Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. External link
Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. External link
Autrel, F., & Cuppens, F. (2006). CRIM: un module de corrélation d'alertes et de réaction aux attaques. Annales des télécommunications, 61(9-10), 1172-1192. External link
Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. External link
Autrel, F., Benferhat, S., & Cuppens, F. (2004). Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Annales des télécommunications, 59(9-10), 1072-1091. External link
Bouyahia, T., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2016, October). Multi-Criteria Recommender Approach for Supporting Intrusion Response System [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Bouyahia, T., Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Context Aware Intrusion Response Based on Argumentation Logic [Paper]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. External link
Bouyahia, T., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2014, September). Metric for Security Activities Assisted by Argumentative Logic [Paper]. 9th International Workshop on Data Privacy Management (DPM 2014), 7th International Workshop on Autonomous and Spontaneous Security (SETOP 2014), 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland. External link
Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2012, October). Enabling Dynamic Security Policy in the Java Security Manager [Paper]. 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montréal, Qc, Canada. External link
Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (2011, September). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Paper]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. External link
Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2009, July). Reaction Policy Model Based on Dynamic Organizations and Threat Context [Paper]. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montréal, Qc, Canada. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2007, October). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Paper]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. External link
García, J., Cuppens, F., Autrel, F., Castellà-Roca, J., Borrell, J., Navarro, G., & Ortega-Ruiz, J. A. (2005, April). Protecting On-Line Casinos against Fraudulent Player Drop-Out [Paper]. International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, NV, USA. External link
García, J., Autrel, F., Borrell, J., Castillo, S., Cuppens, F., & Navarro, G. (2004, October). Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation [Paper]. 6th International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain. External link
Benferhat, S., Autrel, F., & Cuppens, F. (2003, September). Enhanced Correlation in an Intrusion Detection Process [Paper]. 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), St. Petersburg, Russia. External link
Cuppens, F., Autrel, F., Miège, A., & Benferhat, S. (2002, December). Recognizing Malicious Intention in an Intrusion Detection Process [Paper]. Soft Computing Systems - Design, Management and Applications (HISS 2002), Santiago, Chile. External link