Reversible watermarking based on invariant image classification and dynamic histogram shifting G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux IEEE Transactions on information forensics and security 8 (1), 111-120, 2012 | 244 | 2012 |
Modeling contextual security policies F Cuppens, N Cuppens-Boulahia International Journal of Information Security 7 (4), 285-305, 2008 | 190 | 2008 |
Complete analysis of configuration rules to guarantee reliable network security policies JG Alfaro, N Boulahia-Cuppens, F Cuppens International Journal of Information Security 7 (2), 103-122, 2008 | 182 | 2008 |
A formal approach to specify and deploy a network security policy F Cuppens, N Cuppens-Boulahia, T Sans, A Miège Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005 | 171 | 2005 |
A service dependency model for cost-sensitive intrusion response N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 155 | 2010 |
High level conflict management strategies in advanced access control models F Cuppens, N Cuppens-Boulahia, MB Ghorbel Electronic Notes in Theoretical Computer Science 186, 3-26, 2007 | 145 | 2007 |
Efficient intrusion detection using principal component analysis Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault 3éme Conférence sur la Sécurité et Architectures Réseaux (SAR), La Londe …, 2004 | 124 | 2004 |
Nomad: A security model with non atomic actions and deadlines F Cuppens, N Cuppens-Boulahia, T Sans 18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005 | 114 | 2005 |
Inheritance hierarchies in the Or-BAC Model and application in a network environment F Cuppens, N Cuppens-Boulahia, A Miège Proc. Foundations of Computer Security (FCS04), 41-60, 2004 | 86 | 2004 |
Detection and removal of firewall misconfiguration F Cuppens, NB Cuppens, J Garcia‐alfaro 2005 IASTED International Conference on Communication, Network and …, 2005 | 84 | 2005 |
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. W Pan, G Coatrieux, N Cuppens-Boulahia, F Cuppens, C Roux DPM/SETOP, 153-162, 2009 | 77 | 2009 |
MotOrBAC 2: a security policy tool F Autrel, F Cuppens, N Cuppens-Boulahia, C Coma 3rd Conference on Security in Network Architectures and Information Systems …, 2008 | 77 | 2008 |
An extended RBAC profile of XACML D Abi Haidar, N Cuppens-Boulahia, F Cuppens, H Debar Proceedings of the 3rd ACM workshop on Secure web services, 13-22, 2006 | 69 | 2006 |
O2O: Virtual private organizations to manage security policy interoperability F Cuppens, N Cuppens-Boulahia, C Coma Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 68 | 2006 |
Robust lossless watermarking of relational databases based on circular histogram modulation J Franco-Contreras, G Coatrieux, F Cuppens, N Cuppens-Boulahia, ... IEEE transactions on information forensics and security 9 (3), 397-410, 2013 | 64 | 2013 |
An ontology-based approach to react to network attacks N Cuppens-Boulahia, F Cuppens, F Autrel, H Debar International Journal of Information and Computer Security 3 (3-4), 280-305, 2009 | 64 | 2009 |
A formal approach for testing security rules W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 63 | 2007 |
Cost evaluation for intrusion response using dependency graphs N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka 2009 International Conference on Network and Service Security, 1-6, 2009 | 61 | 2009 |
Analysis of policy anomalies on distributed network security setups JG Alfaro, F Cuppens, N Cuppens-Boulahia Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 58 | 2006 |
Enabling automated threat response through the use of a dynamic security policy H Debar, Y Thomas, F Cuppens, N Cuppens-Boulahia Journal in Computer Virology 3, 195-210, 2007 | 56 | 2007 |