


Остановите войну!
for scientists:


default search action
Nora Cuppens
Nora Cuppens-Boulahia – Nora Boulahia-Cuppens
Person information

- affiliation: Polytechnique Montréal, Department of IT and software engineering, QC, Canada
- affiliation: IMT Atlantique, Department of Systems, Networks, Cybersecurity and Digital Law, Cesson-Sévigné, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c193]Axel Charpentier
, Christopher Neal
, Nora Boulahia-Cuppens
, Frédéric Cuppens
, Reda Yaich
:
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning. ARES 2023: 15:1-15:11 - [c192]Mohamed Amine Merzouk
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Reda Yaich
:
Parameterizing poisoning attacks in federated learning-based intrusion detection. ARES 2023: 104:1-104:8 - [c191]Axel Rousselot, Nora Cuppens, Samra Bouakkaz:
AIS Authentication Using Certificateless Cryptography. SECRYPT 2023: 49-61 - [e24]Slim Kallel
, Mohamed Jmaiel
, Mohammad Zulkernine, Ahmed Hadj Kacem
, Frédéric Cuppens
, Nora Cuppens
:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - 2022
- [j41]Mohamed Amine Merzouk
, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann. des Télécommunications 77(11-12): 763-775 (2022) - [j40]Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. ACM Comput. Surv. 54(6): 117:1-117:36 (2022) - [c190]Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. ARES 2022: 31:1-31:6 - [c189]Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Deep Reinforcement Learning-Based Defense Strategy Selection. ARES 2022: 110:1-110:11 - [c188]Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens:
Attacker Attribution via Characteristics Inference Using Honeypot Data. NSS 2022: 155-169 - [e23]Bo Luo, Mohamed Mosbah
, Frédéric Cuppens
, Lotfi Ben Othmane
, Nora Cuppens
, Slim Kallel
:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [e22]Sokratis K. Katsikas
, Costas Lambrinoudakis
, Nora Cuppens
, John Mylopoulos
, Christos Kalloniatis
, Weizhi Meng
, Steven Furnell
, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Jorge Maestre Vidal
, Marco Antonio Sotelo Monge
:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [i6]Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro:
Ontology-based Attack Graph Enrichment. CoRR abs/2202.04016 (2022) - 2021
- [j39]Michel Barbeau
, Frédéric Cuppens
, Nora Cuppens
, Romain Dagnas
, Joaquín García-Alfaro
:
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access 9: 46462-46475 (2021) - [j38]Renzo E. Navas
, Frédéric Cuppens, Nora Boulahia-Cuppens, Laurent Toutain, Georgios Z. Papadopoulos
:
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Comput. Networks 187: 107751 (2021) - [j37]Renzo E. Navas
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Laurent Toutain, Georgios Z. Papadopoulos
:
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet Things J. 8(10): 7818-7832 (2021) - [j36]Slim Kallel, Frédéric Cuppens, Nora Boulahia-Cuppens, Ahmed Hadj Kacem, Lotfi Ben Othmane:
Special issue on risk and security of smart systems. J. Inf. Secur. Appl. 61: 102925 (2021) - [c187]Guillaume Ansel, Dominique Pastor, Frédéric Cuppens, Nora Boulahia-Cuppens:
Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection. ISIVC 2021: 1-6 - [e21]Joaquín García-Alfaro
, Jean Leneutre, Nora Cuppens, Reda Yaich:
Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12528, Springer 2021, ISBN 978-3-030-68886-8 [contents] - 2020
- [j35]Routa Moussaileb
, Renzo E. Navas
, Nora Cuppens:
Watch out! Doxware on the way... J. Inf. Secur. Appl. 55: 102668 (2020) - [c186]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. ASIACRYPT (2) 2020: 191-220 - [c185]Alexandre Kabil, Thierry Duval, Nora Cuppens:
Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study. AVR (1) 2020: 82-101 - [c184]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia:
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis. CPSS@AsiaCCS 2020: 30-41 - [c183]Mohamed Amine Merzouk
, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
A Deeper Analysis of Adversarial Examples in Intrusion Detection. CRiSIS 2020: 67-84 - [c182]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
A Posteriori Analysis of Policy Temporal Compliance. CRiSIS 2020: 133-148 - [c181]Manel Smine, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Network Functions Virtualization Access Control as a Service. DBSec 2020: 100-117 - [c180]Manel Smine, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens, Marc-Oliver Pahl:
A Priority-Based Domain Type Enforcement for Exception Management. FPS 2020: 65-81 - [c179]Renzo E. Navas
, Håkon Sandaker, Frédéric Cuppens, Nora Cuppens, Laurent Toutain, Georgios Z. Papadopoulos:
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things. ISCC 2020: 1-6 - [c178]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism. QUATIC 2020: 332-342 - [c177]Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas
, Joaquín García-Alfaro
:
Metrics to Enhance the Resilience of Cyber-Physical Systems. TrustCom 2020: 1167-1172 - [e20]Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem:
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. Lecture Notes in Computer Science 12026, Springer 2020, ISBN 978-3-030-41567-9 [contents] - [e19]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Weizhi Meng
, Steven Furnell
, Joaquín García-Alfaro
:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e18]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis
, Christos Kalloniatis
, John Mylopoulos
, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng
, Steven Furnell
:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [i5]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch. 2020: 422 (2020)
2010 – 2019
- 2019
- [c176]Thomas Clédel, Nora Cuppens, Frédéric Cuppens:
Managing the Overestimation of Resilience. ARES 2019: 35:1-35:10 - [c175]Khaoula Es-Salhi, David Espes
, Nora Cuppens:
DTE Access Control Model for Integrated ICS Systems. ARES 2019: 79:1-79:9 - [c174]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Semantic Mediation for A Posteriori Log Analysis. ARES 2019: 88:1-88:10 - [c173]Routa Moussaileb, Charles Berti, Guillaume Deboisdeffre, Nora Cuppens, Jean-Louis Lanet:
Watch Out! Doxware on the Way... CRiSIS 2019: 279-292 - [c172]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro
:
Reflective Attenuation of Cyber-Physical Attacks. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 19-34 - [c171]Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
Ransomware Network Traffic Analysis for Pre-encryption Alert. FPS 2019: 20-38 - [e17]Akka Zemmari
, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e16]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5 [contents] - [i4]Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Misconfiguration Management of Network Security Components. CoRR abs/1912.07283 (2019) - 2018
- [j34]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:
Achieving dynamicity in security policies enforcement using aspects. Int. J. Inf. Sec. 17(1): 83-103 (2018) - [j33]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa
, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c170]Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet:
Ransomware's Early Mitigation Mechanisms. ARES 2018: 2:1-2:10 - [c169]Renzo E. Navas
, Hélène Le Bouder, Nora Cuppens, Frédéric Cuppens, Georgios Z. Papadopoulos
:
Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack. ADHOC-NOW 2018: 120-125 - [c168]Frédéric Cuppens, Nora Cuppens-Boulahia:
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. From Database to Cyber Security 2018: 78-103 - [c167]Alexandre Kabil
, Thierry Duval
, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel:
3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training. CDVE 2018: 176-183 - [c166]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. CRiSIS 2018: 35-40 - [c165]Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
A Certificate-Less Key Exchange Protocol for IoT. CRiSIS 2018: 65-79 - [c164]Khaoula Es-Salhi, David Espes
, Nora Cuppens:
RIICS: Risk Based IICS Segmentation Method. CRiSIS 2018: 143-157 - [c163]Manel Smine, Nora Cuppens, Frédéric Cuppens:
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. CRiSIS 2018: 158-171 - [c162]Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj:
Optimal Distribution of Privacy Budget in Differential Privacy. CRiSIS 2018: 222-236 - [c161]Thomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte:
Towards the Evaluation of End-to-End Resilience Through External Consistency. CSS 2018: 99-114 - [c160]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi:
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. DBSec 2018: 38-47 - [c159]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro
:
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). FPS 2018: 257-264 - [c158]Hélène Le Bouder, Gaël Thomas, Edwin Bourget, Mariem Graa, Nora Cuppens, Jean-Louis Lanet:
Theoretical Security Evaluation of the Human Semantic Authentication Protocol. ICETE (2) 2018: 498-505 - [c157]Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:
Linking Differential Identifiability with Differential Privacy. ICICS 2018: 232-247 - [c156]Xiaoshu Ji, Gurvan Le Guernic
, Nora Cuppens-Boulahia, Frédéric Cuppens:
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. ICICS 2018: 732-742 - [c155]Khaoula Es-Salhi, David Espes
, Nora Cuppens:
SONICS: A Segmentation Method for Integrated ICS and Corporate System. ICISS 2018: 231-250 - [c154]Alexandre Kabil
, Thierry Duval
, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel:
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. ICISS 2018: 272-287 - [c153]Marco Lobe Kome, Frédéric Cuppens, Nora Cuppens-Boulahia, Vincent Frey:
CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0. IoTSMS 2018: 139-146 - [c152]Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
Detection and Response to Data Exfiltration from Internet of Things Android Devices. SEC 2018: 339-354 - [e15]Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro
:
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10694, Springer 2018, ISBN 978-3-319-76686-7 [contents] - [e14]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2 [contents] - [e13]Giancarlo Fortino, Carlos Enrique Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon:
Interoperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 242, Springer 2018, ISBN 978-3-319-93796-0 [contents] - 2017
- [c151]Reda Yaich, Nora Cuppens, Frédéric Cuppens:
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. ARES 2017: 8:1-8:9 - [c150]Nora Cuppens, Salaheddine Zerkane
, Yanhuang Li, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. DBSec 2017: 293-310 - [c149]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks. ICCNS 2017: 96-103 - [c148]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ICISS 2017: 127-145 - [c147]Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. ICISS 2017: 243-262 - [c146]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ICISS 2017: 387-404 - [c145]Khaoula Es-Salhi, David Espes
, Nora Cuppens:
A New Segmentation Method for Integrated ICS (Short Paper). PST 2017: 87-94 - [c144]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). PST 2017: 253-258 - [c143]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. SEC 2017: 205-218 - [e12]Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:
Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3 [contents] - [e11]Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis K. Katsikas:
Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10166, Springer 2017, ISBN 978-3-319-61436-6 [contents] - [e10]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi
, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - 2016
- [j32]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Guy Pujolle:
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide Web 19(1): 41-68 (2016) - [c142]Lyes Bayou, Nora Cuppens-Boulahia, David Espes
, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. ARES 2016: 157-166 - [c141]Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Multi-Criteria Recommender Approach for Supporting Intrusion Response System. FPS 2016: 51-67 - [c140]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. FPS 2016: 223-238 - [c139]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia:
Building a Fair System Using Access Rights. ICISS 2016: 89-108 - [c138]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Tracking Explicit and Control Flows in Java and Native Android Apps Code. ICISSP 2016: 307-316 - [c137]Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens:
Toward an off-line analysis of obligation with deadline policies. PST 2016: 178-186 - [c136]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards a new generation of industrial firewalls: Operational-process aware filtering. PST 2016: 615-622 - [c135]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud. SEC 2016: 105-118 - [e9]Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis K. Katsikas, Costas Lambrinoudakis
:
Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9588, Springer 2016, ISBN 978-3-319-40384-7 [contents] - 2015
- [j31]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux, Said Oulmakhzoune:
Deployment of a posteriori access control using IHE ATNA. Int. J. Inf. Sec. 14(5): 471-483 (2015) - [j30]Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Mining a high level access control policy in a network with multiple firewalls. J. Inf. Secur. Appl. 20: 61-73 (2015) - [c134]Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi:
Trust Negotiation Based Approach to Enforce MANET Routing Security. ARES 2015: 360-366 - [c133]Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Context Aware Intrusion Response Based on Argumentation Logic. CRiSIS 2015: 91-106 - [c132]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. CRiSIS 2015: 225-241 - [c131]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c130]Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. CyberICS/WOS-CPS@ESORICS 2015: 63-78 - [c129]Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus:
On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks. ESORICS (2) 2015: 642-661 - [c128]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Security Mechanisms Planning to Enforce Security Policies. FPS 2015: 85-101 - [c127]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji:
Similarity Measure for Security Policies in Service Provider Selection. ICISS 2015: 227-242 - [c126]Javier Franco-Contreras, Gouenou Coatrieux, Philippe Massari, Stéfan Jacques Darmoni, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Data Quality Evaluation in Medical Database Watermarking. MIE 2015: 276-280 - [c125]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic deployment of access and usage control policies using aspects. CFIP/NOTERE 2015: 1-6 - [c124]Salvador Martínez Perez
, Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. SEC 2015: 218-233 - [c123]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic Security Policies Enforcement and Adaptation Using Aspects. TrustCom/BigDataSE/ISPA (1) 2015: 1374-1379 - 2014
- [j29]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi
, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Ann. des Télécommunications 69(1-2): 3-19 (2014) - [j28]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict detection in obligation with deadline policies. EURASIP J. Inf. Secur. 2014: 13 (2014) - [j27]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:
Log content extraction engine based on ontology for the purpose of a posteriori access control. Int. J. Knowl. Learn. 9(1/2): 23-42 (2014) - [j26]Nadira Lammari, Nora Cuppens-Boulahia, Régine Laleau:
Introduction. Ingénierie des Systèmes d Inf. 19(6): 7-8 (2014) - [j25]Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro
, Yannick Chevalier
, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. J. Netw. Comput. Appl. 39: 152-166 (2014) - [j24]Javier Franco-Contreras, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Trans. Inf. Forensics Secur. 9(3): 397-410 (2014) - [c122]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Specification and Deployment of Integrated Security Policies for Outsourced Data. DBSec 2014: 17-32 - [c121]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c120]