Poster Open Access
Frederick Benaben; Hervé Debar; Hassen Drira; Gilles Dusserre; Jean-Max Dutertre; Aurélien Francillon; Marc-Oliver Pahl; Laurent Pautet
<?xml version='1.0' encoding='utf-8'?> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#"> <rdf:Description rdf:about="https://doi.org/10.5281/zenodo.6594420"> <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/> <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/> <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://doi.org/10.5281/zenodo.6594420</dct:identifier> <foaf:page rdf:resource="https://doi.org/10.5281/zenodo.6594420"/> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Frederick Benaben</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>IMT Mines Albi</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Hervé Debar</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Télécom SudParis</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Hassen Drira</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>IMT Nord Europe</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Gilles Dusserre</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>IMT Mines Alès</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Jean-Max Dutertre</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Mines-Saint-Étienne</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Aurélien Francillon</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>EURECOM</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Marc-Oliver Pahl</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>IMT Atlantique</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Laurent Pautet</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Télécom Paris</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:title>Colloque gestion de crise et numérique : nouvelles menaces et nouvelles solutions</dct:title> <dct:publisher> <foaf:Agent> <foaf:name>Zenodo</foaf:name> </foaf:Agent> </dct:publisher> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2022</dct:issued> <dcat:keyword>gestion de crise</dcat:keyword> <dcat:keyword>menaces</dcat:keyword> <dcat:keyword>cybersécurité</dcat:keyword> <dcat:keyword>solutions</dcat:keyword> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2022-05-30</dct:issued> <owl:sameAs rdf:resource="https://zenodo.org/record/6594420"/> <adms:identifier> <adms:Identifier> <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/6594420</skos:notation> <adms:schemeAgency>url</adms:schemeAgency> </adms:Identifier> </adms:identifier> <dct:isVersionOf rdf:resource="https://doi.org/10.5281/zenodo.6594419"/> <dct:description><p>La communaut&eacute; IMT qui porte le colloque Risques et Cyber est en quelque sorte par nature transverse aux &eacute;coles des Mines et aux &eacute;coles des T&eacute;l&eacute;com, en rassemblant des profils et des approches scientifiques assez diff&eacute;rents. C&rsquo;est donc une th&eacute;matique qui illustre bien ce qu&rsquo;on peut construire par le rassemblement des comp&eacute;tences de ces deux familles d&#39;&eacute;coles. A travers l&rsquo;ensemble des &eacute;coles, elle peut amener des comp&eacute;tences en cybers&eacute;curit&eacute;, notamment en mati&egrave;re d&rsquo;approches cybers&eacute;curit&eacute; des syst&egrave;mes, mais aussi en gestion de crise, que ce soit en simulation ou en mod&eacute;lisation, avec des approches num&eacute;riques comme des approches relevant des sciences humaines et sociales. Si l&rsquo;on ajoute les fortes comp&eacute;tences de nos &eacute;coles en ce qui concerne les syst&egrave;mes industriels ou les syst&egrave;mes de sant&eacute;, mais aussi en mod&eacute;lisation et en optimisation, nous sommes capables d&rsquo;apporter des r&eacute;ponses assez larges sur l&rsquo;ensemble du spectre qui va de la d&eacute;tection &agrave; la r&eacute;silience et &agrave; la rem&eacute;diation, en passant par la gestion de crise.</p></dct:description> <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/> <dct:accessRights> <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess"> <rdfs:label>Open Access</rdfs:label> </dct:RightsStatement> </dct:accessRights> <dcat:distribution> <dcat:Distribution> <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/> <dcat:accessURL rdf:resource="https://doi.org/10.5281/zenodo.6594420"/> </dcat:Distribution> </dcat:distribution> <dcat:distribution> <dcat:Distribution> <dcat:accessURL rdf:resource="https://doi.org/10.5281/zenodo.6594420"/> <dcat:byteSize>21096872</dcat:byteSize> <dcat:downloadURL rdf:resource="https://zenodo.org/record/6594420/files/actes-posters-colloque-cybersecurite-imt.pdf"/> <dcat:mediaType>application/pdf</dcat:mediaType> </dcat:Distribution> </dcat:distribution> </rdf:Description> </rdf:RDF>
All versions | This version | |
---|---|---|
Views | 39 | 39 |
Downloads | 40 | 40 |
Data volume | 843.9 MB | 843.9 MB |
Unique views | 34 | 34 |
Unique downloads | 34 | 34 |