{"id":28,"date":"2025-04-07T11:37:56","date_gmt":"2025-04-07T09:37:56","guid":{"rendered":"https:\/\/hub.imt-atlantique.fr\/fps2025\/?page_id=28"},"modified":"2025-11-29T14:37:14","modified_gmt":"2025-11-29T13:37:14","slug":"program","status":"publish","type":"page","link":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/","title":{"rendered":"Program Overview"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><strong>Main FPS conference is to be held at IMT Atlantique from November 25th to 27th, 2025 <\/strong><\/li>\n\n\n\n<li><strong>Main conference is accompanied by a one-day workshop on November 24th, 2025 <\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Afternoon workshop on women in cybersecurity (starting at 1:30pm) is open to FPS participants ; participation is free of charge <\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong><a href=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/DetailedProgramFPS2025_FINAL-Program-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the detailed program here<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"977\" src=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-1024x977.png\" alt=\"\" class=\"wp-image-767\" srcset=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-1024x977.png 1024w, https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-300x286.png 300w, https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-768x733.png 768w, https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-1536x1465.png 1536w, https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png 1558w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Session 1: Security, Privacy, and Trust in Blockchain &amp; Emerging &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distributed Systems<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: Johanne Vincent<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Pierre Saha Fobougong<\/strong>, Mohamed Mejri and Kamel Aldi<\/td><td>\"<em>Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&amp;ck Graph And Multi-criteria Optimization<\/em>\"<\/td><\/tr><tr><td>Petr Dzurenda, <strong>Minh Tran<\/strong>, Mubashar Iqbal, Sara Ricci, Vaclav Stupka, Raimundas Matulevicius and Lukas Malina&nbsp;<\/td><td>\"<em>ForensicChain: Blockchain-based Secure Digital Forensic Investigations\"<\/em><\/td><\/tr><tr><td><strong>Jan Ariel Ocampo<\/strong>, Lejla Islami and Mina Alishahi&nbsp;<\/td><td>\"<em>Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks<\/em>\"<\/td><\/tr><tr><td><strong>Remi Barbier<\/strong>, Francoise Sailhan, Alexandre Reiffers-Masson and Loic Machado&nbsp;<\/td><td>\"<em>Scaling Blockchains with zk-Rollups: State of the Art and Implementation<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Session 2: Cyber Resilience and Risk Management in Enterprise<\/strong> Architectures<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: Reda Yaich<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Francis Wanko Naa<\/strong>, Nora Boulahia-Cuppens and Frederic Cuppens&nbsp;<\/td><td>\"<em>Eliciting metrics and evaluating cyber resilience of a capability in multilayer enterprise architecture<\/em>\"<\/td><\/tr><tr><td><strong>Arslane Fawzi Halilou<\/strong> and Natalia Stakhanova<\/td><td>\"<em>Predicting IoT Security Vulnerabilities from Device Specifications<\/em>\"<\/td><\/tr><tr><td>N'Famoussa Kounon Nanamou, Neda Baghalizadeh-Moghadam, K\u00e9ren A Saint-Hilaire, Thibault Leblanc, Nora Cuppens, <strong>Fr\u00e9d\u00e9ric Cuppens<\/strong> and Anis Bkakria&nbsp;<\/td><td>\"<em>Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators<\/em>\"<\/td><\/tr><tr><td><strong>Babacar Mbaye<\/strong> and Mohamed Mejri<\/td><td>\"<em>Optimizing Resilience in IT Architectures : A Multi-Objective Ontology-Based Approach<\/em>\"<\/td><\/tr><tr><td>Barbara Carminati, Elena Ferrari, Christian Rondanini, <strong>Azhar Muhammad Shahid<\/strong> and Luca Clementi<\/td><td>\"<em>COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Session 3: Formal Methods and Automated Analysis for Secure Software<\/strong> Systems<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: <strong>Kassem Kallas<\/strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Yekatierina Churakova<\/strong>, Mathias Ekstedt and Larissa Schmid&nbsp;<\/td><td>\"<em>Vexed by VEX Tools: Consistency Evaluation of Container Vulnerability Scanners<\/em>\"<\/td><\/tr><tr><td><strong>Alberto Tacchella<\/strong>, Jurij Miheli\u010d, David Cerdeira, Jos\u00e9 Martins, Sandro Pinto, Bruno Crispo and Marco Roveri<\/td><td>\"<em>Towards a formal verification of the Bao Hypervisor<\/em>\"<\/td><\/tr><tr><td><strong>Luis Soeiro<\/strong>, Thomas Robert and Stefano Zacchiroli<\/td><td>\" <em>Finding Software Supply Chain Attack Paths with Logical Attack Graphs<\/em>\"<\/td><\/tr><tr><td><strong>R\u00e9mi Garcia<\/strong>, Paolo Modesti and Leo Freitas&nbsp;<\/td><td>\"<em>From provable models to provable implementations: translating Alice &amp; Bob security protocols to F*<\/em>\"<\/td><\/tr><tr><td><strong>Quentin Goux<\/strong> and Nadira Lammari&nbsp;<\/td><td>\"<em>Automatic Attack Script Generation: a MDA Approach<\/em>\"<\/td><\/tr><tr><td>Ludjina Benoit, <strong>Rim Ben Salem<\/strong>, Nora Boulahia-Cuppens and Fr\u00e9d\u00e9ric Cuppens<\/td><td>\"<em>Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Session 4: ML and Intelligent Systems for Attack Detection and Trust Evaluation<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: <strong><strong>Ranwa Al Mallah<\/strong><\/strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Antoine Rebstock, Yann Busnel and <strong>Romaric Ludinard<\/strong><\/td><td>\"<em>A Grammar-Driven Approach to Model and Detect APT Attack Sequences<\/em>\"<\/td><\/tr><tr><td><strong>Bastien Vuillod<\/strong>, Pierre-Alain Moellic and Jean-Max<\/td><td>\"<em>Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation<\/em>\"<\/td><\/tr><tr><td><strong>Se\u00e1n \u00d3g Murphy<\/strong>, Utz Roedig and Cormac Sreenan&nbsp;<\/td><td>\"<em>Systematic Security Context Weighting for Trust Algorithms via AI\/ML Model Performance Analysis<\/em>\"<\/td><\/tr><tr><td>Kobra Khanmohammadi, Pooria Roy, <strong>Raphael Khoury<\/strong>, Abdelwahab Hamou-Lhadj and Wilfried Patrick Konan<\/td><td>\"<em>WildCode: An Empirical Analysis of Code Generated by ChatGPT<\/em>\"<\/td><\/tr><tr><td><strong>Miguel Silva<\/strong>, Daniela Pinto, Jo\u00e3o Vitorino, Eva Maia, Isabel Pra\u00e7a, Ivone Amorim and Maria Viamonte&nbsp;<\/td><td>\"<em>Binary and Multiclass Cyberattack Classification on GeNIS Dataset<\/em>\"<\/td><\/tr><tr><td><strong>Bassirou Badiane<\/strong>, Valerie Viet Triem Tong and Yufei Han&nbsp;<\/td><td>\"<em>Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Session 5: Industrial Track<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: <strong><strong>Davis Espes<\/strong><\/strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Pierre Mahieux<\/strong>, Mouhamadou Bamba Sakho, Gouenou Coatrieux and Reda Bellafqira<\/td><td>\"<em>An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity<\/em>\"<\/td><\/tr><tr><td><strong>Yeoh Wei Zhu<\/strong>, Shaltiel Eloul, Yash Satsangi, Imran Bashir and Sudhir Upadhyay &nbsp;<\/td><td>\"<em>Towards adoption of private distributed ledgers for capital markets<\/em>\"<\/td><\/tr><tr><td><strong>Florence S\u00e8des<\/strong> and Brice Chellet<\/td><td>\"<em>Dynamic Multilayer Information System Cartography for Cybersecurity, Compliance and Industrial Governance<\/em>\"<\/td><\/tr><tr><td><strong>Francesco Ferazza<\/strong> and <strong>Konstantinos Mersinas<\/strong>&nbsp;<\/td><td>\"<em>Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges<\/em>\"<\/td><\/tr><tr><td><strong>Tanja Pavleska<\/strong>, Giovanni Paolo Sellitto, Helder Aranha and Massimiliano Masi&nbsp;<\/td><td>\"<em>Secure-by-Design Architectures for Cooperative Intelligent Transport Systems<\/em>\"<\/td><\/tr><tr><td><strong>Leonie Wolf<\/strong>, Samson Umezulike, Gurur \u00d6ndar\u00f6, Sebastian Schinzel and Fabian Ising <\/td><td>\"<em>Practical Evaluation of the Crypto-Agility Maturity Model<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Session 6: Advances in Privacy-Preserving Cryptography and Secure<\/strong> Computation<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: Joaquin Garcia-Alfaro<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Yuan Liang<\/strong>, Giovanni Di Crescenzo and Haining Wang<\/td><td>\"<em>Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model<\/em>\"<\/td><\/tr><tr><td><strong>Shohei Kaneko<\/strong>, Yang Li, Kazuo Sakiyama and Daiki Miyahara&nbsp;<\/td><td>\"<em>Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation<\/em>\"<\/td><\/tr><tr><td>El Hadji Mamadou Dia, <strong>Walid Arabi<\/strong>, Anis Bkakria and Reda Yaich<\/td><td>\"StrawHat: <em>Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption<\/em>\"<\/td><\/tr><tr><td><strong>Nicolas Quero<\/strong>, Renaud Sirdey, Aymen Boudguiga, David Pointcheval, Quentin Sinh and Nadir Karam<\/td><td>\"<em>Scalable privacy-preserving database queries with FHE and PEKS<\/em>\"<\/td><\/tr><tr><td><strong>Marc Damie<\/strong>, Mihai Pop and Merijn Posthuma<\/td><td>\"<em>Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption<\/em>\"<\/td><\/tr><tr><td><strong>Augustin P. Sarr<\/strong>&nbsp;<\/td><td>\"<em>An Embarrassingly Parallel Cryptanalysis of EC(H)MQV<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Session 7: Secure and Intelligent Network Architectures for &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Next-Generation Communications<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: Omar Mawloud<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Alex Pierron<\/strong>, Michel Barbeau, Luca De Cicco, Jose Manuel Rubio Hernan and Joaquin Garcia-Alfaro<\/td><td>\"<em>A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces<\/em>\"<\/td><\/tr><tr><td><strong>Lucas Schrass<\/strong>, Yu Shen and Stefanie Roos<\/td><td>\"<em>Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments<\/em>\"<\/td><\/tr><tr><td><strong>Andrea Fulgence Ndreveloarisoa<\/strong>, Fr\u00e9d\u00e9ric Guidec and Mawloud Omar&nbsp;<\/td><td>\"<em>A secure lightweight system based on device-to-device communication for objects sharing in local communities<\/em>\"<\/td><\/tr><tr><td>Matthew Bush, <strong>Dave McKay<\/strong> and Atefeh Mashatan&nbsp;<\/td><td>\"<em>Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks&nbsp;<\/em>\"<\/td><\/tr><tr><td><strong>Jo\u00e3o Vitorino<\/strong>, Daniela Pinto, Eva Maia, Ivone Amorim and Isabel Pra\u00e7a&nbsp;<\/td><td>\"<em>Revisiting Network Traffic Analysis: Compatible Network Flows for ML Models<\/em>\"<\/td><\/tr><tr><td><strong>Hocine Attoumi<\/strong>, Etienne Gael Tajeuna and Mohand Said Allili&nbsp;<\/td><td>\"<em>Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Session 8: Secure, Explainable, and Efficient Machine Learning in<\/strong> Cybersecurity<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Session Chair: Francoise Sailhan<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Ananta Raha<\/strong>, Junaeid Ahmed, Md Shohrab Hossain and Suryadipta Majumdar&nbsp;<\/td><td>\"<em>Defending Model Inversion Attack Using an Improved Filter-Based Approach<\/em>\"<\/td><\/tr><tr><td>Muhammed Tahir Akdeniz, Zeynep Yesilkaya, Ibrahim Enes Kose, Ismail Ulas Unal and <strong>Sevil Sen<\/strong>&nbsp;<\/td><td>\"<em>VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning<\/em>\"<\/td><\/tr><tr><td><strong>Alexandre Dohin<\/strong>, Karim Zkik, Omar Mawloud and Abdellah Akilal<\/td><td>\"<em>Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection<\/em>\"<\/td><\/tr><tr><td><strong>Saba Kasrelou<\/strong>, Samuel Pierre and Ranwa Al-Mallah&nbsp;<\/td><td>\"<em>Verifiability of Unlearning Schemes Through Local Explanation<\/em>\"<\/td><\/tr><tr><td><strong>Myria Bouhaddi<\/strong>, Feriel Sadoun and Kamel Adi&nbsp;<\/td><td>\"<em>Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning<\/em>\"<\/td><\/tr><tr><td>Shuaishuai Liu, <strong>Gergely Acs<\/strong> and Gergely Bicz\u00f3k<\/td><td>\"<em>Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies<\/em>\"<\/td><\/tr><tr><td><strong>Daphnee Chabal<\/strong>, Dolly Sapra, Cees de Laat and Zoltan Mann&nbsp;<\/td><td>\"<em>QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology<\/em>\"<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Download the detailed program here Session 1: Security, Privacy, and Trust in Blockchain &amp; Emerging &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distributed Systems Session Chair: Johanne Vincent Pierre Saha Fobougong, Mohamed Mejri and Kamel Aldi \u00ab\u00a0Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&amp;ck Graph And Multi-criteria Optimization\u00a0\u00bb Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program Overview - FPS 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program Overview - FPS 2025\" \/>\n<meta property=\"og:description\" content=\"Download the detailed program here Session 1: Security, Privacy, and Trust in Blockchain &amp; Emerging &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distributed Systems Session Chair: Johanne Vincent Pierre Saha Fobougong, Mohamed Mejri and Kamel Aldi &quot;Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&amp;ck Graph And Multi-criteria Optimization&quot; Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"FPS 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-29T13:37:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1558\" \/>\n\t<meta property=\"og:image:height\" content=\"1486\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/\",\"name\":\"Program Overview - FPS 2025\",\"isPartOf\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-1024x977.png\",\"datePublished\":\"2025-04-07T09:37:56+00:00\",\"dateModified\":\"2025-11-29T13:37:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png\",\"contentUrl\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png\",\"width\":1558,\"height\":1486},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\",\"name\":\"FPS 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization\",\"name\":\"FPS 2025\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png\",\"contentUrl\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png\",\"width\":512,\"height\":512,\"caption\":\"FPS 2025\"},\"image\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program Overview - FPS 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/","og_locale":"fr_FR","og_type":"article","og_title":"Program Overview - FPS 2025","og_description":"Download the detailed program here Session 1: Security, Privacy, and Trust in Blockchain &amp; Emerging &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distributed Systems Session Chair: Johanne Vincent Pierre Saha Fobougong, Mohamed Mejri and Kamel Aldi \"Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&amp;ck Graph And Multi-criteria Optimization\" Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, [&hellip;]","og_url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/","og_site_name":"FPS 2025","article_modified_time":"2025-11-29T13:37:14+00:00","og_image":[{"width":1558,"height":1486,"url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/","name":"Program Overview - FPS 2025","isPartOf":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage"},"image":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage"},"thumbnailUrl":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41-1024x977.png","datePublished":"2025-04-07T09:37:56+00:00","dateModified":"2025-11-29T13:37:14+00:00","breadcrumb":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#primaryimage","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png","contentUrl":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/11\/Capture-decran-2025-11-03-a-15.57.41.png","width":1558,"height":1486},{"@type":"BreadcrumbList","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/hub.imt-atlantique.fr\/fps2025\/"},{"@type":"ListItem","position":2,"name":"Program Overview"}]},{"@type":"WebSite","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/","name":"FPS 2025","description":"","publisher":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hub.imt-atlantique.fr\/fps2025\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization","name":"FPS 2025","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png","contentUrl":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png","width":512,"height":512,"caption":"FPS 2025"},"image":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":47,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":887,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/28\/revisions\/887"}],"wp:attachment":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}