Frédéric Cuppens
Frédéric Cuppens
Adresse e-mail validée de polymtl.ca - Page d'accueil
Titre
Citée par
Citée par
Année
Alert correlation in a cooperative intrusion detection framework
F Cuppens, A Miege
Proceedings 2002 IEEE symposium on security and privacy, 202-215, 2002
10632002
Organization based access control
AA El Kalam, S Benferhat, R El Baida, P Balbiani, F Cuppens, Y Deswarte, ...
null, 120, 2003
767*2003
Lambda: A language to model a database for detection of attacks
F Cuppens, R Ortalo
International Workshop on Recent Advances in Intrusion Detection, 197-216, 2000
4482000
Managing alerts in a multi-intrusion detection environment
F Cuppens
Seventeenth Annual Computer Security Applications Conference, 0022-0022, 2001
4092001
Modelling contexts in the Or-BAC model
F Cuppens, A Miège
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2222003
Fusion: General concepts and characteristics
I Bloch, A Hunter, A Appriou, A Ayoun, S Benferhat, P Besnard, L Cholvy, ...
International journal of intelligent systems 16 (10), 1107-1134, 2001
1892001
Analyzing consistency of security policies
L Cholvy, F Cuppens
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1861997
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
F Cuppens, R Demolombe
Expert Database Conf., 621-643, 1988
1831988
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
1812012
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
1702008
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
1522008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1492004
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
1402012
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
1372007
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
European Symposium on Research in Computer Security, 626-642, 2010
1282010
Administration model for or-bac
F Cuppens, A Miège
OTM Confederated International Conferences" On the Move to Meaningful …, 2003
110*2003
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1082005
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme Conférence sur la Sécurité et Architectures Réseaux (SAR), La Londe …, 2004
1012004
Neural networks vs. decision trees for intrusion detection
Y Bouzida, F Cuppens
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM) 28, 29, 2006
892006
Correlation in an intrusion detection process
F Cuppens, F Autrel, A Miege, S Benferhat
Internet Security Communication Workshop, 153-172, 2002
892002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20