Frédéric Cuppens
Frédéric Cuppens
IMT Atlantique (ex. Télécom Bretagne)
Verified email at telecom-bretagne.eu - Homepage
TitleCited byYear
Alert correlation in a cooperative intrusion detection framework
F Cuppens, A Miege
null, 202, 2002
10042002
Organization based access control
AA El Kalam, S Benferhat, R El Baida, P Balbiani, F Cuppens, Y Deswarte, ...
null, 120, 2003
711*2003
Lambda: A language to model a database for detection of attacks
F Cuppens, R Ortalo
International Workshop on Recent Advances in Intrusion Detection, 197-216, 2000
4262000
Managing alerts in a multi-intrusion detection environment
F Cuppens
acsac, 0022, 2001
3892001
Modelling contexts in the Or-BAC model
F Cuppens, A Miège
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2112003
Analyzing consistency of security policies
L Cholvy, F Cuppens
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1841997
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
F Cuppens, R Demolombe
Expert Database Conf., 621-643, 1988
1841988
Fusion: General concepts and characteristics
I Bloch, A Hunter, A Appriou, A Ayoun, S Benferhat, P Besnard, L Cholvy, ...
International journal of intelligent systems 16 (10), 1107-1134, 2001
1792001
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
1602008
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
1452012
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
1412008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1412004
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
1352007
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
European Symposium on Research in Computer Security, 626-642, 2010
1132010
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1042005
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
1022012
Administration model for or-bac
F Cuppens, A Miège
OTM Confederated International Conferences" On the Move to Meaningful …, 2003
102*2003
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme Conférence sur la Sécurité et Architectures Réseaux (SAR), La Londe …, 2004
902004
Correlation in an intrusion detection process
F Cuppens, F Autrel, A Miege, S Benferhat
Internet Security Communication Workshop, 153-172, 2002
882002
Neural networks vs. decision trees for intrusion detection
Y Bouzida, F Cuppens
IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM) 28, 29, 2006
862006
The system can't perform the operation now. Try again later.
Articles 1–20