Multi-criteria modelling of vulnerabilities (graphs and hypergraphs)
Using graphs to represent CVEs, their attributes, and complex relationships, enabling in-depth analysis.
Cybersecurity · Vulnerabilities · Threat Intelligence
I am studying the prioritisation and optimisation of vulnerability management through graph and hypergraph learning in order to provide more context and leverage for the industry.
2017-2020
Double degree: French Scientific Baccalaureate + German Abitur (Abibac section)
2020-2021
CPGE PCSI
2021-2022
CPGE PC
2022-2025
Engineering programme in Connected Objects and Cybersecurity
2023-2025
Cybersecurity, Threats and Vulnerabilities Engineering Apprentice
2025
Cybersecurity and Security Risk Consultant Internship
2025-présent
PhD thesis
CPGE = Preparatory class for French grandes écoles
PCSI = Physics, Chemistry and Engineering Science
PC = Physics and Chemistry
Using graphs to represent CVEs, their attributes, and complex relationships, enabling in-depth analysis.
Study of vulnerability clusters to identify similar families or behaviours.
Using graph machine learning to anticipate the evolution, exploitation and criticality of vulnerabilities.
ECCWS 2024
In the context of globalized information technology, managing the ever-increasing number of CVEs has become one of the biggest challenges for security teams. It is no longer enough to rely solely on CVSS scores: effective vulnerability management requires contextualisation, taking into account both technical and business impacts. This document explores maturity levels in vulnerability management, the role of new indicators, and the growing dependence on the NVD, whose disruption in 2024 highlighted critical weaknesses in current processes.
Development in Python of a tool packaged under Linux that automatically analyses an inventory of assets and identifies associated vulnerabilities. CVEs are prioritised according to several criteria (CVSS, context, EPSS, available exploits, asset criticality) in order to establish a relevant patching order. The tool generates a daily summary sent by email to security teams and produces a spreadsheet consolidating all the results.
Study of the behaviour of zero-day vulnerabilities through the analysis of several databases (NVD, MITRE, ExploitDB, ZeroDay Initiative, etc.). Extraction of patterns and trends in order to anticipate future critical vulnerabilities.
I am open to collaborations, conferences, or questions. Feel free to contact me!