Frédéric Cuppens
Frédéric Cuppens
Verified email at - Homepage
Cited by
Cited by
Alert correlation in a cooperative intrusion detection framework
F Cuppens, A Miege
Proceedings 2002 IEEE symposium on security and privacy, 202-215, 2002
Organization based access control
AA El Kalam, S Benferhat, R El Baida, P Balbiani, F Cuppens, Y Deswarte, ...
null, 120, 2003
Lambda: A language to model a database for detection of attacks
F Cuppens, R Ortalo
International Workshop on Recent Advances in Intrusion Detection, 197-216, 2000
Managing alerts in a multi-intrusion detection environment
F Cuppens
Seventeenth Annual Computer Security Applications Conference, 22-31, 2001
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
Modelling contexts in the Or-BAC model
F Cuppens, A Miege
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
Fusion: General concepts and characteristics
I Bloch, A Hunter, A Appriou, A Ayoun, S Benferhat, P Besnard, L Cholvy, ...
International journal of intelligent systems 16 (10), 1107-1134, 2001
Analyzing consistency of security policies
L Cholvy, F Cuppens
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
F Cuppens, R Demolombe
Expert Database Conf., 621-643, 1988
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme conférence sur la sécurité et architectures réseaux (SAR), La Londe …, 2004
Neural networks vs. decision trees for intrusion detection
Y Bouzida, F Cuppens
IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM) 28, 29, 2006
Administration model for or-bac
F Cuppens, A Miège
OTM Confederated International Conferences" On the Move to Meaningful …, 2003
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
Correlation in an intrusion detection process
F Cuppens, F Autrel, A Miege, S Benferhat
SECI'02: Sécurité des Communications sur Internet, ., 2002
A logical view of secure dependencies
P Bieber, F Cuppens
Journal of Computer Security 1 (1), 99-129, 1992
The system can't perform the operation now. Try again later.
Articles 1–20