proof-of-concept prototype and perform a large set of experiments to quantify the benefits and limits of this approach based on industrial datasets.
Hal-Diderot arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615588&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu1 citations 1 popularity Average influence Average impulse Average Powered by BIP!more_vert Hal-Diderot arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615588&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2021 FrancePublisher:IEEE Funded by:EC | SPARTAEC| SPARTAAuthors: Junges, Pierre-Marie; François, Jérome; Festor, Olivier;Junges, Pierre-Marie; François, Jérome; Festor, Olivier;International audience; Internet-of-Things (IoT) devices or more generally embedded devices are nowadays commonly deployed in public, personal or work spaces despite suffering from security issues often related to their bad design and/or configuration. For instance, IoT botnets such as Mirai successfully compromised thousands of devices using a bruteforce method on a set of known credentials. Although brute-force attacks against a particular service (e.g. SSH, telnet) generate many packets which can be easily detected and mitigated, attackers can easily rely on TCP scans to assess the services present on a device while maintaining a high level of stealthiness. In this paper, we present a method to reconstruct precise information about an IoT device configuration (brand name, usernames, passwords, software components) from partial knowledge such as open ports revealed by a TCP scan. It relies on constituting a knowledge base from a large dataset of publicly accessible firmware serving as training multiple Random Forest (RF) classifiers. Using a dataset of 6935 embedded devices, the HTTP, SSH or DNS software names can be predicted with a precision higher than 80% with a limited knowledge. The correct HTTP, SSH or DNS versions can be inferred in more than 95% of cases after 1.4 trials on average. Similarly, our technique also predicts the password of at least one valid user in more than 97% of the cases after 1.15 trials on average.
Hyper Article en Lig... arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: CrossrefHal-DiderotConference object . 2021Full-Text: https://hal.inria.fr/hal-03470012/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615597&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert Hyper Article en Lig... arrow_drop_down https://doi.org/10.23919/cnsm5...Conference object . 2021 . Peer-reviewedLicense: STM Policy #29Data sources: CrossrefHal-DiderotConference object . 2021Full-Text: https://hal.inria.fr/hal-03470012/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.23919/cnsm52442.2021.9615597&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 France EnglishPublisher:HAL CCSD Funded by:EC | NoAWEC| NoAWAuthors: Jedwabny, Martin; Croitoru, Madalina; Bisquert, Pierre;Jedwabny, Martin; Croitoru, Madalina; Bisquert, Pierre;International audience; In this paper we consider a bipolar graph structure encoding conflicting knowledge with logic formulas. Gradual semantics provide a way to assign strength values in the unit interval to nodes (i.e. logical inference steps) in the bipolar graph. Here, we introduce a new class of semantics based on the notions of T-norms and T-conorms and show that they handle circular reasoning and satisfy desirable properties such as provability and rewriting.
HAL Descartes; INRIA... arrow_drop_down HAL Descartes; INRIA a CCSD electronic archive server; Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2020License: CC BY NCAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______2592::b4a36190918f7405e3256e893a09da50&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert HAL Descartes; INRIA... arrow_drop_down HAL Descartes; INRIA a CCSD electronic archive server; Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2020License: CC BY NCAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______2592::b4a36190918f7405e3256e893a09da50&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Conference object 2020 FrancePublisher:Association for the Advancement of Artificial Intelligence (AAAI) Funded by:EC | NoAWEC| NoAWAuthors: Hecham, Abdelraouf; Croitoru, Madalina; Bisquert, Pierre;Hecham, Abdelraouf; Croitoru, Madalina; Bisquert, Pierre;International audience; This demonstration paper introduces DAMN: a defeasible reasoning platform available on the web. It is geared towards decision making where each agent has its own knowledge base that can be combined with other agents to detect and visualize conflicts and potentially solve them using a semantics. It allows the use of different defeasible reasoning semantics (ambiguity blocking/propagating with or without team defeat) and integrates agent collaboration and visualization features.
Proceedings of the A... arrow_drop_down Proceedings of the AAAI Conference on Artificial IntelligenceArticle . 2020 . Peer-reviewedLicense: https://www.aaai.orgData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1609/aaai.v34i09.7093&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 1 citations 1 popularity Average influence Average impulse Average Powered by BIP!more_vert Proceedings of the A... arrow_drop_down Proceedings of the AAAI Conference on Artificial IntelligenceArticle . 2020 . Peer-reviewedLicense: https://www.aaai.orgData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1609/aaai.v34i09.7093&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Badonnel, Remi; François, Jérôme; Chrisment, Isabelle;Hemmer, Adrien; Badonnel, Remi; François, Jérôme; Chrisment, Isabelle;International audience; The development of the Internet has been characterized by a growing interest for the Internet-of-Things (IoT). In particular, connected devices are integrated to other Internet resources (such as cloud resources) to elaborate value-added services. However, they pose important challenges with respect to security management due to their heterogeneity, their distribution , and their limited resources. In this demonstration, we present a process mining toool for supporting IoT security. This tool is capable to automate the detection of misbehaviours and attacks in large and heterogeneous IoT infrastructures, based on process mining techniques combined with normalization and clustering data pre-processing. We detail the different building blocks of this tool provided into a docker container, and illustrate its operations with different scenarios.
Hal-Diderot arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE Copyrightadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110254&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert Hal-Diderot arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE Copyrightadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110254&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2020 FrancePublisher:IEEE Funded by:EC | SecureIoTEC| SecureIoTAuthors: Hemmer, Adrien; Badonnel, Remi; Chrisment, Isabelle;Hemmer, Adrien; Badonnel, Remi; Chrisment, Isabelle;International audience; The growing interest for the Internet-of-Things (IoT) is supported by the large-scale deployment of sensors and connected objects. These ones are integrated with other Internet resources in order to elaborate more complex and value-added systems and applications. While important efforts have been done for their protection, security management is a major challenge for these systems, due to their complexity, their heterogeneity and the limited resources of their devices. In this paper we introduce a process mining approach for detecting misbehaviors in such systems. It permits to characterize the behavioral models of IoT-based systems and to detect potential attacks, even in the case of heterogenous protocols and platforms. We then describe and formalize its underlying architecture and components, and detail a proof-of-concept prototype. Finally, we evaluate the performance of this solution through extensive experiments based on real industrial datasets.
https://hal.inria.fr... arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE CopyrightHAL - UPEC / UPEM; HAL-Pasteur; HAL-Inserm; Hal-DiderotConference object . 2020Full-Text: https://hal.inria.fr/hal-02402986/documentadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110411&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!more_vert https://hal.inria.fr... arrow_drop_down https://doi.org/10.1109/noms47...Other literature type . Conference object . 2020 . Peer-reviewedLicense: IEEE CopyrightHAL - UPEC / UPEM; HAL-Pasteur; HAL-Inserm; Hal-DiderotConference object . 2020Full-Text: https://hal.inria.fr/hal-02402986/documentadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/noms47738.2020.9110411&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France, France, United Kingdom, FrancePublisher:ACM Funded by:EC | TeamPlayEC| TeamPlayBrown, Christopher; Barwell, Adam, D; Marquer, Yoann; Minh, Céline; Zendra, Olivier;handle: 10023/18619
Funding: This work was supported by the EU Horizon 2020 project, Team-Play (https://www.teamplay-h2020.eu), grant number 779882, and UK EPSRC Discovery, grant number EP/P020631/1. Energy, Time and Security (ETS) properties of programs are becoming increasingly prioritised by developers, especially where applications are running on ETS sensitive systems, such as embedded devices or the Internet of Things. Moreover, developers currently lack tools and language properties to allow them to reason about ETS. In this paper, we introduce a new contract specification frame-work, called Drive, which allows a developer to reason about ETS or other non-functional properties of their programs as first-class properties of the language. Furthermore, we introduce a contract specification language, allowing developers to reason about these first-class ETS properties by expressing contracts that are proved correct by an underlying formal type system. Finally, we show our contract framework over a number of representable examples, demonstrating provable worst-case ETS properties. Postprint
https://research-rep... arrow_drop_down https://doi.org/10.1145/335416...Other literature type . Conference object . 2019 . Peer-reviewedLicense: ACM Copyright PoliciesHal-DiderotConference object . 2019Full-Text: https://hal.inria.fr/hal-02314723/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3354166.3354171&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 3 citations 3 popularity Average influence Average impulse Average Powered by BIP!visibility 5visibility views 5 download downloads 82 Powered bymore_vert https://research-rep... arrow_drop_down https://doi.org/10.1145/335416...Other literature type . Conference object . 2019 . Peer-reviewedLicense: ACM Copyright PoliciesHal-DiderotConference object . 2019Full-Text: https://hal.inria.fr/hal-02314723/documentData sources: Hal-Diderotadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3354166.3354171&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France EnglishPublisher:HAL CCSD Funded by:EC | GLOPACK, EC | NoAWEC| GLOPACK ,EC| NoAWAuthors: Jedwabny, Martin; Bisquert, Pierre; Croitoru, Madalina;Jedwabny, Martin; Bisquert, Pierre; Croitoru, Madalina;International audience; In this demonstration paper, we introduce PAPOW: Papow Aggre-gates Preferences and Orderings to select Winners. The tool allows fordemographic filtering of voters depending on their characteristics. Weshow its application on a use-case from the NoAW H2020 project.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______1398::5abaf138c1f235d91b19cf1e88a781f2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______1398::5abaf138c1f235d91b19cf1e88a781f2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object 2019 France EnglishPublisher:HAL CCSD Funded by:EC | NoAWEC| NoAWAuthors: Yun, Bruno; Croitoru, Madalina; Vesic, Srdjan; Bisquert, Pierre;Yun, Bruno; Croitoru, Madalina; Vesic, Srdjan; Bisquert, Pierre;International audience; In this demonstration paper, we introduce NAKED : a new generator for n-ary logic-ased argumentation frameworks instantiated from incon-sistent knowledge bases expressed using Datalog±. The tool allows toimport a knowledge base in DLGP format, generate, visualise and exportthe corresponding argumentation hypergraph. We show its application ona use-case from the NoAW project.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3379::4defd1d740ef901d2d3a4f0e5964c734&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu0 citations 0 popularity Average influence Average impulse Average Powered by BIP!more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3379::4defd1d740ef901d2d3a4f0e5964c734&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu