Frédéric Cuppens
Frédéric Cuppens
Verified email at polymtl.ca - Homepage
Title
Cited by
Cited by
Year
Alert correlation in a cooperative intrusion detection framework
F Cuppens, A Miege
Proceedings 2002 IEEE symposium on security and privacy, 202-215, 2002
10742002
Organization based access control
AA El Kalam, S Benferhat, R El Baida, P Balbiani, F Cuppens, Y Deswarte, ...
null, 120, 2003
774*2003
Lambda: A language to model a database for detection of attacks
F Cuppens, R Ortalo
International Workshop on Recent Advances in Intrusion Detection, 197-216, 2000
4502000
Managing alerts in a multi-intrusion detection environment
F Cuppens
Seventeenth Annual Computer Security Applications Conference, 0022-0022, 2001
4142001
Modelling contexts in the Or-BAC model
F Cuppens, A Miège
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2222003
Fusion: General concepts and characteristics
I Bloch, A Hunter, A Appriou, A Ayoun, S Benferhat, P Besnard, L Cholvy, ...
International journal of intelligent systems 16 (10), 1107-1134, 2001
1902001
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
1872012
Analyzing consistency of security policies
L Cholvy, F Cuppens
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1861997
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
F Cuppens, R Demolombe
Expert Database Conf., 621-643, 1988
1831988
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
1732008
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
1532008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1502004
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
1482012
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
1392007
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
European Symposium on Research in Computer Security, 626-642, 2010
1282010
Administration model for or-bac
F Cuppens, A Miège
OTM Confederated International Conferences" On the Move to Meaningful …, 2003
111*2003
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1082005
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme Conférence sur la Sécurité et Architectures Réseaux (SAR), La Londe …, 2004
1022004
Neural networks vs. decision trees for intrusion detection
Y Bouzida, F Cuppens
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM) 28, 29, 2006
902006
Correlation in an intrusion detection process
F Cuppens, F Autrel, A Miege, S Benferhat
SECI'02: Sécurité des Communications sur Internet, ., 2002
902002
The system can't perform the operation now. Try again later.
Articles 1–20