Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
publications
UEyes: Understanding visual saliency across user interface types
Published in 2023 CHI Conference on Human Factors in Computing Systems (CHI 2023), 2023
📄 View Open Access PDF 🔗 View DOI
Recommended citation: Jiang, Y., Leiva, L. A., Rezazadegan Tavakoli, H., RB Houssel, P., Kylmälä, J., & Oulasvirta, A. (2023, April). UEyes: Understanding visual saliency across user interface types. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1-21).
UEyes: An Eye-Tracking Dataset across User Interface Types
Published in Workshop at 2023 CHI Conference on Human Factors in Computing Systems (CHI 2023), 2024
📄 View Open Access PDF 🔗 View DOI
Recommended citation: Jiang, Y., Leiva, L. A., Rezazadegan Tavakoli, H., RB Houssel, P., Kylmälä, J., & Oulasvirta, A. (2023, April). UEyes: An Eye-Tracking Dataset across User Interface Types. arXiv:2402.05202v1.
User Re-Authentication via Mouse Movements and Recurrent Neural Networks
Published in 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 2024
📄 View Open Access PDF 🔗 View DOI
Recommended citation: Houssel, P. R., & Leiva, L. A. (2024). User Re-Authentication via Mouse Movements and Recurrent Neural Networks. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (pp. 652-659).
Towards Explainable Network Intrusion Detection using Large Language Models
Published in 2024 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), 2025
📄 View Open Access PDF 🔗 View DOI
Recommended citation: P. R. B. Houssel, P. Singh, S. Layeghy and M. Portmann, "Towards Explainable Network Intrusion Detection using Large Language Models," 2024 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), Sharjah, United Arab Emirates, 2024, pp. 67-72, doi: 10.1109/BDCAT63179.2024.00021.
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure
Published in Doctoral Forum of the 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2025
📄 View Open Access PDF 🔗 View DOI View Presentation Slides
Recommended citation: Houssel, P. R., Laniepce, S. & Levillain O. (2025). Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure. In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S).
eX-NIDS: A framework for explainable network intrusion detection leveraging Large Language Models
Published in Computers & Electrical Engineering journal, Volume 129, Part B, 2026
🔗 View DOI
Recommended citation: Houssel, Paul RB, et al. "ex-nids: A framework for explainable network intrusion detection leveraging large language models." Computers and Electrical Engineering 129 (2026): 110826.
talks
Adversarial Robustness Toolbox (ART)
Published:
Presentation: HDR Research Tool Symposium Presentation
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure
Published:
Presentation: Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure (Presentation Slides)
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure
Published:
Presentation: Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure (Presentation Slides)
Oberservability with eBPF
Published:
Presentation: Oberservability with eBPF
teaching
Research Project Tutor
Undergraduate course, University of Luxembourg, Faculty of Science, Technology and Medicine, 2021
Supervise and guide undergraduate students for their Bachelor semester research projects.
Harnessing the MITRE ATT&CK Framework: Industrial Applications
Guest lecture in graduate course, COMP7711 - The University of Queensland, 2025
I was invited by Dr. Siamak Layeghy to deliver a guest lecture in the graduate course Cyber Incident Response (COMP7711).
