EN FR
EN FR

2024Activity reportProject-TeamCTRL-A

RNSR: 201421117X
  • Research center Inria Centre at Université Grenoble Alpes
  • In partnership with:Université de Grenoble Alpes
  • Team name: Control for safe Autonomic computing systems
  • In collaboration with:Laboratoire d'Informatique de Grenoble (LIG)
  • Domain:Networks, Systems and Services, Distributed Computing
  • Theme:Distributed Systems and middleware

Keywords

Computer Science and Digital Science

  • A1.1.2. Hardware accelerators (GPGPU, FPGA, etc.)
  • A1.1.4. High performance computing
  • A1.1.5. Exascale
  • A1.1.9. Fault tolerant systems
  • A1.1.10. Reconfigurable architectures
  • A1.3. Distributed Systems
  • A1.3.5. Cloud
  • A1.3.6. Fog, Edge
  • A1.4. Ubiquitous Systems
  • A1.6. Green Computing
  • A2.1.9. Synchronous languages
  • A2.2. Compilation
  • A2.3.1. Embedded systems
  • A2.5.1. Software Architecture & Design
  • A2.5.2. Component-based Design
  • A2.5.4. Software Maintenance & Evolution
  • A2.6.2. Middleware
  • A2.6.4. Ressource management
  • A4.9.1. Intrusion detection
  • A4.9.3. Reaction to attacks
  • A6.4. Automatic control

Other Research Topics and Application Domains

  • B4.5. Energy consumption
  • B5.1. Factory of the future
  • B6.1. Software industry
  • B6.1.1. Software engineering
  • B6.1.2. Software evolution, maintenance
  • B6.4. Internet of things
  • B6.5. Information systems
  • B6.6. Embedded systems
  • B8.1. Smart building/home

1 Team members, visitors, external collaborators

Research Scientists

  • Eric Rutten [Team leader, INRIA, Researcher]
  • Clément Mommessin [INRIA, Starting Research Position, from Nov 2024]

Faculty Members

  • Raphaël Bleuse [UGA, Associate Professor]
  • Gwenaël Delaval [UGA, Associate Professor]
  • Stephane Mocanu [GRENOBLE INP, Associate Professor]

Post-Doctoral Fellow

  • Ghada Moualla [UGA, until Aug 2024]

PhD Students

  • Kouds Halitim [INRIA]
  • Mareva Hotellier [NAVAL GROUP, until Apr 2024]
  • Lea Astrid Kenmogne Mekemte [GRENOBLE INP]
  • Jolahn Vaudey [UGA]

Technical Staff

  • Jonathan Bleuzen [INRIA, Engineer]

Interns and Apprentices

  • Elisee Chemin [INRIA, Intern, from Apr 2024 until Jun 2024]

Administrative Assistant

  • Maria Immaculada Presseguer [INRIA]

External Collaborator

  • Bogdan Robu [UGA, Gipsa-lab]

2 Overall objectives

Objective: control support for autonomic computing

Ctrl-A is motivated by the observation that computing systems, large (data centers) or small (embedded), are more and more required to be adaptive to the dynamical fluctuations of their environments and workloads, evolutions of their computing infrastructures (mobile, shared, or subject to faults), or changes in application modes and functionalities. Their administration, traditionally managed by human system administrators, needs to be automated in order to be efficient, safe and responsive. Autonomic Computing 31 is the approach that emerged in the early 2000's in distributed systems to answer that challenge, in the form of feedback loops for self-administration control. These loops address objectives like self-configuration (e.g. in service-oriented systems), self-optimization (resource consumption management e.g., energy), self-healing (fault-tolerance, resilience), self-protection (security and privacy).

Therefore, there is a pressing and increasing demand for methods and tools to design controllers for self-adaptive computing systems, that ensure quality and safety of the behavior of the controlled system. The critical importance of the quality of control on performance and safety in automated systems, in computing as elsewhere, calls for a departure from traditional approaches relying on ad hoc techniques, often empirical, unsafe and application-specific solutions.

The main objective of the Ctrl-A project-team is to develop a novel framework for model-based design of controllers in Autonomic Computing, exploiting techniques from Control Theory 30, particularly Discrete Event Systems 35, but also other forms. We want to contribute generic Software Engineering methods and tools for developers to design appropriate controllers for their particular reconfigurable architectures, software or hardware, and integrate them at middleware level. We want to improve concrete usability of techniques from Control Theory by specialists of computing systems 9, and to provide tool support for our methods in the form of specification languages and compilers, as well as software architectures.

We address policies for self-configuration, self-optimization (resource management, low power), self-healing (fault tolerance) and self-protection (security).

3 Research program

Modeling and control techniques for autonomic computing

Our research activity is mainly targeted at models and architectures, with also a notable part devoted to applications and case studies, in co-operations with specialists of the application domains, either academic researchers or industrial partners (e.g., CEA, Orange labs, RTE,Qarnot Computing, Naval Group). We adopt a strategy of parallel investigation of, on the one hand, generic models and tools for the design support for control in Autonomic Computing, and, on the other hand, experimental identification of needs and validation of proposals. Therefore we have activities related to several application domains, for each of which we build co-operations with specialists, for example middleware platforms for Cloud systems 3, HPC architectures (e.g., multi-core 12), Dynamic Partial Reconfiguration in FPGA-based hardware 8 and the IoT and smart environments citesylla:cea-01570026 .

The main objective of Ctrl-A translates into a number of scientific axes :

  • Design support for Control in Autonomic Computing : under the angle of Models and control (e.g., Discrete Event Systems and reactive languages), or at the level of Software Components and Architectures (e.g., for separation of concerns, coordination of multiple autonomic managers : Control, ML, RJMS, or application/infrastructure-levels);
  • Self-adaptative distributed systems and Cloud-Edge/HPC : e.g., RJMS-level dynamical resource harvesting in HPC clusters ; node-level energy management through RAPL ; reproducibility of experimental validation.
  • CyberSecurity & Self-protection in Industrial Control Systems : intrusion detection ; automated risk analysis ; validation of conformity to IEC 62443 standard; self-protection, resilience and reaction by self-reconfiguration ; applications to Smart-Grid infrastructures ; experimental lab.

Achieving the goals of Ctrl-A requires multidisciplinarity and expertise from several domains. The expertise in Autonomic Computing and programming languages is covered internally by members of the Ctrl-A team. On the side of theoretical aspects of control, we have active external collaborations with researchers specialized in Control Theory, in the domain of Discrete Event Systems as well as in classical, continuous control. Additionally, an important requirement for our research to have impact is to have access to concrete, real-world computing systems requiring reconfiguration control. We target autonomic computing at different scales, in embedded systems or in cloud infrastructures, which are traditionally different domains. This is addressed by external collaborations, with experts in either hardware or software platforms, who are generally missing our competences on model-based control of reconfigurations.

4 Application domains

We attack the problem of designing well-regulated and efficient self-adaptive computing systems by the development of novel strategies for their runtime management. Therefore the kind of application domains that we typically target involve computing systems with relatively coarse-grain computation tasks (e.g. image processing or HPC tasks, components or services, control functions in Industrial Control Systems). They must be run on distributed heterogeneous architectures. Runtime, unpredictable variations can come from the environment (e.g., data values, user inputs, physical sensors), the application (e.g., functional modes depending on algorithm progress, computation phases, or business processes), or the infrastructure (e.g., resource overload, faults, temperature variations, communication network variations, cyber-attacks).

The general control problem then consists of deciding at runtime the choice of which implementation or version of tasks to dynamically deploy or redeploy on which computing resources, in order to enforce high-level strategies involving objectives in terms of constraints, optimization, logical invariance or reachability. The design of such controllers involves the design of appropriate sensors and actuators in the computing infrastructures. It is based on the use of modeling and decision formalisms of different kinds according to the application characteristics.

The objectives of Ctrl-A are achieved and evaluated in both of our main application domains, thereby exhibiting their similarities from the point of view of reconfiguration control.

Self-adaptive and reconfigurable computing systems, in Cloud-Edge and HPC

One main application domain for the research of Ctrl-A concerns Cloud-Edge and High-Performance Computing. In these contexts, tasks can be achieved following a choice of implementations or versions, such as in, e.g., service oriented approaches. Each implementation has its own characteristics and requirements, e.g., w.r.t. resources consumed and QoS offered. The systems execution infrastructures present heterogeneity, with different computing processors, a variety of peripheral devices (e.g., I/O, video port, accelerators), and different means of communications. This hardware or middleware level also presents adaptation potential, e.g., in varying quantities of resources or sleep and stand-by modes.

The kinds of control problems encountered in these self-adaptive systems concern the navigation in the configurations space defined by choice points at the levels of applications, tasks, and architecture. The pace of control is more sporadic, and slower than the instruction-level computation performance inside the large-grain tasks.

In this application area, we currently focus especially on the runtime management of resources for energy objectives and digital soberness, e.g. at the level of a data-center by dynamically harvesting unused resources, or at node level by dynamically adjusting frequency under QoS constraints. Ongoing or recent cooperations in the application domain feature Qarnot Computing (challenge Inria PULSE), Orange labs, Nokia, Argonne National Laboratories (USA) (JLESC).

Industrial Control Systems, w.r.t. their cybersecurity and Cloud-Edge self-adaptive virtualization

Another general application domain to confront our approaches and models is Industrial Control Systems (ICS), which can be seen as a form of Cyber-Physical Systems (CPS) and IoT, more specifically Industry 4.0 related infrastructures, like SCADA. In this application domain we particularly focus on Cyber-Security problems, considered at the operational level, in terms of Intrusion Detection Systems (IDS), as well as reaction to attacks, in the form of self-adaptive resilience and self-protection. In a context of evolution of technologies in ICS, namely their softwarization and virtualization, we also apply our approaches of the Cloud-Edge application domain, e.g. in virtualized control of Smart Grids. The adaptation problems concern both the functional aspects of the applications, and the middleware support deployment and reconfiguration issues.

Ongoing or recent cooperations in the application domain feature Naval Group, CEA, and RTE (the French energy transportion company).

5 Social and environmental responsibility

5.1 Footprint of research activities

In the year 2024, we are still trying to moderate the travels of the team, and favoring submissions and publications in journals.

Our activities in energy-efficient management of computing infrastructures involve running experiments on large computing infrastructures e.g., using Grid 5000, where we spent approximatively 9300 core·hours of computing.

In order to diminish or limit this cost, we are working towards building up simulation techniques appropriately integrating self-adaptation and control loops, as well as environmental variability.

5.2 Impact of research results

We have research activities w.r.t. energy efficiency in computing systems, at the levels of nodes (RAPL) as well as at the higher level of grids (RJMS, CiGri), which are contributing to a better mastered energy consumption in computing.

On a longer term, we orient our research towards topics explicitely targeting environmental as well as social impacts, in the form of user involvement through usage choices. In line with our topic of autonomic management, self-adaptive systems and their control, for example, we consider control objectives involving trade-offs between performance or QoS and economy of resources and impact, so that users can choose a level of sobriety, and possibly limited or degraded quality, thereby allowing for potential resource and energy savings. Our ongoing cooperation with Qarnot Computing has a potential for involving not only technical considerations but also societal and regulatory constraints, or user and customer choices.

The perspectives involve the notion of computing within limits, especially when they are varying dynamically, and which can be undergone (e.g., resilience when submitted to cyber-attacks or faults) or chosen (e.g., accepting lower quality outside of phases requiring higher levels due to urgency). Our cooperation with RTE (French electricity transportation industrial), in the framework of the Tasting project of the PEPR TASE, is exploring the impact of the notion of consumption flexibility (required from consuming industries) on the management of computations in Data Centers, which is a rapidly growing consuming industry, especially in Ile-de-France.

6 Highlights of the year

6.1 Projects

A particularity of this year is that the Ctrl-A team has involvements in several PEPR programs and projects :

  • the SuperViz project of PEPR Cyber-Security, since 3 years, on topics of intrusion detection and reaction to attacks ;
  • the Tasting project of PEPR TASE, since this year, on topics of both Cloud-Edge self-adaptation, and cybersecurity (related to the SuperViz topics) ;
  • the Taranis project of PEPR Cloud, hiring next year, on topics of dynamic resource management for self-adaptation (related in part to the Tasting topics).

This is considerable for a team of only 4 permanent researchers (incl. 3 part-time teachers) : our research programs were scientifically defined and planned in order to be articulated, w.r.t. timing and topics, into a global research plan.

7 New software, platforms, open data

7.1 New software

7.1.1 Heptagon

  • Keywords:
    Compilers, Synchronous Language, Controller synthesis
  • Functional Description:

    Heptagon is an experimental language for the implementation of embedded real-time reactive systems. It is developed inside the Synchronics large-scale initiative, in collaboration with Inria Rhones-Alpes. It is essentially a subset of Lucid Synchrone, without type inference, type polymorphism and higher-order. It is thus a Lustre-like language extended with hierchical automata in a form very close to SCADE 6. The intention for making this new language and compiler is to develop new aggressive optimization techniques for sequential C code and compilation methods for generating parallel code for different platforms. This explains much of the simplifications we have made in order to ease the development of compilation techniques.

    The current version of the compiler includes the following features: - Inclusion of discrete controller synthesis within the compilation: the language is equipped with a behavioral contract mechanisms, where assumptions can be described, as well as an "enforce" property part. The semantics of this latter is that the property should be enforced by controlling the behaviour of the node equipped with the contract. This property will be enforced by an automatically built controller, which will act on free controllable variables given by the programmer. This extension has been named BZR in previous works. - Expression and compilation of array values with modular memory optimization. The language allows the expression and operations on arrays (access, modification, iterators). With the use of location annotations, the programmer can avoid unnecessary array copies.

  • URL:
  • Contact:
    Gwenaël Delaval
  • Participants:
    Adrien Guatto, Brice Gelineau, Cédric Pasteur, Eric Rutten, Gwenaël Delaval, Léonard Gerard, Marc Pouzet
  • Partners:
    UGA, ENS Paris, Inria, LIG

7.1.2 DSL62443

  • Name:
    DSL for modeling IEC 62443 compliant ICS instances, in a zone/conduit model
  • Keyword:
    DSL
  • Functional Description:
    Source code for an eclipse plugin, allowing the user to describe ICS instances that follows the IEC 62443 zone/conduit model. Uses xtext for the textual IDE, and Sirius for the graphical one. Also contains an application, using constraint programming to reconfigure a modeled system under attack. This controller is generated from a description.
  • URL:
  • Contact:
    Jolahn Vaudey

7.1.3 RTUShark

  • Name:
    Modbus RTU network trafic capture
  • Keyword:
    Network monitoring
  • Functional Description:
    Allow to capture Modbus RTU network trafic, and save it in .pcap format, using a USB-RS485 adapter.
  • URL:
  • Contact:
    Stephane Mocanu

7.2 New platforms

Participants: Stéphane Mocanu.

  • Hardware-in-the-loop simulation software

    Web site: G-ICS.

    Self-assessment:

    • Software Family: utility - Utility (see Sae, Section 3.4).
    • Audience: universe - wide-audience software (aims to be usable by a wide public, to become the reference software in its area, etc.).
    • Evolution and maintenance: lts - long term support.
    • Duration of the Development (Duration): 10 years
    • Description: The embedded software on the electronic boards of the G-ICS HIL systems. The electronic board schematics as well as the PCB, embedded software, communication protocol specification and software interfaces with various simulators are provided in open source 34.

8 New results

8.1 Design support for Control in Autonomic Computing

8.1.1 Models and control for multiple loops

Participants: Raphaël Bleuse, Bogdan Robu, Eric Rutten.

We work on the general notion of Software Engineering for designing controllers for Self-Adaptive Systems, and particularly the potential contribution of Control Theory to provide for Assurances in Self-Adaptive Software Systems (see book chapter 9). We propose to consider feedback control as a behavioural model-based instanciation of the MAPE-K loop in Autonomic Computing (see book chapter 11). We have recentlky built up a tutorial on Control for Computing tutorial , aiming at introducing the tools and notions of the Control-Theory field to computer scientists, and relying on Jupyter notebooks, a composed of two parts. In the first part, attendees get familiar with the concepts, tools, and methodology of Control-Theory. In the second part, attendees are given a pseudo-realistic system and have to design a controller to regulate its behavior. This tutorial has been proposed in a number of sessions, e.g. at international conferences 15 , 16.

We consider that complex systems can require multiple loops, motivated by the fact that different sub-problems can require combinations of different decision and control techniques.

One particularly interesting topic is the combination of Control and Machine Learning . In our team we propose to address them by considering their composition (particularly Reinforcement and Neural Networks) with controllers based on Control Theory (particularly deterministic), in order to maintain guarantees on the behaviors of the managed system 5. On this topic we participate in the ANR project RADYAL see Section 10.2.4), where we will work on the control of meta-parameters of DNN algorithms according to metrics of quality of learning, as well as availability of hardware resources, with the objective of limiting energy consumption.

Another combination of high potential is that of Control and Scheduling. In the context of resource harvesting in HPC (see Section 8.2.3), we start considering the coordination of a controller regulating the injection of best-effort jobs with the OAR scheduler in the RJMS (Resource and Jobs Management System) of CiGri. In this context, we established a communnication between the OAR scheduler of CiGri and the controller injecting best-effort jobs in the infrastructure (see Section 8.2.2).

Thess works are done in cooperation with the Spirals team at Inria Lille : Sophie Cerf, the Datamove team at Inria Grenoble : Olivier Richard, and with Gipsa-lab in Grenoble : Bogdan Robu.

8.1.2 Software Architectures for multiple loops

Participants: Eric Rutten.

We study the question of multiple loops coordination also from the point of view of Software Architectures, generalizing from the similarities and recurring patterns appearing in use-cases. In the past we have worked in the framework of software components-based approaches (JSS 1,TSE 3) involving proposals for modularity and hierarchy of autonomic discrete controllers. In another series of works, targeting the self-adaptation of reconfigurable hardware, namely DPR FPGA (TECS 2), we considered the management of a combination of mission-level and computing platform-level objectives (CBSE14 8). In other, more applicative work related to a rule-based middleware (ICCAC17 37), we proposed a design framework for reliable multiple Autonomic Loops, motivated by the management of different functionalities, at different levels of the system, and/or with different decision models. Part of the ideas emerging from that work was followed upon in the different context of the CPS4EU project, where we explored software architectures for self-adaptative middleware support for IoT and CPS. We proposed the separation of concerns between self-adaptation at the different levels of applications or functionality on the one side, and infrastructure and resources on the other side (ECSA20, HICSS22 10, 38).

Recent developments were performed with application to a use case in smart grids, provided by a cooperation with RTE (see Section 8.2.4) and published as a journal paper 1322.

Further developments of these ideas are ongoing, in relation to the notion of computing within limits, where dynamical changes of the limits are reacted unpon by reconfigurations at both levels of redeployment on the current architecture and of change of mode of the application (e.g. degraded mode). This research direction is going to be explored further in the context of different projects :

  • the Tasting project (see Section 10.2.3), in cooperation with RTE for the applications in smart grid control functions management ;
  • the RADYAL project (see Section 10.2.4) where reconfiguration targets both Machine Learning applications (acting on algorithms parameters) and hardware architectures (acting on variables precision) ;
  • further, in the Taranis project (see Section 10.2.2), in the context of Cloud and Edge computing systems.

8.1.3 Discrete Control and reactive languages

Participants: Gwenaël Delaval, Jolahn Vaudey, Stéphane Mocanu, Eric Rutten.

Our work in reactive programming for autonomic computing systems is focused on the specification and compilation of declarative control objectives, under the form of contracts, enforced upon classical mode automata as defined in synchronous languages. The compilation involves a phase of Discrete Controller Synthesis, integrating the tool ReaX, in order to obtain an imperative executable code. The programming language Heptagon / BZR (see Section 7.1.1 ) integrates our research results 7, 3.

Recent work concerns a methodology for the evaluation of controllers. We are considering that Discrete Controller Synthesis produces results that are correct by construction w.r.t. the formal specification, but in practice there remains to evaluate the obtained controller quantitatively, to check e.g., whether it is not overconstrained, and effectively producing the expected impact on the overall system behavior. We consider our work on self-protection (see Section 8.3.2) as a use case, evaluating the improvement of resilience of a system in the presence of attacks. A journal paper is under submission on this topic.

Ongoing work considers comparisons between DCS and other methods (e.g., scheduling or constraint programming) which appear to be better useable, according to criteria to indentify problems for which the language is required e.g., importance of a discrete state space, expressivity or efficiency of generated program.

Research perspectives concerns the the language e.g., expressivity and efficiency (optimisation of ReaX), and its use for the simulation of industrial systems, involving code generation for PLCs. Ongoing technical work concerns an internal redesign of the compiler, to improve maintainability and ease of installation, as well as experimentations w.r.t. syntax and simulation techniques, for a next version.

8.2 Self-adaptative distributed systems in Cloud-Edge and HPC

HPC (High-Performance Computing) systems have increasingly become more varying in their behavior, in particular in aspects such as performance and power consumption, thereby encountering problems also known in the Cloud, and the fact that they are becoming less predictable demands more runtime, autonomic management 12. We explore related issues along the following topics.

8.2.1 Sustaining performance while reducing energy consumption with a Control Theory Approach

Participants: Raphaël Bleuse, Jonathan Bleuzen, Kouds Halitim, Eric Rutten.

We explore a form of trade-off between performance and resource and energy consumption, with the aim to sustain performance while reducing energy consumption with a Control Theory approach. The infrastructure is considered at a level close to the hardware, in that we use the RAPL (Running Average Power Limit) mechanism available in Intel processors. We exploit heterogeneity as an opportunity: as applications dynamically undergo variations in workload, due to phases or data/compute movement between devices, one can dynamically adjust power across compute elements to save energy without impacting performance. With an aim toward an autonomous and dynamic power management strategy for current and future HPC architectures, we explore the use of control theory for the design of a dynamic power regulation method, periodically monitoring application progress and choosing at runtime a suitable power cap for processors. Thanks to a preliminary offline identification process, we derive a model of the dynamics of the system and a proportional-integral (PI) controller. We evaluate our approach on top of an existing resource management framework, the Argo Node Resource Manager, deployed on several clusters of Grid’5000, using a standard memory-bound HPC benchmark.

Building upon a methodology and first results (EuroPar21 4), we improved the robustness and reusability of controllers by leveraging adaptive control . New results consist of an approach that incorporates cascaded control strategies, such as PI control and MPC (Model Predictive Control), integrated into the Argo Node Resource Manager framework. A conference paper is submitted, and a journal paper is under finalization on these topics.

Amongst perspectives, we are considering to use it as a background in our starting research in the WP5 of challenge Inria-Qarnot Computing "PULSE" (see Section 9.1).

This work is done in cooperation with the Spirals team at Inria Lille : Sophie Cerf, with whom we co-advised the MSc internship of Kouds Halitim in the Spirals team at Inria Lille.

This work is also done in cooperation with Swann Perarnau (Argonne National Lab., Chicago, IL) in the framework of the JLESC : Joint Laboratory on Extreme Scale Computing (see Section 10.1.1 ).

8.2.2 RJMS-level dynamical resource harvesting in HPC clusters

Participants: Raphaël Bleuse, Jonathan Bleuzen, Bogdan Robu, Eric Rutten.

This resource harvesting problem is found in the context of CiGri, a simple, lightweight, scalable and fault tolerant grid system which exploits the unused resources of a set of computing clusters. CiGri harvests and exploits the unused resources of a set of computing clusters, by injecting best-effort jobs on top of the prioritary applications. We consider autonomic administration for scientific workflows management through a control theoretical approach for maximizing usage while avoiding overload.

We propose a model described by parameters related to the key aspects of the infrastructure thus achieving a deterministic dynamical representation that covers the diverse and time-varying behaviors of the real computing system. We studied simple forms of PI control, as well as adaptive control and an extension with model free control. We first considered essentially the performance of harvesting itself, then integrated the problem of Distributed File Server load, that can heavily disturb prioritary applications. This approach was also the topic of the Master's thesis in Control Theory of Rosa Pagano published at CCTA24 19.

We performed a comparative study with regard to the reusability of controllers when deployed on varying target platforms, or subjected to varying load patterns. A journal paper is under submission on this topic.

We put an emphasis on reproducibility of experiments, as well as on frugality with the reduction of the cost of these experiments.

This work has been the object of the PhD of Quentin Guilloteau, defended at the end of 2023. This work is done in cooperation with the Datamove team of Inria/LIG (O. Richard), and Gipsa-lab (B. Robu). This work is also done in cooperation with the Spirals team at Inria Lille : Sophie Cerf.

8.2.3 Combining Scheduling and Autonomic Computing for Parallel Computing Resource Management

Participants: Raphaël Bleuse, Clément Mommessin, Bogdan Robu, Eric Rutten.

This research topic aims at studying the relationships between scheduling and autonomic computing techniques to manage resources for parallel computing platforms. The performance of such platforms has greatly improved (149 petaflops as of November 2019 36) at the cost of a greater complexity: the platforms now contain several millions of computing units. While these computation units are diverse, one has to consider other constraints such as the amount of free memory, the available bandwidth, or the energetic envelope. The variety of resources to manage builds complexity up on its own. For example, the performance of the platforms depends on the sequencing of the operations, the structure (or lack thereof) of the processed data, or the combination of application running simultaneously.

Scheduling techniques offer great tools to study/guaranty performances of the platforms, but they often rely on complex modeling of the platforms. They furthermore face scaling difficulties to match the complexity of new platforms. Autonomic computing manages the platform during runtime (on-line) in order to respond to the variability. This approach is structured around the concept of feedback loops. The scheduling community has studied techniques relying on autonomic notions, but it has failed to link the notions up.

We are starting to address this topic at the general level of a state of the art of relations between the two domains, and also at the more concrete and specific level of a real-world use-case, in the context of CiGri as in previous Section 8.2.2. Indeed this context features a RJMS (Resources and Jobs Management System) involving the OAR scheduler. Therefore we are identifying coordination with the previously described controller and OAR, in particular in such way that OAR is able to notify the controller of upcoming rises or falls of activity in prioritary tasks, and we are exploring how this information can be exploited by the controller, by adopting for example a Feed Forward approach.

This work has been part of the object of the PhD of Quentin Guilloteau, defended at the end of 2024 A journal paper is under finalization on this topic.

This work is done in cooperation with the Datamove team of Inria/LIG (O. Richard), and Gipsa-lab (B. Robu).

Amongst perspectives of this topic, we are considering to use it as a background in our starting research in the WP6 of defi Inria-Qarnot Computing "PULSE" (see Section 9.1).

8.2.4 Self-adaptive Control of Fog/Edge-based Services using Constraint Solving : Smart Grids Use Case

Participants: Stéphane Mocanu, Clément Mommessin, Ghada Moualla, Eric Rutten.

In this work we consider self-adaptation at the level of Software Architectures, targeted at the domain of Cloud-Edge infrastructures being adopted in application domains like Smart Grids. We are currently studying the integration to constraints models of dynamical aspect, so that speed or acceleration of variations in the system can be taken into account in the reaction.

This activity follows that in the H2020 project CPS4EU. As an applicative use-case of our Software Architectures approach from Section 8.1.2, we consider Smart Grid management (HICSS'22 38). We consider self-adaptive security in such Cloud-Edge infrastructures-based CPS. Security risk assessment is an important challenge in the design of Cyber Physical Systems (CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to changes in their environment, as well as evolutions in their infrastructures, makes them self-adaptive systems, where security aspects have to be considered in terms of management of detections and reactions for self-protection. In this work, we propose an approach to autonomously mitigate the threats in each reconfiguration at application or infrastructure levels of CPS. We propose and implement a framework for self-adaptive security : software architecture, design method, and integration with model-based decision. We use Attack-Defense Trees for modeling threats, and our approach involves security risk assessment, taking into account its balancing and coordination with quality of service aspects. We formulate and formalize the on-line decision problem to be solved at each cycle of the self- adaptation control loop in terms of Constraint Programming (CP) modeling and resolution. The CP model implements a set of constraints that allow to specify secure configurations, evaluated regarding their impact on system performance to pinpoint the most relevant one portraying a good balance between the security and quality of service. We perform validation of our approach with its application to Smart Grids, more particularly to an industrial case study from RTE. A journal paper is published on this topic 13.

A perspective of this topic is to use it as a background in our starting research in the Tasting project of PEPR TASE (see Section 10.2.3), also in coopération with RTE.

This work is done in cooperation with RTE (the French Energy Transportion company) : Guillaume Giraud.

8.3 Cyber-Security & Self-protection

CTRL-A team is participating in the PEPR Cybersecurity reseach projetc SuperviZ. Stéphane Mocanu is the leader of the Platform workpackage of SuperviZ (Section 10.2.1).

8.3.1 Intrusion detection in industrial control systems

Participants: Mike Da Silva, Estelle/Maréva Hotellier, Lea Astrid Kenmogne Mekemte, Stéphane Mocanu.

First results on process oriented sequential attacks detection were obtained during Oualid Koucham’s PhD and published recently in 32 together with a general alert correlation framework.

A complete intrusion detection and alert correlation framework was proposed and process oriented IDS and correlator were synthesised, implemented and available in open-source on-line (see Section 7.2 and G-ICS). Smart-grid applications on intrusion detection and impact on dependability were presented in 33.

We further develop the results for distributed and hierarchical systems in the PhD thesis of Estelle Hotellier 25. We recently extended Zeek IDS detection capabilities to CAN networks and the code will is freely available 28.

A first version was presented in 23 and a FIC MasterClass was presented ; a full version appeared is 14. A naval use case application was presented in 17.

Recently we start developping intrusion detection systems based on artificial intelligence systems. A firts approach and results was presented in 18.

8.3.2 Resilience and reaction in Industrial Control Systems

Participants: Gwenaël Delaval, Stéphane Mocanu, Eric Rutten, Jolahn Vaudey.

As consequences of attacks on Industrial Control Systems may be dramatic, an important topic in ICS cybersecurity is the improvement of cyber-resilience. Reaction in case of attacks is also a crucial and sensitive topic. Our approach for both resilience and reaction problems is based on the notion of self-protection, where self-adaptation takes the form of self-reconfiguration of the architecture. Based on a first approach developed in the PhD of Kabir-Querrec, and experience on modelling reconfiguration with DES, we formalized recently the self-protection problems as a DES control problems. A model and a formulation of the reconfiguration problem was specified in Heptagon/BZR (IFAC World 2020 conference 6).

We are currently working on a method to evaluate the effectiveness of the obtained controllers related to Section 8.1.3.

This is the topic of the PhD thesis in Computer Science of Jolahn Vaudey. A domain specific modelling language was developped for industrial control systems based on international standard IEC 62443 21 and a reconfiguration methodology was published in 20. A software tool allowing system modelling and reconfiguration scenarios synthesis is available 29.

8.3.3 Automated risk analysis, and Embedded program verification

Participants: Nelson Nkawa, Mike Da Silva, Stéphane Mocanu.

One of our research topics is in automated risk analysis, with the specification of a DSML dedicated to the automated analysis of the security of industrial control systems based on their safety properties. The idea is to extract the devices characteristic and the flow cartography from the configuration files and enrich the model with the description of the network infrastructure and available security measures.

Based on public vulnerability databases, a STRIDE threat model will be automatically constructed and a list of suggested measures proposed. An incipient proof of concept of automatic flow cartography based on configuration files was proposed in the PhD of Maëlle Kabir-Querrec.

Results on extending STRIDE modelling to ICS and automatic generation of attack scenarios where published in 24. Risk analysis methodology was pattented under 26 and 27.

9 Bilateral contracts and grants with industry

9.1 Bilateral grants with industry

Naval Group

Participants: Estelle Hotellier, Stéphane Mocanu.

We have a cooperation with Naval Group, around the PhD grant of Estelle Hotellier, on the topic of intrusion detection in complex Industrial Control Systems (ICSs), as described in Section 8.3.1. We are interested in Process-Aware attacks i.e. attacks that target the physical integrity of systems. We consider the hybrid nature of ICSs and our methodology applies for event-driven and continuous dynamical systems. We aim at developing a behavioral network traffic Intrusion Detection System (IDS) based on the ICS characterization through security properties. To do so, we extract system safety properties from standards, devices programs or system specifications and synthesize them into security patterns. These patterns are then monitored by our IDS which is in charge of raising alerts.

CEA

Participants: Mike da Silva, Stéphane Mocanu.

We have a cooperation with CEA, around the PhD grant of Mike da Silva, as described in Section 8.3.3. This PhD topic objective is to provide an automatic vulnerability extraction from a security oriented ICS architecture model. Existing modeling languages (SCL for substation and AutomationML for industrial automation) provide support for controller hardware and network accessible data description but not for complete data flow and network infrastructure description nor for vulnerabilities and their effects. We extend existing languages with support for network infrastructure modeling including security controls and data flow description together with a vulnerability data-base support. We will rely on public CVE data bases and an extensive study of industrial protocols formal verification including support for high-availability networks. The results of the automatic architecture model processing is used for threat modeling, attack scenario construction, attack impact assessment and eventually security controls choice assistance.

Qarnot computing

Participants: Raphaël Bleuse, Kouds Halitim, Bogdan Robu, Eric Rutten.

We have a cooperation with Qarnot computing in the framework of the Inria challenge PULSE (website), with the support of Ademe, on the topic of pushing carbon-neutral services towards the edge. Particularly, we are involved in WP5 on the Control of emissions of intensive computation tasks, and WP6, which we are coordinating, on the efficient hybridation of heterogeneous computing tasks.

RTE

Participants: Stéphane Mocanu, Clément Mommessin, Eric Rutten.

We have a cooperation with RTE (the French Energy Transportion company) : Guillaume Giraud, following our recent work in the H2020 CPS4EU project. It is continuing in the new project Tasting (Section 10.2.3) of the PEPR TASE.

10 Partnerships and cooperations

10.1 International initiatives

10.1.1 Participation in other International Programs

JLESC

Participants: Raphaël Bleuse, Eric Rutten.

We participate in the JLESC, Joint Laboratory for Extreme Scale Computing, with partners INRIA, the University of Illinois, Argonne National Laboratory, Barcelona Supercomputing Center, Jülich Supercom- puting Centre and RIKEN AICS. We started a cooperation with Argonne National Labs, in the framework of a project on improving the performance and energy efficiency of HPC applications using autonomic computing techniques (see Section 8.2.1).

This work is done in cooperation with the Spirals team at Inria Lille : Sophie Cerf.

Special issue ACM TAAS

Participants: Eric Rutten.

We are co-editors, with Alesssandro Papadopoulos, Mälardalen U. (Sweden), and Sophie Cerf, Spirals team at Inria Lille, of a Special Issue on Control for Computing of the ACM TAAS (ACM Transactions on Autonomous and Adaptive Systems).

10.2 National initiatives

10.2.1 PEPR Cybersecurity, project SuperviZ

Participants: Léa Kenmogne, Stéphane Mocanu, Eric Rutten.

We participate in the PEPR Cybersecurity research project SuperviZ.

Stéphane Mocanu is the leader of the Platform workpackage of SuperviZ.

10.2.2 PEPR Cloud, project Taranis

Participants: Raphaël Bleuse, Eric Rutten.

In the framework of the PEPR Cloud, Ctrl-A is participating in the project Taranis (Model, Deploy, Orchestrate, and Optimize Cloud Applications and Infrastructure), particularly in WP 3 : Orchestration of services and ressources.

We will cooperate with teams Spirals at Inria Lille and Stack at Inria in Nantes, on topics amongst : integration of Control and Constraints, and of Control and Scheduling, as model and decision tools in autonomic managers, integration of temporal aspects in reconfiguration management.

10.2.3 PEPR TASE, project Tasting

Participants: Stéphane Mocanu, Clément Mommessin, Eric Rutten.

In the framework of the PEPR TASE (Technologies Avancées des Systèmes Énergétiques), Ctrl-A is participating in the project Tasting (TrAnsformation of the energy SysTem for a better resilience and flexibility with enhanced digitalization), particularly in :

  • WP1 : Infrastructure reliability and security with a post-doc position on : specification of the distributed architecture and reconfiguration strategy for the communication and control infrastructure
  • WP2 : Distributed architectures of cyber-physical systems with a post-doc position on : methods for attacks detection by events correlation between network traffic observations and logs from control equipment
  • WP3 : Ease deployment on hardware with post-doc positions on :
    • model-based control (constraints solving) of self-adaptive deployment of distributed applications on the Cloud-Edge infrastructures
    • reactive infrastructures for rapid protection in case of process perturbation

10.2.4 ANR RADYAL

Participants: Bogdan Robu, Eric Rutten.

Ctrl-A participates in the ANR project (in the ANR call : AI computing hardware architectures and accelerators in the context of Edge Computing) called Radyal Resource-Aware DYnamically Adaptable machine Learning, in cooperation with INSA Lyon / LIRIS (Stefan Duffner), the TARAN team, Inria / Irisa, Rennes (Marcello Traiola), and the MODUS team, UGA / GIPSA-lab, Grenoble (Bogdan Robu).

We will work on the analysis of self-adaptationreconfiguration spaces in the dimensions of Application (DNN algorithms), environment (applicative aspects e.g., lighting, obstruction in image analysis), and infrastructure and implementation configuration and deployment (involving hardware with reconfigurable precision and mapping).

11 Dissemination

Participants: Raphaël Bleuse, Gwenaël Delaval, Stéphane Mocanu, Eric Rutten.

11.1 Promoting scientific activities

11.1.1 Scientific events: organisation

Member of the organizing committees

Stéphane Mocanu is participating in the steering committee of RESSI (Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information) (Ressi web site).

Eric Rutten is participating in the steering committee of FETCH (École d’hiver Francophone sur les Technologies de Conception des Systèmes Embarqués Hétérogènes) the Winter School on Heterogeneous Embedded Systems Design Technologies, for the 2023, 2024 and 2025 editions (Fetch web site).

11.1.2 Scientific events: selection

Member of the conference program committees

Eric Rutten is IEEE Control Systems Society (CSS) Associate Editor, Technology Conference Editorial Board Technology Conferences Editorial Board (TCEB), and PC member for CCTA 24 and CCTA 25. Eric Rutten is PC member for PECS 24, CoDIT 24, WODES 24.

Reviewer

Gwenaël Delaval is reviewer for WODES 24.

11.1.3 Journal

Reviewer - reviewing activities

Stéphane Mocanu is reviewer for j. Computer and Security.

Eric Rutten is reviewer for FGCS, journal on Internet of Things, and Engineering Cyber Physical Human Systems (Elsevier).

11.1.4 Invited talks

Stéphane Mocanu is invited speaker at the PEPR Cybersécurité École d’hiver en cybersécurité, 29 jan.-2 feb. 2024, Autrans School web site.

11.1.5 Scientific expertise

Stéphane Mocanu is member of the Scientific and Technical Comitee of the SEE society.

11.1.6 Research administration

Raphaël Bleuse is member of the team organizing the LIG keynotes.

Gwenaël Delaval is elected member at the Academic Council (Conseil Académique) of University Grenoble Alpes (UGA) for the Confédération Générale du Travail trade union.

Eric Rutten is a named member of the Scientific Board (Bureau Scientifique) of LIG (Lig) until sept. 2024. He co- organised the LIG workshop of axes WAX.

11.2 Teaching - Supervision - Juries

11.2.1 Teaching

  • R. Bleuse; computer architecture; 20h tutorials/practicals; L1; Univ. Grenoble Alpes
  • R. Bleuse; network architecture; 34h tutorials/practicals; L1; Univ. Grenoble Alpes
  • R. Bleuse; C language; 14h lectures/practicals; L2; Univ. Grenoble Alpes
  • R. Bleuse; application development and deployment; 12h; L2; Univ. Grenoble Alpes
  • R. Bleuse; network architecture; 10h tutorials/practicals; L2; Univ. Grenoble Alpes
  • R. Bleuse; advanced virtualization; 35h lectures/tutorials/practicals; L3; Univ. Grenoble Alpes
  • R. Bleuse; continuous integration; 40h lectures/tutorials/practicals; L3; Univ. Grenoble Alpes
  • R. Bleuse; optimisation of complex services; 16h lectures/tutorials/practicals; L3; Univ. Grenoble Alpes
  • R. Bleuse; computer science 101; 30h lectures/practicals; continuing professional development; Univ. Grenoble Alpes
  • Licence : G. Delaval, Bases du développement logiciel, modularité et tests, 15h lecture/tutorials, 15h lab, L2, Univ. Grenoble Alpes
  • Master : G. Delaval, Sémantique des Langages de Programmation et Compilation, 30h tutorials, M1, Univ. Grenoble Alpes
  • Master : G. Delaval, Compilation project, 4 weeks software project tutoring, M1, Univ. Grenoble Alpes
  • Master : S. Mocanu, Computer Networks and Cybersecurity, 16h class, 34h lab, M1, Grenoble-INP/ENSE3
  • Master : S. Mocanu, Industriel Computer Networks, 8h class, 8h lab, niveau (M1, M2), M2, Grenoble-INP/ENSE3
  • Master : S. Mocanu, Reliability, 10h class, 8h lab, M2, Grenoble-INP/ENSE3
  • Master : S. Mocanu, Intrusion Detection and Defense in Depth labs, niveau M2, Grenoble-ENSE3/ENSIMAG
  • Lifelong-learning : S. Mocanu, Industrial Control Sytels Cybersecurity, Inria Academy, One day State-of-the-Art Training. systèmes
  • Lifelong-learning : S. Mocanu, IEC 61850 substations communication protocols and data models : two days advanced Training, Grenoble-INP Lifelong-learning departement.

11.2.2 Supervision

  • PhD : Estelle Hotelier(CIFRE grant);Intrusion Detection in Complex Hybrid Industrial Systems, started April 2021, defended April 2024 ; co-advised by Stéphane Mocanu with Franck Sicard and Julien Francq (Naval Group).
  • PhD : Mike Da Silva(CEA grant);Automated Risk Analysis for Industrial Systems,started October 2021, defended October 2024; co-advised by Stéphane Mocanu with Maxime Puys and Pierre-Henri Thevenon (CEA-Leti).
  • PhD in progress : Jolahn Vaudey (UGA),Self-reconfiguration of industrial systems applied to cyber-resilience ; started October 2022 ; co-advised by Stéphane Mocanu, Gwenaël Delaval, Eric Rutten.
  • PhD in progress : Kouds Halitim(Inria),Efficicient task hybridization in heterogeneouscomputing: practical combinations of Control and Scheduling theories ; started November 2023 ; co-advised by Raphaël Bleuse, Eric Rutten, Bogdan Robu.
  • PhD in progress : Lea Astrid Kenmogne Mekemte (UGA), Explainable IA for Network Intrusion Detection in Industrial Control Systems ; started November 2023 ; advised by Stéphane Mocanu.

11.2.3 Juries

Raphaël Bleuse is member of the PhD dissertation committee of Manal BENAISSA, U. Besançon, Dec. 2024.

Stéphane Mocanu is member of the PhD dissertation committee of Mohand Hamadouche, U. Brest, Feb. 2024.

Eric Rutten is member of the PhD dissertation committee of Jeroen Verbakel, Eindhoven University of Technology, The Netherlands, June 2024.

11.3 Popularization

Stéphane Mocanu was invited speaker at SIDO 2024 saloon in Inria Academy Workshop of Industrial Control System security. He also was invited speaker in the Tenerdis/Minalogic Webinar on Photovoltaic Farms Cybersecurity.

Raphaël Bleuse designed and animated a one hour mediation workshop on "generative AI and knowledge" in the framework of the 2024 Fête de la Science. The workshop deals with the notion of construction of knowledge by comparing the methods of physics with the text generation process of a generative AI. It was held four times, with a public of high school and BTS students.

12 Scientific production

12.1 Major publications

  • 1 articleF.Frederico Alvares, E.Eric Rutten and L.Lionel Seinturier. A Domain-specific Language for The Control of Self-adaptive Component-based Architecture.Journal of Systems and SoftwareJanuary 2017HALback to text
  • 2 articleX.Xin An, E.Eric Rutten, J.-P.Jean-Philippe Diguet and A.Abdoulaye Gamatié. Model-based design of correct controllers for dynamically reconfigurable architectures.ACM Transactions on Embedded Computing Systems (TECS)153February 2016HALback to text
  • 3 articleN.Nicolas Berthier, E.Eric Rutten, N.Noël De Palma and S.-K. M.Soguy Mak-Karé Gueye. Designing Autonomic Management Systems by using Reactive Control Techniques.IEEE Transactions on Software Engineering427July 2016, 18HALback to textback to textback to text
  • 4 inproceedingsS.Sophie Cerf, R.Raphaël Bleuse, V.Valentin Reis, S.Swann Perarnau and E.Eric Rutten. Sustaining Performance While Reducing Energy Consumption: A Control Theory Approach.Lecture Notes in Computer ScienceEURO-PAR 2021 - 27th International European Conference on Parallel and Distributed Computing12820Euro-ParLisbon, PortugalSpringerSeptember 2021, 334–349HALDOIback to text
  • 5 inproceedingsS.Sophie Cerf and E.Eric Rutten. Combining neural networks and control: potentialities, patterns and perspectives.Proceedings of The 22nd World Congress of the International Federation of Automatic ControlIFAC 2023 - 22nd World Congress of the International Federation of Automatic ControlYokohama, JapanJuly 2023HALback to text
  • 6 inproceedingsG.Gwenaël Delaval, A.Ayan Hore, S.Stéphane Mocanu, L.Lucie Muller and E.Eric Rutten. Discrete Control of Response for Cybersecurity in Industrial Control.IFAC 2020 - IFAC World Congress 2020Proc. of the 21st IFAC World CongressBerlin, GermanyJuly 2020, 1-8HALback to text
  • 7 articleG.Gwenaël Delaval, E.Eric Rutten and H.Hervé Marchand. Integrating Discrete Controller Synthesis in a Reactive Programming Language Compiler.journal of Discrete Event Dynamic System, jDEDS, special issue on Modeling of Reactive Systems2342013, 385-418URL: http://dx.doi.org/10.1007/s10626-013-0163-5back to text
  • 8 inproceedingsS.-K. M.Soguy Mak-Karé Gueye, G.Gwenaël Delaval, E.Eric Rutten, D.Dominique Heller and J.-P.Jean-Philippe Diguet. A Domain-specific Language for Autonomic Managers in FPGA Reconfigurable Architectures.ICAC 2018 - 15th IEEE International Conference on Autonomic ComputingTrento, ItalyIEEESeptember 2018, 1-10HALback to textback to text
  • 9 incollection M.Marin Litoiu, M.Mary Shaw, G.Gabriel Tamura, N. M.Norha M. Villegas, H.Hausi Müller, H.Holger Giese, R.Romain Rouvoy and E.Eric Rutten. What Can Control Theory Teach Us About Assurances in Self-Adaptive Software Systems? Software Engineering for Self-Adaptive Systems 3: Assurances 9640 LNCS Springer May 2017 HAL back to text back to text
  • 10 inproceedingsM. T.Mahyar T Moghaddam, E.Eric Rutten, P.Philippe Lalanda and G.Guillaume Giraud. IAS: an IoT Architectural Self-adaptation Framework.ECSA 2020 - 14th European Conference on Software ArchitectureL’Aquila, ItalySeptember 2020, 1-16HALback to text
  • 11 incollectionE.Eric Rutten, N.Nicolas Marchand and D.Daniel Simon. Feedback Control as MAPE-K loop in Autonomic Computing.Software Engineering for Self-Adaptive Systems III. Assurances.9640Lecture Notes in Computer ScienceSpringerJanuary 2018, 349-373HALDOIback to text
  • 12 articleN.Naweiluo Zhou, G.Gwenaël Delaval, B.Bogdan Robu, E.Eric Rutten and J.-F.Jean-François Méhaut. An Autonomic-Computing Approach on Mapping Threads to Multi-cores for Software Transactional Memory.Concurrency and Computation: Practice and Experience3018September 2018, e4506HALDOIback to textback to text

12.2 Publications of the year

International journals

International peer-reviewed conferences

Conferences without proceedings

  • 22 inproceedingsS.Salim Chehida, E.Eric Rutten, G.Guillaume Giraud and S.Stéphane Mocanu. Model-Driven Approach for Self-Adaptive Security of Cyber-physical Systems: Application to smart grids.AFADL 2024 - Journées Approches Formelles dans l'Assistance au Développement de LogicielsStrabourg, FranceJune 2024, 1-4HALback to text
  • 23 inproceedingsE.Estelle Hotellier. An Innovative Behavioral Approach of Intrusion Detection for Industrial Control Systems.FIC 2023 - Forum International de la CybersécuritéLille, France2024HALback to text

Doctoral dissertations and habilitation theses

  • 24 thesisM.Mike Da Silva. Safety-Security Convergence of Industrial Control Systems:Cybersecurity Risk Assessment for System Safety.UGA - Université Grenoble AlpesOctober 2024HALback to text
  • 25 thesisE.Estelle Hotellier. Specification-based Intrusion Detection for Hierarchical Hybrid Industrial Control Systems.Université Grenoble Alpes [2020-....]April 2024HALback to text

Patents

Software

12.3 Cited publications

  • 30 bookJ.J. Hellerstein, Y.Y. Diao, S.S. Parekh and D.D. Tilbury. Feedback Control of Computing Systems.Wiley-IEEE2004back to text
  • 31 articleJ. O.J. O. Kephart and D. M.D. M. Chess. The Vision of Autonomic Computing.IEEE Computer361January 2003, 41--50back to text
  • 32 articleO.Oualid Koucham, S.Stéphane Mocanu, G.Guillaume Hiet, J.-M.Jean-Marc Thiriet and F.Frédéric Majorczyk. Cross-domain Alert Correlation methodology for Industrial Control Systems.Computers and Security118JulyApril 2022, 102723HALDOIback to text
  • 33 articleS.Stéphane Mocanu and J.-M.Jean-Marc Thiriet. Real-Time Performance and Security of IEC 61850 Process Bus Communications.Journal of Cyber Security and Mobility102April 2021, 1-42HALDOIback to text
  • 34 articleM.Maxime Puys, P.-H.Pierre-Henri Thevenon, S.Stéphane Mocanu, M.Mathieu Gallissot and C.Camille Sivelle. SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms.Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications1312022, 4-32HALDOIback to text
  • 35 articleP.P.J. Ramadge and W.W.M. Wonham. On the Supervisory Control of Discrete Event Systems.Proceedings of the IEEE771January 1989back to text
  • 36 miscE.Erich Strohmaier, J.Jack Dongarra, H.Horst Simon and M.Martin Meuer. TOP500 list.URL: https://www.top500.org/lists/back to text
  • 37 inproceedingsA. N.Adja Ndeye Sylla, M.Maxime Louvel, E.Eric Rutten and G.Gwenaël Delaval. Design Framework for Reliable Multiple Autonomic Loops in Smart Environments.2017 IEEE International Conference on Cloud and Autonomic Computing (ICCAC) Tucson, AZ, United StatesSeptember 2017HALback to text
  • 38 inproceedingsM.Mahyar Tourchi Moghaddam, E.Eric Rutten and G.Guillaume Giraud. Hierarchical Control for Self-adaptive IoT Systems A Constraint Programming-Based Adaptation Approach.HICSS 2022 - Hawaii International Conference on System SciencesHawaii, United StatesJanuary 2022, 1-10HALback to textback to text