Publications
My articles on arXiv, see also ORCID.
2025
-
Cédric Bonhomme, Alexandre Dulaunoy, “VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification”, preprint for the 25V4C-TC: 2025 Vulnerability Forecasting Technical Colloquia, Darwin College, Cambridge, UK, September 25–26, 2025. [arXiv] [Hugging Face]
-
Cédric Bonhomme, Alexandre Dulaunoy, “Scoring Vulnerabilities by Leveraging Activity Data from the Fediverse”, in the FIRST Cyber Threat Intelligence Conference 2025, 22th April 2025 , Berlin, Germany. [Paper] [Presentation]
2024
-
Cédric Bonhomme, Alexandre Dulaunoy, “Correlating Security Advisories with Vulnerability-Lookup”, in the CSAF Community Days 2024, 13th December 2024 , Munich, Germany. [Paper]
-
Cédric Bonhomme, “Vulnerability-Lookup – An Open Source Tool to Support CVD Processes”, in the Valencia 2024 UNDP/UNICC/FIRST Technical Colloquium, 8th October 2024 , Valencia, Spain. [Paper]
-
Cédric Bonhomme, “Improving the CVD Process”, in Hack.lu 2024, 24th October 2024 , Dommeldange, Luxembourg. [Paper]
2018
- Fabien Mathey, Cédric Bonhomme, Juan Rocha, Jérôme Lombardi, Benjamin Joly, “Risk Assessment Optimisation with MONARC”, in hack.lu 2018, 2018. [Paper]
2012
- C. Bonhomme, G. Arnould, D. Khadraoui, “Dynamic Carpooling Mobility Services based on Secure Multi-Agent Platform”, in Global Information Infrastructure and Networking Symposium 2012 (GIIS'12), Choroni, Venezuela, December 2012. [Paper]
2011
-
M. Ouedraogo, H. Mouratidis, A. Hecker, C. Bonhomme, D. Khadraoui, D. Preston, “A New Approach to Evaluating Security Assurance”, in 7th International Conference on Information Assurance and Security, Melaka, Malaysia, December 2011. [IEEE Xplore] [ACM]
-
G. Guemkam, C. Feltus, P. Schmitt, C. Bonhomme, D. Khadraoui, Z. Guessoum, “Reputation Based Dynamic Responsibility to Agent Assignment for Critical Infrastructure”, in IAT 2011, pp. 272–275. [IEEE Xplore]
-
C. Bonhomme, C. Feltus, M. Petit, “Dynamic Responsibilities Assignment in Critical Electronic Institutions – A Context-Aware Solution for in Crisis Access Right Management”, in ARES 2011 – The International Dependability Conference, Vienna, Austria.
-
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. Gâteau, D. Khadraoui, Z. Guessoum, “Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions”, in Sixth IEEE Conference on Network Architectures and Information Systems Security (SAR-SSI 2011), La Rochelle, France.
2010
-
T. Schaberreiter, C. Bonhomme, J. Aubert, C. Incoul, “Support Tool Development for Real-Time Risk Prediction in Interdependent Critical Infrastructures”, in International Workshop on Risk and Trust in Extended Enterprises (RTEE’2010), San Jose, CA, USA, November 1–4, 2010.
-
C. Bonhomme, C. Feltus, D. Khadraoui, “A Multi-Agent Based Decision Mechanism for Incident Reaction in Telecommunication Network” (poster), in ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2010), Hammamet, Tunisia. [ACM]
-
P. Schmitt, C. Bonhomme, J. Aubert, B. Gâteau, “Programming Electronic Institutions with UTOPIA”, in Demo Session of the 22nd International Conference on Advanced Information Systems Engineering (CAiSE’10), 2010. [Springer]
-
P. Schmitt, C. Bonhomme, B. Gâteau, “Easy Programming of Agent-Based Electronic Institution with UTOPIA”, in 10th International Conference on New Technologies of Distributed Systems (NOTERE 2010), Tozeur, Tunisia, May 31 – June 2, 2010. [IEEE Xplore]
-
C. Feltus, D. Khadraoui, C. Bonhomme, “Electric Blackout Prevention: Toward a Computer-Mediated Weather Alert Broadcasting Solution”, in International Conference on Society and Information Technologies (ICSIT 2010), Orlando, 2010, pp. 45–50. [IIIS] [Paper]