New Search

If you are not happy with the results below please do another search

97 search results for: data protection

71

Hacked in mid-flight: detecting attacks on UAVs

A UAV (or drone) in flight can fall victim to different types of attacks. At Télécom SudParis, Alexandre Vervisch-Picois is working on a method for detecting attacks that spoof drones concerning their position. This research could be used for both military and civilian applications. He set out to deliver your package one morning, but it […]

72

High expectations for AI to ensure the security of new networks

As networks increasingly rely on new, primarily software-based architectures, the issue of security cannot be overlooked. Artificial intelligence is one field researchers are exploring to provide sufficient protection for these new networks, such as 5G (and beyond) and constrained networks such as the IoT. An approach explored in particular by cybersecurity researchers at IMT Lille […]

73

Joint AI: a platform to facilitate German-French research in AI

In 2019, The German-French Academy for the Industry of the Future launched the Joint AI platform project. This platform bringing together IMT and the Technical University of Munich, promotes collaboration between researchers and industry to develop artificial intelligence tools. Its secure environment allows for intellectual property protection for the results, and the reproducibility of scientific […]

74

How can industrial risk be assessed?

Safety is a key concern in the industrial sector. As such, studying risk represents a specialized field of research. Experiments in this area are particularly difficult to carry out, as they involve explosions and complicated measures. Frédéric Heymes, a researcher at IMT Mines Alès who specializes in industrial risk, discusses the unique aspects of this […]

75

Nuclear: a multitude of scenarios to help imagine the future of the industry

Article written in partnership with The Conversation. By Stéphanie Tillement and Nicolas Thiolliere, IMT Atlantique. [divider style=”normal” top=”20″ bottom=”20″] [dropcap]N[/dropcap]uclear energy plays a very important role in France – where 75 % of the country’s electricity is produced using this energy – and raises crucial questions concerning both its role in the future electricity mix […]

76

Domain name fraud: is the global internet in danger?

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] [dropcap]I[/dropcap]n late February 2019, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that manages the IP addresses and domain names used on the web, issued a warning on the risks of systemic Internet attacks. Here is what you need […]

77

When organizations respond to cyberattacks

Cyberattacks are a growing reality that organizations have to face up to. In the framework of the German-French Academy for the Industry of the Future, researchers at IMT and Technische Universität München (TUM) show that there are solutions to this virtual threat. In particular, the ASSET project is studying responses to attacks that target communication […]

78

BioDigital, a new technology to combat identity spoofing

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom SudParis belongs. The original version of this article was published in French on Télécom SudParis website [divider style=”normal” top=”20″ bottom=”20″] Following an 18-month collaboration agreement, Télécom SudParis (a member […]

79

Cybersecurity: high costs for companies

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] [dropcap]T[/dropcap]he world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ motivations. […]

80

Cybersecurity: new times, new challenges

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due […]