<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Autrel, Fabien"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Nombre de documents: 16

Bouyahia, T., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (octobre 2016). Multi-Criteria Recommender Approach for Supporting Intrusion Response System [Communication écrite]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. Lien externe

Bouyahia, T., Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Context Aware Intrusion Response Based on Argumentation Logic [Communication écrite]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. Lien externe

Bouyahia, T., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (septembre 2014). Metric for Security Activities Assisted by Argumentative Logic [Communication écrite]. 9th International Workshop on Data Privacy Management (DPM 2014), 7th International Workshop on Autonomous and Spontaneous Security (SETOP 2014), 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland. Lien externe

Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (octobre 2012). Enabling Dynamic Security Policy in the Java Security Manager [Communication écrite]. 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montréal, Qc, Canada. Lien externe

Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (septembre 2011). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Communication écrite]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. Lien externe

Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. Lien externe

Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (juillet 2009). Reaction Policy Model Based on Dynamic Organizations and Threat Context [Communication écrite]. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montréal, Qc, Canada. Lien externe

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (octobre 2007). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Communication écrite]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. Lien externe

Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. Lien externe

Autrel, F., & Cuppens, F. (2006). CRIM: un module de corrélation d'alertes et de réaction aux attaques. Annales des télécommunications, 61(9-10), 1172-1192. Lien externe

García, J., Cuppens, F., Autrel, F., Castellà-Roca, J., Borrell, J., Navarro, G., & Ortega-Ruiz, J. A. (avril 2005). Protecting On-Line Casinos against Fraudulent Player Drop-Out [Communication écrite]. International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, NV, USA. Lien externe

García, J., Autrel, F., Borrell, J., Castillo, S., Cuppens, F., & Navarro, G. (octobre 2004). Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation [Communication écrite]. 6th International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain. Lien externe

Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. Lien externe

Autrel, F., Benferhat, S., & Cuppens, F. (2004). Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Annales des télécommunications, 59(9-10), 1072-1091. Lien externe

Benferhat, S., Autrel, F., & Cuppens, F. (septembre 2003). Enhanced Correlation in an Intrusion Detection Process [Communication écrite]. 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), St. Petersburg, Russia. Lien externe

Cuppens, F., Autrel, F., Miège, A., & Benferhat, S. (décembre 2002). Recognizing Malicious Intention in an Intrusion Detection Process [Communication écrite]. Soft Computing Systems - Design, Management and Applications (HISS 2002), Santiago, Chile. Lien externe

Liste produite: Fri Dec 20 04:06:22 2024 EST.