[HTML][HTML] Estimation and mapping of forest structure parameters from open access satellite images: Development of a generic method with a study case on coniferous …

…, D Guyon, L Villard, S Mermoz, A Bouvet, H Thevenon… - Remote Sensing, 2019 - mdpi.com
Temperate forests are under climatic and economic pressures. Public bodies, NGOs and
the wood industry are looking for accurate, current and affordable data driven solutions to …

[HTML][HTML] Analysis of the NO2 tropospheric product from S5P TROPOMI for monitoring pollution at city scale

…, O Lezeaux, C Camy-Peyret, H Thevenon - City and Environment …, 2020 - Elsevier
… NO 2 surface concentration is measured in mg/m 3 each 1 h. We derived daily values
from Airparif measurements obtained around 13:30 UTC to allow for a reasonably consistent …

A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms

NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …

Design and development of dc cables

JM Oudin, M Fallou, H Thevenon - IEEE Transactions on Power …, 1967 - ieeexplore.ieee.org
… Fallou, and H. Thevenon: The result of change in polarity is generally stronger as the relation
Rlr of radius on insulation to radius of conductor is higher. In the case of paper cables with …

Sécurisation de la couche physique des communications sans contact de type RFID et NFC

PH Thevenon - 2011 - theses.hal.science
L'avènement des communications en champ proche pour les transactions entre objets
portables téléalimentés de type RFID pose un problème de sécurité. En effet, ces …

[PDF][PDF] iMRC: Integrated monitoring & recovery component, a solution to guarantee the security of embedded systems

PH Thevenon, S Riou, DM Tran, M Puys… - Journal of Internet …, 2022 - researchgate.net
… Pierre-Henri Thevenon is a research engineer at the LETI institute, CEA (Commissariat `a
l’énergie atomique et aux énergies alternatives), specialized in the security of IoT and I-IoT. …

Madman: Detection of software attacks targeting hardware vulnerabilities

NF Polychronou, PH Thevenon, M Puys… - 2021 24th Euromicro …, 2021 - ieeexplore.ieee.org
The increasing complexity of modern microprocessors created new attack areas. Attackers
exploit these areas using Software Attacks Targeting Hardware Vulnerabilities (SATHV) such …

Hardware-in-the-loop labs for SCADA cybersecurity awareness and training

M Puys, PH Thevenon, S Mocanu - Proceedings of the 16th International …, 2021 - dl.acm.org
In this paper, we present a SCADA cybersecurity awareness and training program based on
a Hands-On training using two twin cyber-ranges named WonderICS and G-ICS. These …

On the weakness of contactless systems under relay attacks

PH Thevenon, O Savry, S Tedjini - SoftCOM 2011, 19th …, 2011 - ieeexplore.ieee.org
Contactless technology is a well explored area used in many different fields. However, the
lack of security in the physical layer has recently delayed its use in many applications like …

[PDF][PDF] WonderCloud, une plateforme pour l'analyse et l'émulation de micrologiciels ainsi que la composition de pots de miels

…, M Puys, PH Thevenon - Proc. of the 27th C&esar …, 2020 - cesar-conference.org
La caractérisation de la cybersécurité d’objets connectés ou d’équipement industriels
nécessite en général d’en disposer en vue de les analyser dans des environnements de tests …