


Остановите войну!
for scientists:
Frédéric Cuppens
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [e21]Bo Luo, Mohamed Mosbah
, Frédéric Cuppens
, Lotfi Ben Othmane
, Nora Cuppens
, Slim Kallel
:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [i7]Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro:
Ontology-based Attack Graph Enrichment. CoRR abs/2202.04016 (2022) - 2021
- [j51]Michel Barbeau
, Frédéric Cuppens
, Nora Cuppens
, Romain Dagnas, Joaquín García-Alfaro
:
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access 9: 46462-46475 (2021) - [j50]Renzo E. Navas
, Frédéric Cuppens, Nora Boulahia-Cuppens, Laurent Toutain, Georgios Z. Papadopoulos
:
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Comput. Networks 187: 107751 (2021) - [j49]Renzo E. Navas
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Laurent Toutain, Georgios Z. Papadopoulos
:
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet Things J. 8(10): 7818-7832 (2021) - [j48]Slim Kallel, Frédéric Cuppens, Noura Boulahia Cuppens, Ahmed Hadj Kacem, Lotfi Ben Othmane:
Special issue on risk and security of smart systems. J. Inf. Secur. Appl. 61: 102925 (2021) - [c223]Guillaume Ansel, Dominique Pastor, Frédéric Cuppens, Nora Boulahia-Cuppens:
Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection. ISIVC 2021: 1-6 - 2020
- [c222]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. ASIACRYPT (2) 2020: 191-220 - [c221]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia:
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis. CPSS@AsiaCCS 2020: 30-41 - [c220]Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
A Deeper Analysis of Adversarial Examples in Intrusion Detection. CRiSIS 2020: 67-84 - [c219]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
A Posteriori Analysis of Policy Temporal Compliance. CRiSIS 2020: 133-148 - [c218]Luis Carlos Suárez
, David Espes
, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc:
Managing Secure Inter-slice Communication in 5G Network Slice Chains. DBSec 2020: 24-41 - [c217]Manel Smine, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Network Functions Virtualization Access Control as a Service. DBSec 2020: 100-117 - [c216]Manel Smine, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens, Marc-Oliver Pahl:
A Priority-Based Domain Type Enforcement for Exception Management. FPS 2020: 65-81 - [c215]Renzo E. Navas
, Håkon Sandaker, Frédéric Cuppens, Nora Cuppens, Laurent Toutain, Georgios Z. Papadopoulos:
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things. ISCC 2020: 1-6 - [c214]Luis Carlos Suárez
, David Espes
, Frédéric Cuppens, Philippe Bertin, Cao-Thanh Phan, Philippe Le Parc:
Formalization of a security access control model for the 5G system. NOF 2020: 150-158 - [c213]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism. QUATIC 2020: 332-342 - [c212]Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro
:
Metrics to Enhance the Resilience of Cyber-Physical Systems. TrustCom 2020: 1167-1172 - [e20]Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem:
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. Lecture Notes in Computer Science 12026, Springer 2020, ISBN 978-3-030-41567-9 [contents] - [e19]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Weizhi Meng
, Steven Furnell
, Joaquín García-Alfaro
:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e18]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis
, Christos Kalloniatis
, John Mylopoulos
, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng
, Steven Furnell
:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [i6]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch. 2020: 422 (2020)
2010 – 2019
- 2019
- [c211]Thomas Clédel, Nora Cuppens, Frédéric Cuppens:
Managing the Overestimation of Resilience. ARES 2019: 35:1-35:10 - [c210]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Semantic Mediation for A Posteriori Log Analysis. ARES 2019: 88:1-88:10 - [c209]Luis Carlos Suárez
, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Defining a communication service management function for 5G network slices. EuCNC 2019: 144-148 - [e17]Akka Zemmari
, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e16]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5 [contents] - [i5]Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Misconfiguration Management of Network Security Components. CoRR abs/1912.07283 (2019) - 2018
- [j47]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:
Achieving dynamicity in security policies enforcement using aspects. Int. J. Inf. Sec. 17(1): 83-103 (2018) - [j46]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa
, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c208]Renzo E. Navas
, Hélène Le Bouder, Nora Cuppens, Frédéric Cuppens, Georgios Z. Papadopoulos
:
Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack. ADHOC-NOW 2018: 120-125 - [c207]Frédéric Cuppens, Nora Cuppens-Boulahia:
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. From Database to Cyber Security 2018: 78-103 - [c206]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. CRiSIS 2018: 35-40 - [c205]Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
A Certificate-Less Key Exchange Protocol for IoT. CRiSIS 2018: 65-79 - [c204]Manel Smine, Nora Cuppens, Frédéric Cuppens:
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. CRiSIS 2018: 158-171 - [c203]Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj:
Optimal Distribution of Privacy Budget in Differential Privacy. CRiSIS 2018: 222-236 - [c202]Thomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte:
Towards the Evaluation of End-to-End Resilience Through External Consistency. CSS 2018: 99-114 - [c201]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi:
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. DBSec 2018: 38-47 - [c200]Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:
Linking Differential Identifiability with Differential Privacy. ICICS 2018: 232-247 - [c199]Xiaoshu Ji, Gurvan Le Guernic
, Nora Cuppens-Boulahia, Frédéric Cuppens:
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. ICICS 2018: 732-742 - [c198]Marco Lobe Kome, Frédéric Cuppens, Nora Cuppens-Boulahia, Vincent Frey:
CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0. IoTSMS 2018: 139-146 - [c197]Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
Detection and Response to Data Exfiltration from Internet of Things Android Devices. SEC 2018: 339-354 - [e15]Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro
:
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10694, Springer 2018, ISBN 978-3-319-76686-7 [contents] - [e14]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2 [contents] - [e13]Giancarlo Fortino, Carlos Enrique Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon:
Interoperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 242, Springer 2018, ISBN 978-3-319-93796-0 [contents] - 2017
- [c196]Reda Yaich, Nora Cuppens, Frédéric Cuppens:
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. ARES 2017: 8:1-8:9 - [c195]Nora Cuppens, Salaheddine Zerkane
, Yanhuang Li, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. DBSec 2017: 293-310 - [c194]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks. ICCNS 2017: 96-103 - [c193]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ICISS 2017: 127-145 - [c192]Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. ICISS 2017: 243-262 - [c191]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ICISS 2017: 387-404 - [c190]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). PST 2017: 253-258 - [c189]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. SEC 2017: 205-218 - [e12]Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:
Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3 [contents] - [e11]Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis K. Katsikas:
Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10166, Springer 2017, ISBN 978-3-319-61436-6 [contents] - [e10]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - 2016
- [j45]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Guy Pujolle:
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide Web 19(1): 41-68 (2016) - [c188]Lyes Bayou, Nora Cuppens-Boulahia, David Espes
, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. ARES 2016: 157-166 - [c187]Salaheddine Zerkane
, David Espes
, Philippe Le Parc, Frédéric Cuppens:
A Proactive Stateful Firewall for Software Defined Networking. CRiSIS 2016: 123-138 - [c186]Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Multi-Criteria Recommender Approach for Supporting Intrusion Response System. FPS 2016: 51-67 - [c185]Salaheddine Zerkane
, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Vulnerability Analysis of Software Defined Networking. FPS 2016: 97-116 - [c184]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. FPS 2016: 223-238 - [c183]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia:
Building a Fair System Using Access Rights. ICISS 2016: 89-108 - [c182]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Tracking Explicit and Control Flows in Java and Native Android Apps Code. ICISSP 2016: 307-316 - [c181]Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens:
Toward an off-line analysis of obligation with deadline policies. PST 2016: 178-186 - [c180]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards a new generation of industrial firewalls: Operational-process aware filtering. PST 2016: 615-622 - [c179]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud. SEC 2016: 105-118 - [c178]Salaheddine Zerkane
, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Software Defined Networking Reactive Stateful Firewall. SEC 2016: 119-132 - [e9]Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis K. Katsikas, Costas Lambrinoudakis
:
Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9588, Springer 2016, ISBN 978-3-319-40384-7 [contents] - 2015
- [j44]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux, Said Oulmakhzoune:
Deployment of a posteriori access control using IHE ATNA. Int. J. Inf. Sec. 14(5): 471-483 (2015) - [j43]Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Mining a high level access control policy in a network with multiple firewalls. J. Inf. Secur. Appl. 20: 61-73 (2015) - [c177]Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Context Aware Intrusion Response Based on Argumentation Logic. CRiSIS 2015: 91-106 - [c176]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. CRiSIS 2015: 225-241 - [c175]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c174]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. CyberICS/WOS-CPS@ESORICS 2015: 63-78 - [c173]Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus:
On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks. ESORICS (2) 2015: 642-661 - [c172]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Security Mechanisms Planning to Enforce Security Policies. FPS 2015: 85-101 - [c171]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji:
Similarity Measure for Security Policies in Service Provider Selection. ICISS 2015: 227-242 - [c170]Javier Franco-Contreras, Gouenou Coatrieux, Philippe Massari, Stéfan Jacques Darmoni, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Data Quality Evaluation in Medical Database Watermarking. MIE 2015: 276-280 - [c169]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic deployment of access and usage control policies using aspects. CFIP/NOTERE 2015: 1-6 - [c168]Salvador Martínez Perez
, Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. SEC 2015: 218-233 - [c167]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic Security Policies Enforcement and Adaptation Using Aspects. TrustCom/BigDataSE/ISPA (1) 2015: 1374-1379 - [e8]Frédéric Cuppens, Joaquín García-Alfaro
, A. Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8 [contents] - 2014
- [j42]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi
, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Ann. des Télécommunications 69(1-2): 3-19 (2014) - [j41]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict detection in obligation with deadline policies. EURASIP J. Inf. Secur. 2014: 13 (2014) - [j40]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:
Log content extraction engine based on ontology for the purpose of a posteriori access control. Int. J. Knowl. Learn. 9(1/2): 23-42 (2014) - [j39]Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro
, Yannick Chevalier
, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. J. Netw. Comput. Appl. 39: 152-166 (2014) - [j38]Javier Franco-Contreras, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Trans. Inf. Forensics Secur. 9(3): 397-410 (2014) - [c166]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Specification and Deployment of Integrated Security Policies for Outsourced Data. DBSec 2014: 17-32 - [c165]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c164]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [c163]Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records. EMBC 2014: 4491-4494 - [c162]Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Metric for Security Activities Assisted by Argumentative Logic. DPM/SETOP/QASA 2014: 183-197 - [c161]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. FPS 2014: 337-346 - [c160]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Détection de flux de contrôle illégaux dans les Smartphones. INFORSID 2014: 27-43 - [c159]Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Adapted Quantization Index Modulation for Database Watermarking. IWDW 2014: 120-134 - [c158]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Specifying and enforcing constraints in dynamic access control policies. PST 2014: 290-297 - [c157]Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152 - [c156]Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus:
Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks. SecureComm (1) 2014: 524-529 - [c155]Wiem Tounsi, Benjamin Justus, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro
:
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. SERE (Companion) 2014: 113-120 - [c154]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. SERE (Companion) 2014: 149-157 - [c153]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Reaching Agreement in Security Policy Negotiation. TrustCom 2014: 98-105 - [c152]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Car2X Communication - Putting Security Negotiation into Practice. VTC Fall 2014: 1-5 - [e7]Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia
, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8 [contents] - [i4]Frédéric Cuppens, Alban Gabillon:
Cover Story Management. CoRR abs/1405.5628 (2014) - 2013
- [j37]Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis
, Joaquín García-Alfaro
, Dimitra I. Kaklamani, Iakovos S. Venieris, Frédéric Cuppens, Nora Cuppens-Boulahia:
A privacy-aware access control model for distributed network monitoring. Comput. Electr. Eng. 39(7): 2263-2281 (2013) - [j36]Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez
, Jordi Cabot
:
Management of stateful firewall misconfiguration. Comput. Secur. 39: 64-85 (2013) - [j35]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro
:
Semantic analysis of role mining results and shadowed roles detection. Inf. Secur. Tech. Rep. 17(4): 131-147 (2013) - [j34]Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani
, Radu State, Joaquín García-Alfaro
, Nadia Tawbi:
Editorial. J. Inf. Secur. Appl. 18(1): 1 (2013) - [j33]Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini:
Smatch: Formal dynamic session management model for RBAC. J. Inf. Secur. Appl. 18(1): 30-44 (2013) - [j32]Frédéric Cuppens, Nora Cuppens-Boulahia, Yehia Elrakaiby
:
Formal specification and management of security policies with collective group obligations. J. Comput. Secur. 21(1): 149-190 (2013) - [j31]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez, David Gross-Amblard:
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 39-62 (2013) - [j30]