Scientific publications
#
- 🇬🇧 2025 TAROT: Task-Oriented Authorship Obfuscation Using Policy Optimization Methods. Gabriel Loiseau, Damien Sileo, Damien Riquet, Maxime Meyer, Marc Tommasi. PrivateNLP 2025 (Sixth Workshop on Privacy in Natural Language Processing).
- 🇬🇧 2024 WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection. Gabriel Loiseau, Valentin Lefils, Maxime Meyer, Damien Riquet. CODASPY 2024 (ACM Conference on Data and Application Security and Privacy).
- 🇬🇧 2023 Targeted Attacks: Redefining Spear Phishing and Business Email Compromise. Sarah Wassermann, Maxime Meyer, Sébastien Goutal, Damien Riquet. arXiv Preprint.
- 🇫🇷 2015 DISCUS : Une architecture de détection d’intrusions réseau distribuée basée sur un langage dédié. Damien Riquet. PhD Thesis, Université Lille 1 - Sciences et Technologies.
- 🇫🇷 2014 DISCUS: A massively distributed IDS architecture using a DSL-based configuration. Damien Riquet, Gilles Grimaud, Michaël Hauspie. International Conference on Information Science, Electronics and Electrical Engineering, Sapporo, Japan.
- 🇫🇷 2014 Un langage pour la configuration de DISCUS, une architecture distribuée de solutions de sécurité. Damien Riquet, Gilles Grimaud, Michaël Hauspie. ComPAS: conférence en parallélisme, architecture et systèmes, Neuchâtel, Suisse.
- 🇫🇷 2012 Etude de l’impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux. Damien Riquet, Gilles Grimaud, Michaël Hauspie. MAnifestation des JEunes Chercheurs en Sciences et Technologies de l’Information et de la Communication, Lille, France.
- 🇬🇧 2012 Large-Scale Coordinated Attacks: Impact on the Cloud Security. Damien Riquet, Gilles Grimaud, Michaël Hauspie. Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy.
Others
#
Talks
#
- 🇬🇧 2025 Breaking and Securing LLMs: Understanding Information Leakage Risks and Defenses. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG).
- 🇬🇧 2021 Detecting Malicious Images in Email with Computer Vision. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG).
- 🇫🇷 2017 Ergonomie du poste de travail. 🔗
- 🇫🇷 2017 High availability at kernel-level in the Stormshield Network Security firewall. ComPAS : conférence en parallélisme, architecture et systèmes.
Work related publications
#
- 🇬🇧 2025 Detection of Cyberthreats with Computer Vision (Part 3). Hornetsecurity. 🔗
- 🇬🇧 2025 Detection of Cyberthreats with Computer Vision (Part 2). Hornetsecurity. 🔗
- 🇬🇧 2021 Remote Images Are Pushing Email Filters to Their Limits. Vade. 🔗
- 🇬🇧 2021 Three new forms of cyberattack to be worried about in 2022. Digital Journal. 🔗
- 🇬🇧 2021 Remote work strategies are needed to challenge cyberattacks. Digital Journal. 🔗
- 🇬🇧 2021 Email Security Predictions 2022: 4 Ways Hackers Will Target Businesses. Vade. 🔗
- 🇬🇧 2021 3 Email Hacking Techniques to Watch in 2021. Cyber Defense Magazine. 🔗
- 🇬🇧 2021 Auto-Remediate With Computer Vision Is Live in Vade for M365. Vade. 🔗
- 🇫🇷 2021 Phishing : comment Vade s’est mis à la Computer Vision. LeMagIT. 🔗
- 🇫🇷 2021 Pas la même chanson avec RIANA !. L’informaticien. 🔗
- 🇬🇧 2021 An Update on Logo Detection Technology. Vade. 🔗
- 🇬🇧 2020 Email Security Predictions: 6 Ways Hackers Target Businesses. Vade. 🔗