Complete analysis of configuration rules to guarantee reliable network security policies JG Alfaro, N Boulahia-Cuppens, F Cuppens International Journal of Information Security 7 (2), 103-122, 2008 | 164 | 2008 |
Detection and removal of firewall misconfiguration F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro Proceedings of the 2005 IASTED International Conference on Communication …, 2005 | 77 | 2005 |
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti International Conference on Financial Cryptography and Data Security, 34-46, 2010 | 57 | 2010 |
J3Gen: A PRNG for low-cost passive RFID J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí Sensors 13 (3), 3816-3830, 2013 | 54 | 2013 |
Analysis of policy anomalies on distributed network security setups JG Alfaro, F Cuppens, N Cuppens-Boulahia European Symposium on Research in Computer Security, 496-511, 2006 | 54 | 2006 |
Secure localization of nodes in wireless sensor networks with limited number of truth tellers JG Alfaro, M Barbeau, E Kranakis 2009 Seventh annual communication networks and services research conference …, 2009 | 43 | 2009 |
MIRAGE: a management tool for the analysis and deployment of network security policies J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Preda Data Privacy Management and Autonomous Spontaneous Security, 203-215, 2010 | 40 | 2010 |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network F Cuppens, F Autrel, Y Bouzida, J GARCIA, S Gombault, T Sans Ann. Télécommun 61 (1-2), 2006 | 40 | 2006 |
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs G Cervera, M Barbeau, J Garcia-Alfaro, E Kranakis Journal of Network and Computer Applications 36 (2), 744-755, 2013 | 39 | 2013 |
Handling stateful firewall anomalies F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson IFIP International Information Security Conference, 174-186, 2012 | 38 | 2012 |
A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí Wireless personal communications 59 (1), 27-42, 2011 | 37 | 2011 |
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro Information and Communications Security, 297-304, 2004 | 36 | 2004 |
Misconfiguration management of network security components F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro arXiv preprint arXiv:1912.07283, 2019 | 34 | 2019 |
Management of stateful firewall misconfiguration J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Martinez, J Cabot Computers & Security 39, 64-85, 2013 | 34 | 2013 |
Real-time malicious fast-flux detection using DNS and bot related features S Martinez-Bea, S Castillo-Perez, J Garcia-Alfaro 2013 Eleventh Annual Conference on Privacy, Security and Trust, 369-372, 2013 | 34 | 2013 |
Model-driven security policy deployment: property oriented approach S Preda, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro, L Toutain International Symposium on Engineering Secure Software and Systems, 123-139, 2010 | 32 | 2010 |
Analysis of Threats to the Security of EPC Networks J Garcia-Alfaro, M Barbeau, E Kranakis Communication Networks and Services Research Conference, 2008. CNSR 2008 …, 2008 | 32 | 2008 |
Dynamic deployment of context-aware access control policies for constrained security devices S Preda, F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, L Toutain Journal of Systems and Software 84 (7), 1144-1159, 2011 | 31 | 2011 |
Evaluation of two privacy-preserving protocols for the DNS S Castillo-Perez, J Garcia-Alfaro 2009 Sixth International Conference on Information Technology: New …, 2009 | 30 | 2009 |
Towards filtering and alerting rule rewriting on single-component policies J García-Alfaro, F Cuppens, N Cuppens-Boulahia International Conference on Computer Safety, Reliability, and Security, 182-194, 2006 | 30 | 2006 |