Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. External link
Autrel, F., Benferhat, S., & Cuppens, F. (2004). Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Annales des télécommunications, 59(9-10), 1072-1091. External link
Benferhat, S., Autrel, F., & Cuppens, F. (2003, September). Enhanced Correlation in an Intrusion Detection Process [Paper]. 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), St. Petersburg, Russia. External link
Kalam, A. A. E., Benferhat, S., Miège, A., Baida, R. E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., & Trouessin, G. (2003, June). Organization based access control [Paper]. IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy (12 pages). External link
Benferhat, S., Baida, R. E., & Cuppens, F. (2003, May). A Possibilistic Logic Encoding of Access Control [Paper]. 16th International Florida Artificial Intelligence Research Society Conference, St. Augustine, Florida. External link
Benferhat, S., Baida, R. E., & Cuppens, F. (2003, June). A stratification-based approach for handling conflicts in access control [Paper]. 8th ACM symposium on Access control models and technologies (SACMACT 2003), Como, Italy. External link
Cuppens, F., Autrel, F., Miège, A., & Benferhat, S. (2002, December). Recognizing Malicious Intention in an Intrusion Detection Process [Paper]. Soft Computing Systems - Design, Management and Applications (HISS 2002), Santiago, Chile. External link
Bloch, I., Hunter, A., Appriou, A., Ayoun, A., Benferhat, S., Besnard, P., Cholvy, L., Cooke, R. M., Cuppens, F., Dubois, D., Fargier, H., Grabisch, M., Kruse, R., Lang, J., Moral, S., Prade, H., Saffiotti, A., Smets, P., & Sossai, C. (2001). Fusion: General concepts and characteristics. International Journal of Intelligent Systems, 16(10), 1107-1134. External link