{"id":82,"date":"2023-07-11T16:33:45","date_gmt":"2023-07-11T14:33:45","guid":{"rendered":"https:\/\/aist4ge.com\/?page_id=82"},"modified":"2026-01-06T18:27:34","modified_gmt":"2026-01-06T17:27:34","slug":"pr-lyes-khoukhi","status":"publish","type":"page","link":"https:\/\/aist4ge.com\/index.php\/pr-lyes-khoukhi\/","title":{"rendered":"Pr. Lyes Khoukhi"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"82\" class=\"elementor elementor-82\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6221d810 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6221d810\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1041d250\" data-id=\"1041d250\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c20d443 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7c20d443\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1230 aligncenter\" src=\"https:\/\/aist4ge.com\/wp-content\/uploads\/2025\/06\/profkhoukhi-260x300.png\" alt=\"\" width=\"260\" height=\"300\" srcset=\"https:\/\/aist4ge.com\/wp-content\/uploads\/2025\/06\/profkhoukhi-260x300.png 260w, https:\/\/aist4ge.com\/wp-content\/uploads\/2025\/06\/profkhoukhi.png 440w\" sizes=\"auto, (max-width: 260px) 100vw, 260px\" \/><\/p><h1><strong>Title : New vision of Cybersecurity in Smart intelligent Vehicles.<\/strong><\/h1><h2><strong>Abstract<\/strong>:<\/h2><p>Vehicles have long been considered immune to cyber threats. Recently, attacks have actually been perpetrated, and vehicle cyber protection has emerged as a priority (for example, Tesla, a major player in the vehicle industry, was the victim of a cyberattack). In this presentation, we propose various approaches for detecting and predicting attacks on connected vehicles. The threats considered are both cyber (intrusion into the connected vehicle via the antenna, DDoS, etc.).<\/p><p>In this presentation, we present a new vision of trust in connected networks by presenting a set of behavioral-based models to mitigate attacks in connected networks showing the need to cope with the new emerging threats, ranging from data leakage to collaborative attacks. Our models are not limited by the need of new attack patterns\/signatures (to prevent them to fall within zero-day threat). We also present the future vision of securing connected networks while respecting the standards requirements.<\/p><h2 style=\"font-family: Roboto, sans-serif; color: #7a7a7a;\"><span style=\"font-weight: bold;\">Biography<\/span>:<\/h2><p>Lyes Khoukhi is Full Professor of cybersecurity at CNAM Paris University (Conservatoire National des Arts et M\u00e9tiers), Paris, France. He received the Ph.D degree in computer engineering from the University of Sherbrooke, Canada, in 2006. Between 2007 and 2008, he was a researcher with the Department of Computer Science and Operations Research, University of Montreal in collaboration with Bell-Canada. In 2008, he also worked for Dialexia Corporation-Montreal, in the development of safe communications solutions. In 2009, he joined UTT -University of Technology of Troyes- as associate professor, where he became Full professor at 2018. From 2020 to 2025, he was Full professor at ENSICAEN (Normandie University). Since September 2025, he joined, as Full Professor on Cybersecurity, CNAM Paris (CEDRIC research Laboratory).<\/p><p>His research interests include Cybersecurity for networks, attacks detection and prediction, access control &amp; security protocols, privacy and personal data protection, and networking. His target is securing areas like IoT, V2X, 5G\/6G, e-health, and complex energy systems.<\/p><p>He has participated as a General chair or program chair of many conferences. He was the Local chair for IEEE LCN 2024, program chairn of IFIP NTMS 2025, IEEE ICC&#8217;23 IoTSN Symposium chair and general chair for LCN 2022. He also served as the program chair of LCN&#8217;21, the program co-chair of CyberWorlds&#8217;21 &amp; LCN&#8217;20, and Symposium chair for IEEE LCN in 2019. He is also the Symposium chair of Globecom&#8217;21 MWN Symposium, co-chair of the IEEE LCN On-move for several years (2013-2018) and QoSQoE of IWCMC (2017-2019), and the general chair of NOTERE&#8217; 16 (13\u00e8me Francophone conference, 2016), and UBIROADS&#8217;2012. He is the Guest Editor of several special issues, like Springer journal of Annals of Telecommunications of the SI (Internet of Vehicles &amp; Smart City)-2020, about security and protocols issues in V2X. He is also the SIG leader of &#8220;Machine Learning for IoT and ad hoc networks&#8221; of the IoT ASHN ComSoc Committee of IEEE Communications Society since 2020.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"Title : New vision of Cybersecurity in Smart intelligent Vehicles. Abstract: Vehicles have long been considered immune to cyber threats. Recently, attacks have actually been perpetrated, and vehicle cyber protection has emerged as a priority (for example, Tesla, a major player in the vehicle industry, was the victim of a cyberattack). In this presentation, we [&hellip;]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-template\/right-sidebar-page.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-82","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/pages\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":12,"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":1532,"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/pages\/82\/revisions\/1532"}],"wp:attachment":[{"href":"https:\/\/aist4ge.com\/index.php\/wp-json\/wp\/v2\/media?parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}