关注
Nora Cuppens
Nora Cuppens
Professeur titulaire/Full professor, Polytechnique Montréal
在 polymtl.ca 的电子邮件经过验证
标题
引用次数
引用次数
年份
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
2682012
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
1952008
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
1892008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1712004
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
1642010
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
1492007
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme conférence sur la sécurité et architectures réseaux (SAR), La Londe …, 2004
1302004
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1162005
Detection and removal of firewall misconfiguration
F Cuppens, NB Cuppens, J Garcia‐alfaro
2005 IASTED International Conference on Communication, Network and …, 2005
852005
Inheritance hierarchies in the Or-BAC Model and application in a network environment
F Cuppens, N Cuppens-Boulahia, A Miège
Proc. Foundations of Computer Security (FCS04), 41-60, 2004
842004
Medical image integrity control combining digital signature and lossless watermarking
W Pan, G Coatrieux, N Cuppens-Boulahia, F Cuppens, C Roux
International Workshop on Data Privacy Management, 153-162, 2009
822009
MotOrBAC 2: a security policy tool
F Autrel, F Cuppens, N Cuppens-Boulahia, C Coma
3rd Conference on Security in Network Architectures and Information Systems …, 2008
752008
An extended RBAC profile of XACML
D Abi Haidar, N Cuppens-Boulahia, F Cuppens, H Debar
Proceedings of the 3rd ACM workshop on Secure web services, 13-22, 2006
702006
O2O: Virtual private organizations to manage security policy interoperability
F Cuppens, N Cuppens-Boulahia, C Coma
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
702006
A survey on windows-based ransomware taxonomy and detection mechanisms
R Moussaileb, N Cuppens, JL Lanet, HL Bouder
ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021
692021
An ontology-based approach to react to network attacks
N Cuppens-Boulahia, F Cuppens, F Autrel, H Debar
International Journal of Information and Computer Security 3 (3-4), 280-305, 2009
692009
Robust lossless watermarking of relational databases based on circular histogram modulation
J Franco-Contreras, G Coatrieux, F Cuppens, N Cuppens-Boulahia, ...
IEEE transactions on information forensics and security 9 (3), 397-410, 2013
672013
MTD, where art thou? A systematic review of moving target defense techniques for IoT
RE Navas, F Cuppens, NB Cuppens, L Toutain, GZ Papadopoulos
IEEE internet of things journal 8 (10), 7818-7832, 2020
662020
Cost evaluation for intrusion response using dependency graphs
N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka
2009 international conference on network and service security, 1-6, 2009
662009
Enabling automated threat response through the use of a dynamic security policy
H Debar, Y Thomas, F Cuppens, N Cuppens-Boulahia
Journal in Computer Virology 3, 195-210, 2007
612007
系统目前无法执行此操作,请稍后再试。
文章 1–20