Liste complète des publications

Note : En informatique, les auteurs sont généralement listés par ordre alphabétique (parfois par institution puis par ordre alphabétique).

Légende :

  • D. Sauveron : Ma position dans la liste des auteurs.
  • * : Étudiant (Doctorat / HDR) sous ma supervision au moment de la publication.

Résumé des publications

Catégorie Préfixe Nombre
Revues Internationales [J] 32
Conférences Internationales avec Actes [C] 35
Éditeur Invité (Numéros Spéciaux) [GE] 14
Chapitres de livres [BC] 9
Éditeur de Livres et Actes [E] 7
Conférences Internationales sans Actes [CW] 5
Conférences Nationales [NC] 4
Autres (Rapports, Thèses, Posters) [O] 6
Total 112

Revues Internationales (International Journals)

  • [J32] I. Mansour, M. Hamroun, S. Lajmi, R. Abassi, D. Sauveron. Hybrid Deep Learning Models for Arabic Sign Language Recognition in Healthcare Applications. Big Data and Cognitive Computing 9(11), 2025.
  • [J31] J. de Bonfils Lavernelle*, D. Sauveron, P.-F. Bonnefoi, B. Gonzalvo. Deferred DMA Attack: A Threat for Bypassing the IOMMU in Dynamic Hypervisors. IEEE Access, 2025.
  • [J30] M. Hamroun*, D. Sauveron. A Hybrid Deep Learning and Knowledge Graph Approach for Intelligent Image Indexing and Retrieval. Applied Sciences 15(19), 2025.
  • [J29] J. de Bonfils Lavernelle*, D. Sauveron, P.-F. Bonnefoi, B. Gonzalvo. Concepts and generic model for isolation: A basis for assessing isolation solutions. Human-centric Computing and Information Sciences, 2025.
  • [J28] K. Markantonakis, J.A. Meister, I. Gurulian, C. Shepherd, R.N. Akram, S.A. Ghazalah, M. Kasi, D. Sauveron, G. Hancke. Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access, 2024.
  • [J27] K. Markantonakis, G. Arfaoui, S.A. Ghazalah, C. Shepherd, R.N. Akram, D. Sauveron. CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management. Smart Cities 7(5), 2024.
  • [J26] J. de Bonfils Lavernelle*, P.-F. Bonnefoi, B. Gonzalvo, D. Sauveron. Assessment of spatial isolation in Jailhouse: Towards a generic approach. Computer Networks 245, 2024.
  • [J25] F. Thomas-Brans*, A. Fukami, Q. Clement, T. Heckmann, D. Sauveron. Case of study for in situ Memory Reading on Damaged MultiMedia Card. Forensic Science International: Digital Investigation, 2024.
  • [J24] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, V. Petit, A.K. Duong, D. Sauveron. Federated Learning: Centralized and P2P for a Siamese Deep Learning Model for Diabetes Foot Ulcer Classification. Applied Sciences 13(23), 2023.
  • [J23] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, A.K. Duong, V. Petit, D. Sauveron. DFU-Helper: An Innovative Framework for Longitudinal Diabetic Foot Ulcer Diseases Evaluation Using Deep Learning. Applied Sciences 13(18), 2023.
  • [J22] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, V. Petit, A.K. Duong, D. Sauveron. DFU-SIAM a Novel Diabetic Foot Ulcer Classification with Deep Learning. IEEE Access, 2023.
  • [J21] L. Moreau*, E. Conchon, D. Sauveron. An Adaptive Simultaneous Multi-Protocol Extension of CRAFT. Sensors 23(8), 2023.
  • [J20] A. Ben Chehida Douss, R. Abassi, D. Sauveron. State-of-the-art survey of in-vehicle protocols and automotive Ethernet security and vulnerabilities. Mathematical Biosciences and Engineering 20(9), 2023.
  • [J19] F. Thomas-Brans*, T. Heckmann, K. Markantonakis, D. Sauveron. New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards. IEEE Access, 2022.
  • [J18] M.K. Kasi, S.A. Ghazalah, R.N. Akram, D. Sauveron. Secure mobile edge server placement using multi-agent reinforcement learning. Electronics 10(17), 2021.
  • [J17] B. Velusamy, K. Karunanithy, D. Sauveron, R.N. Akram, J. Cho. Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks. Electronics 10(15), 2021.
  • [J16] H. Rhim, D. Sauveron, R. Abassi, K. Tamine, S. Guemara. A Secure protocol against Selfish and Pollution attacker misbehaviour in clustered WSNs. Electronics 10(11), 2021.
  • [J15] L. Moreau*, E. Conchon, D. Sauveron. CRAFT: A Continuous Remote Attestation Framework for IoT. IEEE Access, 2021.
  • [J14] T. Heckmann, T. Souvignet, D. Sauveron, D. Naccache. Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories… Forensic Science International: Digital Investigation 36, 2021.
  • [J13] O. Blazy, E. Conchon, M. Klingler*, D. Sauveron. An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems. IEEE Access, 2021.
  • [J12] R. Abassi, A. Ben Chehida Douss, D. Sauveron. TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks. Human-centric Computing and Information Sciences 10(1), 2020.
  • [J11] P. Combeau, S. Joumessi-Demeffo, A. Julien-Vergonjanne, L. Aveneau, S. Sahuguède, H. Boeglen, D. Sauveron. Optical wireless channel simulation for communications inside aircraft cockpits. Journal of Lightwave Technology 38(20), 2020.
  • [J10] F. Merabet, A. Cherif, M. Belkadi, O. Blazy, E. Conchon, D. Sauveron. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. Peer-to-Peer Networking and Applications, 2019.
  • [J9] I. Belkacem, S. Nait-Bahloul, D. Sauveron. Enhancing dependability through profiling in the collaborative internet of things. Multimedia Tools and Applications 78, 2019.
  • [J8] A. Cherif*, M. Belkadi, D. Sauveron. A Lightweight & Secure Data Collection Serverless Protocol Demonstrated in an Active RFIDs scenario. ACM Transactions on Embedded Computing Systems 18, 2019.
  • [J7] H. Rhim, K. Tamine, R. Abassi, D. Sauveron, S. Guemara. A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks. Human-centric Computing and Information Sciences 8(1), 2018.
  • [J6] R.N. Akram, K. Markantonakis, D. Sauveron. Recovering from a Lost Digital Wallet: A Smart Cards Perspective - Extended Abstract. Pervasive and Mobile Computing 29, 2016.
  • [J5] R.N. Akram, K. Markantonakis, D. Sauveron. A Novel Consumer-Centric Card Management Architecture and Potential Security Issues. Information Sciences 321, 2015.
  • [J4] D. Sauveron. Multiapplication Smart Card: Towards an Open Smart Card? Information Security Technical Report (ISTR) 14(2), 2009.
  • [J3] S. Chaumette, D. Sauveron. Smart cards and remote computing: Interaction or convergence? Information Security Technical Report (ISTR) 14(2), 2009.
  • [J2] P. Dusart, D. Sauveron, K. Tai-Hoon. Some limits of Common Criteria certification. International Journal of Security and Its Applications (IJSIA) 2(4), 2008.
  • [J1] P.-F. Bonnefoi, D. Sauveron, J.H. Park. MANETS: an exclusive choice between use and security? COMPUTING AND INFORMATICS 27(5), 2008.

Éditeur de livres et actes (Book Editor & Conference Proceedings Editor)

  • [E7] S. Bouzefrane, D. Sauveron (Eds.). Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. 14th IFIP WG 11.2 International Conference, WISTP 2024. Springer LNCS 14625, 2024.
  • [E6] D. Maimut, A.G. Oprina, D. Sauveron (Eds.). Innovative Security Solutions for Information Technology and Communications 13th International Conference, SecITC 2020. Springer LNCS 12596, 2021.
  • [E5] D. Naccache, D. Sauveron (Eds.). Information Security Theory and Practices… 8th IFIP WG 11.2 International Workshop, WISTP 2014. Springer LNCS 8501, 2014.
  • [E4] P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.). Information Security Theory and Practices… Fourth IFIP WG 11.2 International Workshop, WISTP 2010. Springer LNCS 6033, 2010.
  • [E3] T.-H. Kim, H. Adeli, H. Chang, J.H. Park, D. Sauveron, X. Wang, Y.-S. Jeong (Eds.). Advances in Computational Science and Engineering. Second International Conference, FGCN 2008. Springer, 2008.
  • [E2] J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, K. Markantonakis (Eds.). Information Security Theory and Practices… Second IFIP WG 11.2 International Workshop, WISTP 2008. Springer LNCS 5019, 2008.
  • [E1] D. Sauveron, K. Markantonakis, A. Bilas, A. J.-J. Quisquater (Eds.). Information Security Theory and Practices… First IFIP WG 11.2 International Workshop, WISTP 2007. Springer LNCS 4462, 2007.

Éditeur invité (Guest Editor of Special Issues)

  • [GE14] S.S. Yeo, D. Sauveron. Special Issue on Security and Privacy for IoT and Multimedia Services. Electronics, MDPI, 2021.
  • [GE13] J. Kim, K. Choi, D. Sauveron. Special Issue on Soft Computing for Network and System Security of Internet of Everything. Applied Soft Computing, Elsevier, 2020.
  • [GE12] R.N. Akram, H.-H. Chen, J. Lopez, D. Sauveron, L.T. Yang (Eds.). Special Issue on Security, Privacy and Trust of the User-centric Solutions. Future Generation Computer Systems, Elsevier, 2018.
  • [GE11] G.P. Hancke, A. Mitrokotsa, R. Safavi-Naini, D. Sauveron (Eds.). Special Issue on Recent Advances in Physical-Layer Security. Computer Networks, Elsevier, 2016.
  • [GE10] N. Mentes, D. Sauveron, J.M. Sierra Cámara, S.J. Wang, I. Woungang (Eds.). Special Issue on Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices. IET Information Security, 2016.
  • [GE9] S.S. Yeo, H. Chang, W. Chen, N.K. Chilamkurti, S. Rho, D. Sauveron (Eds.). Special Issue on Advanced Service Technology and Application in Smart Sensor Networks. International Journal of Distributed Sensor Networks, Hindawi, 2015.
  • [GE8] D. Sauveron, K. Markantonakis, C. Verikoukis (Eds.). Special Issue on Security and Resilience for Smart Devices and Applications. EURASIP Journal on Wireless Communications and Networking, Springer, 2014.
  • [GE7] Y.-S. Jeong, D. Sauveron, J.H. Park (Eds.). Special Issue on Advanced Security Technologies and Services for Future Computing Environments. The Computer Journal, Oxford University Press, 2013.
  • [GE6] S. Rho, D. Sauveron, W. Chen (Eds.). Special Issue on Advanced Signal Processing and HCI Issues for Interactive Multimedia Services. Multimedia Tools and Applications, Springer, 2013.
  • [GE5] S. Rho, D. Sauveron, K. Markantonakis (Eds.). Special Issue on Advanced Semantic and Social Multimedia Technologies for Future Computing Environment. Multimedia Tools and Applications, Springer, 2013.
  • [GE4] B. Preneel, J. Kim, D. Sauveron (Eds.). Special Issue on Advanced theory and practice for cryptography and future security. Mathematical and Computer Modelling, Elsevier, 2012.
  • [GE3] J.H. Park, S.-J. Wang, D. Sauveron (Eds.). Special Issue on Security technologies and applications for convergence environments. Security and Communication Networks, Wiley, 2012.
  • [GE2] J.H. Park, H.-C. Chao, D. Sauveron, Y. Xiang (Eds.). Special Issue on Intelligent Internet Computing: Applications and Security Systems. Journal of Internet Technology, 2010.
  • [GE1] S.S. Yeo, J.H. Park, K.P. Arnett, K.K. Lai, D. Sauveron, T. Tabata (Eds.). Special Issue on Advances and Challenges of Security in Web and Pervasive Computing Environments. International Journal of Security and Its Applications, 2008.

Chapitres de livre (Book Chapters)

  • [BC9] D. Reinhardt, D. Sauveron. Data security and privacy in the Internet-of-Things. In Information Security: Foundations, Technologies and Applications, IET, 2018.
  • [BC8] K. Namuduri, D. Sauveron. Safety, Security and Privacy Aspects in UAV Networks. In UAV Networks and Communications, Cambridge University Press, 2017.
  • [BC7] D. Sauveron, R.N. Akram, K. Markantonakis. Smart Card Reader and Mobile APIS. In Smart Cards, Tokens, Security and Applications, Springer, 2017.
  • [BC6] D. Sauveron, S. Chaumette. Wireless Sensor Nodes. In Secure Smart Embedded Devices, Platforms and Applications, Springer, 2014.
  • [BC5] J. Albert, L. Barrère, S. Chaumette, D. Sauveron. Wireless Sensor Languages and programming/Developments/Tools/Examples. In Secure Smart Embedded Devices, Platforms and Applications, Springer, 2014.
  • [BC4] S. Bouzefrane, D. Sauveron, J. Cordry, K. Garri. Mise en œuvre d’une application, choix de solutions, performances. In Les cartes à puce, Hermes, 2013.
  • [BC3] D. Sauveron. Smart Card Reader APIS. In Smart Cards, Tokens, Security and Applications, Springer, 2008.
  • [BC2] M. Tunstall, K. Markantonakis, D. Sauveron, K. Mayes. Smart Cards: Communication Protocols and Applications. In Handbook of Computer Networks, Wiley, 2007.
  • [BC1] K. Markantonakis, K. Mayes, M. Tunstall, D. Sauveron, F. Piper. Smart Card Security. In Computational Intelligence in Information Assurance and Security, Springer, 2007.

Conférences Internationales avec Actes (International Conferences with Proceedings)

  • [C35] F. Merabet*, Y. Challal, E. Conchon, D. Sauveron. Hash-based Threshold Group RFID Authentication Protocol for Medical IoT Applications. AICCSA 2025, Doha, Qatar.
  • [C34] J. de Bonfils Lavernelle*, P.-F. Bonnefoi, B. Gonzalvo, D. Sauveron. DMA: A persistent threat to embedded systems isolation. IEEE TrustCom-24, Sanya, China.
  • [C33] C. Verdeyen, C. Shepherd, K. Markantonakis, R.N. Akram, R. Milroy, S.A. Ghazalah, D. Sauveron. DECML: Distributed Edge Consensus Machine Learning Framework. GCAIoT 2024, Dubai, UAE.
  • [C32] M.S.A. Toofanee*, N.Z.A. Pooloo, S. Dowlut, K. Tamine, D. Sauveron. Analyzing Online Media Articles on Diabetes using Natural Language Processing: A Comparative Study of Indian Ocean Region and France. NLPML 2023, Zurich, Switzerland.
  • [C31] H. Rhim, K. Tamine, R. Abassi, D. Sauveron, S. Guemara. Enhancing security using digital signature in an efficient Network Coding-enabled WSN. SSD 2021, Monastir, Tunisia.
  • [C30] H. Rhim, R. Abassi, K. Tamine, D. Sauveron, S. Guemara. A Secure Network Coding-enabled approach for a Confidential Cluster-based Routing in Wireless Sensor Networks. SAC 2020, Brno, Czech Republic.
  • [C29] B. Bounab, S. Chaumette, A. Zemmari, D. Sauveron. Detection of Clone Attacks in Swarms of Autonomous Aircraft Systems. DASC 2019, San Diego, USA.
  • [C28] S. Joumessi-Demeffo, S. Sahuguède, D. Sauveron, A. Julien-Vergonjanne, P. Combeau, B. Mercier, L. Aveneau, H. Boeglen. A Link Reliability Study of Optical Wireless Headset inside Aircraft Cockpit. GLC 2019, Paris, France.
  • [C27] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, A. Cherif*, D. Sauveron, S. Chaumette. A Secure and Trusted Channel Protocol for UAVs Fleets. WISTP 2017, Heraklion, Greece.
  • [C26] C. Mtita, M. Laurent, D. Sauveron, R.N. Akram, K. Markantonakis, S. Chaumette. Serverless protocols for inventory and tracking with a UAV. DASC 2017, St. Petersburg, USA.
  • [C25] R.N. Akram, K. Markantonakis, K. Mayes, O. Habachi, D. Sauveron, A. Steyven, S. Chaumette. Security, privacy and safety evaluation of dynamic and static fleets of drones. DASC 2017, St. Petersburg, USA.
  • [C24] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. DASC 2016, Sacramento, USA.
  • [C23] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. Security and Performance Comparisons for Different Secure Channel Protocols for Avionics Wireless Networks. DASC 2016, Sacramento, USA.
  • [C22] R.N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. IEEE TrustCom-16, Tianjin, China.
  • [C21] C. Shepherd, R. Lee, I. Gurulian, G. Arfaoui, R.N. Akram, K. Markantonakis, E. Conchon, D. Sauveron. Secure and Trusted Execution: Past, Present and Future – A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. IEEE TrustCom-16, Tianjin, China.
  • [C20] R.N. Akram, K. Markantonakis, D. Sauveron, K. Mayes. Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures. IEEE TrustCom-15, Helsinki, Finland.
  • [C19] P.-F. Bonnefoi, P. Dusart, D. Sauveron, R.N. Akram, K. Markantonakis. A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags. IEEE TrustCom-15, Helsinki, Finland.
  • [C18] R.N. Akram, K. Markantonakis, D. Sauveron. Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. IEEE TrustCom-14, Beijing, China.
  • [C17] K. Markantonakis, K. Mayes, D. Sauveron, I.G. Askoxylakis. Overview of Security Threats for Smart Cards in the Public Transport Industry. ICEBE 2008, Xi’an, China.
  • [C16] I.G. Askoxylakis, D. Sauveron, K. Markantonakis, T. Tryfonas, A. Traganitis. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. SECURWARE 2008, Cap Esterel, France.
  • [C15] P. Dusart, D. Sauveron. Which trust can be expected of the Common Criteria certification at end-user level? IAN 2007, Jeju Island, Korea.
  • [C14] S. Chaumette, S. Eonet, J. Gimenez, D. Sauveron. Evaluation and comparison of the PRNG of different brands of Java Cards. e-Smart 2007, Nice, France.
  • [C13] S. Chaumette, A. Karray, D. Sauveron. Extended Secure Memory for a Java Card in the Context of the Java Card Grid project. NordSec 2006, Linköping, Sweden.
  • [C12] E. Atallah, P.-F. Bonnefoi, C. Burgod, D. Sauveron. Mobile AD hoc Network with Embedded Secure System. AmI.d 2006, Nice, France.
  • [C11] S. Chaumette, K. Markantonakis, K. Mayes, D. Sauveron. The Mobile Java Card Grid Project. e-Smart 2006, Nice, France.
  • [C10] S. Chaumette, D. Sauveron. A High Level Security Framework for the Grid: the Java Card Grid Testbed. HPC&S 2006, Bonn, Germany.
  • [C9] S. Chaumette, A. Karray, D. Sauveron. The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. WOSIS 2006, Phaos, Cyprus.
  • [C8] S. Chaumette, A. Karray, D. Sauveron. Secure Collaborative and Distributed Services in the Java Card Grid Platform. COLSEC'06, Las Vegas, USA.
  • [C7] S. Chaumette, D. Sauveron. Some security problems raised by open multiapplication smart cards. NordSec 2005, Tartu, Estonia.
  • [C6] E. Atallah, S. Chaumette, F. Darrigade, A. Karray, D. Sauveron. A Grid of Java Cards to Deal with Security Demanding Application Domains. E-Smart 2005, Nice, France.
  • [C5] P.-F. Bonnefoi, P. Poulingeas, D. Sauveron. MADNESS: A Framework Proposal for Securing Work in Ad Hoc Networks. CCCT'05, Austin, USA.
  • [C4] S. Chaumette, D. Sauveron. An efficient and simple way to test the security of Java Cards. WOSIS 2005, Miami, USA.
  • [C3] S. Chaumette, P. Grange, A. Karray, D. Sauveron, P. Vignéras. Secure distributed computing on a Java Card Grid. IPDPS 2005, Denver, USA.
  • [C2] S. Chaumette, P. Grange, D. Sauveron, P. Vignéras. Computing with Java Cards. CCCT'03, Orlando, USA.
  • [C1] S. Chaumette, I. Hatchondo, D. Sauveron. JCAT: An environment for attack and test on Java Card. CCCT'03, Orlando, USA.

Conférences Internationales sans Actes (International Conferences without Proceedings)

  • [CW5] D. Sauveron. A Brief Overview of Security Proposals for UAV-based Solutions. 5th AETOS Unmanned and Swarming International Conference, Bordeaux, 2018.
  • [CW4] O. Blazy, P.-F. Bonnefoi, E. Conchon, D. Sauveron, R.N. Akram, K. Markantonakis, K. Mayes, S. Chaumette. An efficient protocol for UAS security. ICNS 2017, Herndon, USA.
  • [CW3] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. A secure and trusted protocol for enhancing safety of on-ground airplanes using UAVs. ICNS 2017, Herndon, USA.
  • [CW2] A. Cherif*, D. Sauveron, M. Belkadi. Overview on Formal Verification Methods for RFID Protocols. IWCA 2016, Oran, Algeria.
  • [CW1] R.N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Improving Security of Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements - A Position Paper. 2nd AETOS international conference, Bordeaux, 2014.

Conférences Nationales (National Conferences)

  • [NC4] S. Joumessi-Demeffo, S. Sahuguède, D. Sauveron, A. Julien-Vergonjanne, P. Combeau, B. Mercier, L. Aveneau, H. Boeglen. Casque audio connecté par optique sans fil dans le poste de pilotage d’un avion de ligne. PLUMEE 2019, Limoges, France.
  • [NC3] S. Chaumette, A. Karray, D. Sauveron. Gestion de la Sécurité pour l’Extraction Parallèle Distribuée des Connaissances. EGC 2006, Lille, France.
  • [NC2] P. Dusart, D. Sauveron. La guerre du développement numérique. Menaces sur la confidentialité des photos numériques. 3ème Symposium SSTIC, Rennes, 2005.
  • [NC1] S. Chaumette, D. Sauveron. Modèles de mémoire en Java Card. Introduction du concept de pré-persistance. MAJECSTIC’04, Calais, 2004.

Autres (Vulgarisation, Rapports de recherche, Mémoires, Posters)

  • [O6] D. Sauveron. La généralisation de l’usage informatique cause-t-elle de nouvelles guerres, voire de plus en plus de cyberguerres ? Donne ta langue au chercheur, 2025.
  • [O5] P. Dusart, D. Sauveron. Exploration de carte bancaire B0’. GNU Linux Magazine/France Hors Série 39, 2008.
  • [O4] V. Jolivet, D. Sauveron. Sécuriser son ordinateur contre les virus / Les antivirus / Les parefeux I & II. Revue du cadre de Santé, 2005-2006.
  • [O3] D. Sauveron. Sécurité et interactions des « smart secure devices » et des « réseaux mobiles ». Habilitation à Diriger des Recherches, Université de Limoges, 2014.
  • [O2] D. Sauveron. Étude et réalisation d’un environnement d’expérimentation et de modélisation pour la technologie Java Card. Thèse de doctorat, Université Bordeaux 1, 2004.
  • [O1] Multiple posters presented at URSI-France (2020), GNU Radio Days (2018, 2019), AETOS (2018), WISTP (2007), ICCSA (2006), and Cartes (2003).