![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Azkia, H., Boulahia Cuppens, N., Cuppens, F., Coatrieux, G., & Oulmakhzoune, S. (2015). Deployment of a posteriori access control using IHE ATNA. International Journal of Information Security, 14(5), 471-483. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2014). Log content extraction engine based on ontology for the purpose of a posteriori access control. International Journal of Knowledge and Learning, 9(1/2), 23-42. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2010, August). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link
Coatrieux, G., Pan, W., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013). Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. IEEE Transactions on Information Forensics and Security, 8(1), 111-120. External link
Franco-Contreras, J., Coatrieux, G., Massari, P., Darmoni, S. J., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2015). Data Quality Evaluation in Medical Database Watermarking. In Studies in Health Technology and Informatics (pp. 276-280). External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, October). Adapted Quantization Index Modulation for Database Watermarking [Paper]. 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), Taipei, Taiwan. External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, August). Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records [Paper]. 36th annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, USA. External link
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2014). Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Transactions on Information Forensics and Security, 9(3), 397-410. External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013, September). Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation [Paper]. 9th International Workshop on Security and Trust Management (STM 2013), Egham, UK. External link
Franco-Contreras, J., Coatrieux, G., Chazard, E., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2012, August). Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA, USA. External link
Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (2011, September). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Paper]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2011, August). Reversible watermarking based on invariant image classification and dynamical error histogram shifting [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, MA, USA. External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2010, December). Watermarking to Enforce Medical Image Access and Usage Control Policy [Paper]. 6th International Conference on Signal-Image Technology and Internet Based Systems, Kuala Lumpur, Malaysia. External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2009, September). Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking [Paper]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International Workshop on Autonomous and Spontaneous Security, St. Malo, France. External link