![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Tasidou, A. (2021). Information theoretic-based privacy risk evaluation for data anonymization. Journal of Surveillance, Security and Safety, 2, 83-102. Available
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020). Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch., 2020, 28 pages. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020, December). Privacy-Preserving Pattern Matching on Encrypted Data [Paper]. 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Linking Differential Identifiability with Differential Privacy [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link
Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (2018, October). Optimal Distribution of Privacy Budget in Differential Privacy [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, December). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, August). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Paper]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2015, October). Security Mechanisms Planning to Enforce Security Policies [Paper]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, July). Specification and Deployment of Integrated Security Policies for Outsourced Data [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (2013, March). Confidentiality-preserving query execution of fragmented outsourced data [Paper]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. External link
Nanamou, N. K., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (2024, December). From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data [Paper]. 20th International Conference on Information Systems Security (ICISS 2024), Jaipur, India. Published in Lecture notes in computer science. External link
Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, June). Optimized and controlled provisioning of encrypted outsourced data [Paper]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. External link