
David BrossetEcole Navale de Lanvéoc-Poulmic · Cyber and GIS department
David Brosset
PhD
About
80
Publications
23,614
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
779
Citations
Citations since 2017
Introduction
My research deals with real problems containing spatial and temporal data. I am working on several projects within this topic:
- Maritime mobility analysis
- Crowd emotion from Twitter
- City analysis by generation of human activities
I am also working on cyber security and particularly of naval systems. Two projects are concerned:
- Decision aided system during cyber attacks on ships
- Detection and automatic responses when cyber attacks occur on ships using data quality analysis
Additional affiliations
December 2008 - September 2011
Publications
Publications (80)
The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS) has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to retrain the model for every unseen cyber-attack class. However, retra...
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given partic...
The objective of this document is to describe training scenarios, which can be run on the ForeSight maritime cyber-range, in order to confront learners with concrete attack situations. The training scenarios are a major part of a complete cybersecurity training curriculum developed specifically for the maritime domain.
The objective of this deliverable is to report on three focused cybersecurity risk assessments, one for each of the ForeSight training programmes, with the end goal of:
feeding the ForeSight Innovative Curricula with ideas of domain-specific training scenarios, in particular with respect to deliverables D4.3, D4.5 and D4.7 of task T4.5;
impleme...
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable enviro...
This confidential report provides the objectives of learning and training based on literature along with the training needs identified in D4.1 for Aviation, Naval and Power Grid sectors. It also describes the methodology used to achieve the objectives as well as the evaluation of the objective with reference to relevant literature. The findings wil...
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable enviro...
The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to re-train the model for every unseen cyber-attack class. However, retraining...
As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising exponentially due to the increasing complexity of networks and services of modern ne...
In the race to simplify man-machine interactions and maintenance processes, hardware is increasingly interconnected. With more connected devices than ever, in our homes and workplaces, the attack surface is increasing tremendously. To detect this growing flow of cyber-attacks, machine learning based intrusion detection systems are being deployed at...
In order to avoid the undesirable effects of urbanisation, development policies and specific regulatory measures were gradually introduced on the French coast from the 1970s onwards, culminating in the adoption of the Coastal Law in 1986. The implementation of these regulations varies according to the different forms of urbanization, distinguished...
In history, concurrence for dominance at sea has always been a major concern for most sea-facing countries. Asthe vast majority of worldwide goods exchanges are made by sea, an answer to the growth of the worldwidecommerce over the last twenty years has been to increase the size and on board value of ships sailing betweeneastern and western countri...
With the ever growing networking capabilities and services offered to users, attack surfaces have been increasing exponentially, additionally, the intricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create...
Over the last years, the maritime sector has seen an important increase in digital systems on board. Whether used for platform management, navigation, logistics or office tasks, a modern ship can be seen as a fully featured, complex and moving information system. Meanwhile, cyber threats on the sector are real and, for instance, the year 2018 has s...
With the ever growing networking capabilities and services offered to users, attack surfaces have been increasing exponentially, additionally, the intricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create...
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication,...
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and identify these attacks, the way they are propagated and their potential impacts on the systems...
The vast majority of worldwide goods exchanges are made by sea. In some parts of the world, the concurrence for dominance at sea is very high and definitely seen as a main military goal. Meanwhile, new generation ships highly rely on information systems for communication, navigation and platform management. This ever-spreading attack surface and pe...
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication,...
With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for e...
With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for e...
n this paper, we present a platform we have designed and built in order to raise awareness on cyber security issues for stakeholders involved in a maritime context (e.g., ship officers, pilots, crew, harbor agents, officers in training), and to support our research in the context of a strong partnership with industry and academy. Maritime traffic c...
The original publication is available at www.alr-journal.org (copyright EDP Sciences).
High resolution estimates of bottom towed fishing gears are needed to provide relevant
information for natural resource management, impact assessment and maritime spatial planning. The use
of satellite-based vessel monitoring system (VMS) data is constrained by...
Modern cities, industrial plants, cars, trucks, and vessels, among others, make extensive use of cyber-physical systems and sensors. These systems are very critical and contribute to assist decision making. Large data streams are thus produced and analyzed to extract information that allows building knowledge through a set of principles called wisd...
This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastruct...
This book constitutes the refereed conference proceedings of the 15th International Symposium, W2GIS 2017, held in Shanghai, China, in May 2017.
The 11 revised full papers presented were carefully selected from 28 submissions. The papers cover hot topics related to W2GIS including Web technologies and technics; paths and navigation; and Web visuali...
The representation of human knowledge extracted from navigations in natural environments is still a research challenge for spatial cognition and computer science. When acting in natural environments people often use verbal route descriptions or sketch maps to transmit their knowledge of the environment, and some of the actions performed. The resear...
On board vessels, the Automatic Identification System sends and receives localization messages and enables vessels to better understand their surroundings. Initiated by the Safety Of Life At Sea convention, this system is used for navigation security and safety, boarding prevention, fleet control or traffic control. Some of the messages broadcasted...
Estimates of the spatial distribution and intensity of fishing activity are necessary to provide relevant information for natural resources management, impact assessment and for maritime spatial planning. However, considering the need for a multi-scale approach, the access to such high-resolution information still remains a challenge. This research...
Detecting and visualizing structures in spatial and spatio-temporal information is often the primer interest of the data scientist before going further into a statistical modeling. For labeled point patterns data, multiple co-occurrences based entropy and distance-ratios based entropy indices have proven to be useful to a global assessment or as pr...
RESUME : Cet article présente un générateur d'itinéraires basé sur un modèle des activités urbaines prenant en compte différentes contraintes spatio-temporelles. Une activité est modélisée comme un parcours sous contraintes avec différentes modalités et un ensemble de points d'intérêt identifiés dans la ville. La modélisation spatio-temporelle d'un...
Cette étude porte sur la cartographie semi-automatique des zones de pêche à la drague et sur la caractérisation de l'intensité de pratique à partir de données AIS. Une application est menée en rade de Brest pendant la saison 2011-2012 en partenariat avec le CDPMEM 29 dans le cadre du projet DACTARI. La méthode est menée en 4 étapes : (i) Structurer...
Cette étude porte sur la cartographie semi-automatique des zones de pêche à la drague et sur la caractérisation de l’intensité de pratique à partir de données AIS. Une application est menée en rade de Brest pendant la saison 2011-2012 en partenariat avec le CDPMEM 29 dans le cadre du projet DACTARI. La méthode est menée en 4 étapes : (i) Structurer...
The project to restore the maritime setting of the Mont-Saint-Michel and to improve visitor access and experience has led to a major change in how the site can be accessed and visited. To better manage and control tourist flows in a sustainable manner, the local tourism association is in need of decision-making tools. To address this issue, two com...
Detecting and visualizing structures in spatial and spatio-temporal information is often the primer interest of the data scientist before going further into a statistical modeling. For labeled point patterns data, multiple co-occurrences based entropy and distance-ratios based entropy indices have proven to be useful to a global assessment or as pr...
In this paper, we measure crowd mood and investigate its spatiotemporal distributions in a large-scale urban area through Twitter. In order to exploit tweets as a source to survey crowd mind, we propose two measurements which extract and categorize semantic terms from texts of tweets based on a dictionary of emotional terms. In particular, we focus...
The research introduced in this paper develops a semantic model whose objective is to analyze the geographical and emotion-based distribution of tweets at a large country scale. The approach extracts and categorizes tweets based on semantic orientations ofterms in a dictionary, and explores their spatial and temporal distribution. Tweets are classi...
Global climate change affects regional climates and hold implications for viticulture worldwide. Many studies have addressed the issue of the impact of climate change on viticulture in most wine regions worldwide, yet few studies are devoted to observing and simulating both climate and climate change at the “terroir” scale (local scale). However, p...
The aim of the paper is to introduce a flexible system whose objective is to help industrials and decision-makers to efficiently install a marine energy farm in a suitable area and to facilitate expertise between stakeholders. We introduced a three-step approach which allows to select marine farm sites and suitable technological solutions. The syst...
Space syntax provides a set of empirical theories and computational techniques for the analysis of the spatial structure of urban spaces that emerge from streets network. However, space syntax still does not reflect all the properties of an urban space, especially some of the functional and service-based activities that might reflect some urban pat...
The objective of this paper is to devise a strategy for developing a flexible tool to efficiently install a marine energy farm in a suitable area. The current methodology is applied to marine tidal current, although it can be extended to other energy contexts with some adaptations. We introduce a three-step approach that searches for marine farm si...
When it comes to characterize the distribution of ‘things’ observed spatially and identified by their geometries and attributes, the Shannon entropy has been widely used in different domains such as ecology, regional sciences, epidemiology and image analysis. In particular, recent research has taken into account the spatial patterns derived from to...
When maps are not available verbal route descriptions provide a useful alternative for humans navigating in a natural environment. The semantics that emerge from such descriptions encompass several modelling abstractions that have been long studied by spatial cognition. However, a formal representation of navigation descriptions still remains a res...
Cette contribution présente des éléments méthodologiques pour la description des activités humaines en mer dans une perspective d'aide à la gestion. Différentes procédures, combinant l'exploitation de bases de données spatio-temporelles issue de données AIS archivées à des analyses spatiales au sein d'un SIG, sont testées afin de caractériser le tr...
Over the past few years, several alternative approaches have been suggested to represent the spatial knowledge that emerges from natural environments. This paper introduces a rule-based approach whose objective is to generate a spatial semantic network derived from several humans reporting a navigation process in a natural environment. Verbal descr...
We present an approach for modeling oyster farming activities under spatio-temporal constraints. Combining an object-oriented geodatabase, a geographic information system and a multi-agent model, the methodology developed here offers a formal framework for analyzing the variability of the conditions in which activities are conducted and for evaluat...
Cet article présente une méthodologie de caractérisation spatiale, temporelle et quantitative du transport maritime en rade de Brest (Bretagne, France), difficile à appréhender du fait de sa forte variabilité. Par la modélisation d'une base d'informations spatio-temporelles issues de données AIS (Automatic Identification System) et le recours à des...
This paper introduces an experimental cooperative and stochastic algorithm for the derivation of spatial routes that fits the semantics of a verbal route description in natural environments. The algorithm mimics the behavior of ants, where positive feedbacks consist of pheromone trails, deposited on attractive paths. The novelty of the approach rel...