Up a level |
Wazan, A. S., & Cuppens, F. (2023). Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures. External link
Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2022). Investigating the practicality of adversarial evasion attacks on network intrusion detection. External link
Kallel, S., Cuppens, F., Boulahia Cuppens, N., Kacem, A. H., & Ben Othmane, L. (2021). Special issue on risk and security of smart systems. Journal of information security and applications, 61, 102925-102925. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Tasidou, A. (2021). Information theoretic-based privacy risk evaluation for data anonymization. Journal of Surveillance, Security and Safety, 2, 83-102. Available
Barbeau, M., Cuppens, F., Boulahia Cuppens, N., Dagnas, R., & Garcia-Alfaro, J. (2021). Resilience estimation of cyber-physical systems via quantitative metrics. IEEE Access, 9, 46462-46475. Available
Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet of Things Journal, 8(10), 7818-7832. External link
Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Computer Networks, 187, 14 pages. External link
Clédel, T., Boulahia Cuppens, N., Cuppens, F., & Dagnas, R. (2020). Resilience properties and metrics: how far have we gone? Journal of Surveillance, Security and Safety, 1(2), 119-139. Available
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020). Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch., 2020, 28 pages. External link
Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. External link
Moataz, T., Ray, I., Ray, I., Shikfa, A., Cuppens, F., & Boulahia Cuppens, N. (2018). Substring search over encrypted data. Journal of Computer Security, 26(1), 1-30. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & Pujolle, G. (2016). Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide Web, 19(1), 41-68. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., Coatrieux, G., & Oulmakhzoune, S. (2015). Deployment of a posteriori access control using IHE ATNA. International Journal of Information Security, 14(5), 471-483. External link
Hachana, S., Boulahia Cuppens, N., & Cuppens, F. (2015). Mining a high level access control policy in a network with multiple firewalls. Journal of Information Security and Applications, 20, 61-73. External link
Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & El Kalam, A. A. (2014). Conflict detection in obligation with deadline policies. EURASIP Journal on Information Security, 2014(1), 13-13. External link
Tounsi, W., Boulahia Cuppens, N., García-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152-166. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2014). Log content extraction engine based on ontology for the purpose of a posteriori access control. International Journal of Knowledge and Learning, 9(1/2), 23-42. External link
Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Morucci, S., Barhamgi, M., & Benslimane, D. (2014). Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Annales des télécommunications, 69(1-2), 3-19. External link
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2014). Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Transactions on Information Forensics and Security, 9(3), 397-410. External link
Cuppens, F., Boulahia Cuppens, N., & Elrakaiby, Y. (2013). Formal specification and management of security policies with collective group obligations. Journal of Computer Security, 21(1), 149-190. External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Perez, S. M., & Cabot, J. (2013). Management of stateful firewall misconfiguration. Computers & Security, 39, 64-85. External link
Benslimane, D., Barhamgi, M., Cuppens, F., Morvan, F., Defude, B., Nageba, E., Paulus, F., Morucci, S., Mrissa, M., Boulahia Cuppens, N., Ghedira, C., Mokadem, R., Oulmakhzoune, S., & Fayn, J. (2013). PAIRSE: a privacy-preserving service-oriented data integration system. ACM SIGMOD Record, 42(3), 42-47. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. External link
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Cuppens, F., & Boulahia Cuppens, N. (2013). A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7), 2263-2281. External link
Coatrieux, G., Pan, W., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013). Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. IEEE Transactions on Information Forensics and Security, 8(1), 111-120. External link
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2013). Semantic analysis of role mining results and shadowed roles detection. Information Security Technical Report, 17(4), 131-147. External link
Cuppens, F., Boulahia Cuppens, N., Ben-Ghorbel-Talbi, M., Morucci, S., & Essaouini, N. (2013). Smatch: Formal dynamic session management model for RBAC. Journal of Information Security and Applications, 18(1), 30-44. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2012). Formal enforcement and management of obligation policies. Data & Knowledge Engineering, 71(1), 127-147. External link
Hachana, S., Boulahia Cuppens, N., & Cuppens, F. (2012). Role Mining to Assist Authorization Governance: How Far Have We Gone? International Journal of Secure Software Engineering, 3(4), 45-64. External link
Kanoun, W., Dubus, S., Papillon, S., Boulahia Cuppens, N., & Cuppens, F. (2012). Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks. Bell Labs Technical Journal, 17(3), 61-78. External link
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2011). An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. International Journal of Mobile Computing and Multimedia Communications, 3(2), 33-51. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2010). A delegation model for extended RBAC. International Journal of Information Security, 9(3), 209-236. External link
Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. External link
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. External link
García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2008). Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2), 103-122. External link
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Unavailable
Cuppens, F., & Boulahia Cuppens, N. (2008). Modeling contextual security policies. International Journal of Information Security, 7(4), 285-305. External link
Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. External link
Cuppens, F., Boulahia Cuppens, N., & Ghorbel, M. B. (2007). High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science, 186, 3-26. External link
Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. External link
Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. External link
Autrel, F., & Cuppens, F. (2006). CRIM: un module de corrélation d'alertes et de réaction aux attaques. Annales des télécommunications, 61(9-10), 1172-1192. External link
Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. External link
Cuppens, F., & Miège, A. (2004). AdOrBAC: an administration model for Or-BAC. Computer Systems Science and Engineering, 19(3). Unavailable
Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. External link
Autrel, F., Benferhat, S., & Cuppens, F. (2004). Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Annales des télécommunications, 59(9-10), 1072-1091. External link
Cuppens, F., & Gabillon, A. (2001). Cover story management. Data & Knowledge Engineering, 37(2), 177-201. External link
Bloch, I., Hunter, A., Appriou, A., Ayoun, A., Benferhat, S., Besnard, P., Cholvy, L., Cooke, R. M., Cuppens, F., Dubois, D., Fargier, H., Grabisch, M., Kruse, R., Lang, J., Moral, S., Prade, H., Saffiotti, A., Smets, P., & Sossai, C. (2001). Fusion: General concepts and characteristics. International Journal of Intelligent Systems, 16(10), 1107-1134. External link
Cuppens, F., Cholvy, L., Saurel, C., & Carrère, J. (2001). Merging regulations: Analysis of a practical example. International Journal of Intelligent Systems, 16(11), 1223-1243. External link
Cuppens, F., & Gabillon, A. (1999). Logical Foundations of Multilevel Databases. Data & Knowledge Engineering, 29(3), 259-291. External link
Bieber, P., & Cuppens, F. (1992). A Logical View of Secure Dependencies. Journal of Computer Security,, 1(1), 99-130. External link
Cuppens, F., & Demolombe, R. (1991). Extending answers to neighbour entities in a cooperative answering context. Decision Support Systems, 7(1), 1-11. External link
Cuppens, F., & Demolombe, R. (1989). How to recognize interesting topics to provide cooperative answering. Information Systems, 14(2), 163-173. External link
Cuppens, F., & Demolombe, R. (1988). Cooperative Answering: A Methodology to Provide Intelligent Access to databases. Unavailable
Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (2023, December). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link
Saint-Hilaire, K., Cuppens, F., Boulahia Cuppens, N., & Garcia-Alfaro, J. (2023, June). Automated enrichment of logical attack graphs via formal ontologies [Paper]. 38th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2023), Poznan, Poland. External link
Ragab, A., Mannan, M., & Youssef, A. (2023, September). ESORICS 2023 International Workshops [Paper]. European Symposium on Research in Computer Security (ESORICS 2023), The Hagues, The Netherlands. External link
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (2024, July). Optimal automated generation of playbooks [Paper]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. External link
Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (2023, December). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link
Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2023, August). Parameterizing poisoning attacks in federated learning-based intrusion detection [Paper]. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, Italy (8 pages). External link
Charpentier, A., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2023, August). Real-Time Defensive Strategy Selection via Deep Reinforcement Learning [Paper]. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, Italy (11 pages). External link
Stephenne, C., Ouattara, J.-Y., de Magalhaes, F., Jean, M., Nicolescu, G., Cuppens, F., & Fernandez, J. (2023, September). Security assessment of a commercial router using physical access: a case study [Paper]. 34th International Workshop on Rapid System Prototyping (RSP 2023), Hamburg, Germany (7 pages). External link
Miloudi, A., Suarez, L., Boulahia Cuppens, N., Cuppens, F., & Preda, S. (2023, June). Trust Management Framework for Containerized Workloads Applications to 5G Networks [Paper]. Applied Cryptography and Network Security Workshops (ACNS 2023), Kyoto, Japan. External link
Crochelet, P., Neal, C., Boulahia Cuppens, N., & Cuppens, F. (2022, December). Attacker Attribution via Characteristics Inference Using Honeypot Data [Paper]. 16th International Conference on Network and System Security (NSS 2022), Denarau Island, Fiji. External link
Charpentier, A., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2022, August). Deep reinforcement learning-based defense strategy selection [Paper]. 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria (11 pages). External link
Merzouk, M. A., Delas, J., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2022, August). Evading deep reinforcement learning-based network intrusion detection with adversarial attacks [Paper]. 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria (6 pages). External link
Dernaika, F., Boulahia Cuppens, N., & Cuppens, F. (2022, July). A Posteriori Access Control with an Administrative Policy [Paper]. World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2020, Las Vegas, USA. External link
Ansel, G., Pastor, D., Cuppens, F., & Boulahia Cuppens, N. (2021, April). Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection [Paper]. 10th International Symposium on Signal, Image, Video and Communications (ISIVC 2020). External link
Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2020, November). A Deeper Analysis of Adversarial Examples in Intrusion Detection [Paper]. 15th International Conference on Risks and Security of Internet and Systems (CRISIS 2020), Paris, France. External link
Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2020, November). A Posteriori Analysis of Policy Temporal Compliance [Paper]. 15th International Conference on Risks and Security of Internet and Systems (CRISIS 2020), Paris, France. External link
Luo, B., Mosbah, M., Cuppens, F., Ben Othmane, L., Boulahia Cuppens, N., & Kallel, S. (2021, November). Risks and Security of Internet and Systems [Paper]. 16th International Conference on Risks and Security of Internet and Systems (CRiSIS 2021). External link
Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2020, September). Accountability in the a posteriori access control: A requirement and a mechanism [Paper]. 13th International Conference on the Quality of Information and Communications Technology (QUATIC 2020), Faro, Portugal. External link
Suárez, L. A., Espes, D., Cuppens, F., Phan, C.-T., Bertin, P., & Parc, P. L. (2020, June). Managing Secure Inter-slice Communication in 5G Network Slice Chains [Paper]. 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2020), Regensburg, Germany. External link
Barbeau, M., Cuppens, F., Boulahia Cuppens, N., Dagnas, R., & Garcia-Alfaro, J. (2020, December). Metrics to enhance the resilience of cyber-physical systems [Paper]. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China. External link
Smine, M., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2020, June). Network functions virtualization access control as a service [Paper]. 34th Annual IFIP WG11.3 Conference on Data and Applications Security and Privacy (DBSec 2020), Regensburg, Germany. External link
Smine, M., Espes, D., Cuppens, F., Boulahia Cuppens, N., & Pahl, M.-O. (2020, December). A priority-based domain type enforcement for exception management [Paper]. 13th International Symposium on Foundations and Practice Security (FPS 2020), Montréal, Québec. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020, December). Privacy-Preserving Pattern Matching on Encrypted Data [Paper]. 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea. External link
Suárez, L. A., Espes, D., Parc, P. L., & Cuppens, F. (2019, June). Defining a communication service management function for 5G network slices [Paper]. European Conference on Networks and Communications (EuCNC 2019), Valencia, Spain. External link
Clédel, T., Boulahia Cuppens, N., & Cuppens, F. (2019, August). Managing the Overestimation of Resilience [Paper]. 14th International Conference on Availability, Reliability and Security, Canterbury CA United Kingdom. External link
Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2019, January). Misconfiguration management of network security components [Paper]. 7th International Symposium on System and Information Security (SSI 2019), Sao Paulo, Brazil (9 pages). External link
Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2019, August). Semantic Mediation for A Posteriori Log Analysis [Paper]. 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, CA, United Kingdom. External link
Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2018, October). A Certificate-Less Key Exchange Protocol for IoT [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Kome, M. L., Cuppens, F., Boulahia Cuppens, N., & Frey, V. (2018, October). CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0 [Paper]. 5th International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain. External link
Navas, R. E., Bouder, H. L., Boulahia Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (2018, September). Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack [Paper]. 17th International Conference on Ad-Hoc Networks and Wireless (AdHoc-Now 2018), Saint-Malo, France. External link
Graa, M., Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2018, September). Detection and Response to Data Exfiltration from Internet of Things Android Devices [Paper]. 33rd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2018), Poznan, Poland. External link
Smine, M., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Linking Differential Identifiability with Differential Privacy [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link
Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (2018, October). Optimal Distribution of Privacy Budget in Differential Privacy [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2018, October). A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Bourget, E., Cuppens, F., Boulahia Cuppens, N., Dubus, S., Foley, S. N., & Laarouchi, Y. (2018, July). Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes [Paper]. 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2018), Bergamo, Italy. External link
Clédel, T., Foley, S. N., Boulahia Cuppens, N., Cuppens, F., Kermarrec, Y., Dubois, F., Laarouchi, Y., & Comte, G. L. (2018, October). Towards the Evaluation of End-to-End Resilience Through External Consistency [Paper]. 10th International Symposium on Cyberspace Safety and Security (CSS 2018), Amalfi, Italy. External link
Ji, X., Guernic, G. L., Boulahia Cuppens, N., & Cuppens, F. (2018, October). USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., & Moussaileb, R. (2017, May). Detection of Side Channel Attacks Based on Data Tainting in Android Systems [Paper]. 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2017), Rome, Italy. External link
Kome, M. L., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2017, December). DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link
Yaich, R., Boulahia Cuppens, N., & Cuppens, F. (2017, August). Enabling Trust Assessment in Clouds-of-Clouds: A Similarity-Based Approach [Paper]. 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio, Calabria, Italy. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, December). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link
Boulahia Cuppens, N., Zerkane, S., Li, Y., Espes, D., Parc, P. L., & Cuppens, F. (2017, July). Firewall Policies Provisioning Through SDN in the Cloud [Paper]. 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, August). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Paper]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2017, December). wIDS: A Multilayer IDS for Wireless-Based SCADA Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2017, November). wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks [Paper]. 7th International Conference on Communication and Network Security (ICCNS 2017), Tokyo, Japan. External link
Essaouini, N., Cuppens, F., & Boulahia Cuppens, N. (2016, December). Building a Fair System Using Access Rights [Paper]. 12th International Conference on Information Systems Security (ICISS 2016), Jaipur, India. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2016, May). Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud [Paper]. 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2016), Ghent, Belgium. External link
Bouyahia, T., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2016, October). Multi-Criteria Recommender Approach for Supporting Intrusion Response System [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Zerkane, S., Espes, D., Parc, P. L., & Cuppens, F. (2016, September). A Proactive Stateful Firewall for Software Defined Networking [Paper]. 11th International Conference on Risks and Security of Internet and Systems (CRiSIS 2016), Roscoff, France. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2016, October). Security Analysis of WirelessHART Communication Scheme [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Zerkane, S., Espes, D., Parc, P. L., & Cuppens, F. (2016, May). Software Defined Networking Reactive Stateful Firewall [Paper]. 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2016), Ghent, Belgium. External link
Essaouini, N., Oulmakhzoune, S., Boulahia Cuppens, N., & Cuppens, F. (2016, December). Toward an off-line analysis of obligation with deadline policies [Paper]. 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand. External link
Bayou, L., Boulahia Cuppens, N., Espes, D., & Cuppens, F. (2016, August). Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks [Paper]. 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria. External link
Hachana, S., Cuppens, F., & Boulahia Cuppens, N. (2016, December). Towards a new generation of industrial firewalls: Operational-process aware filtering [Paper]. 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2016, February). Tracking Explicit and Control Flows in Java and Native Android Apps Code [Paper]. 2nd International Conference on Information Systems Security and Privacy (ICISS) 2016), Rome, Italy. External link
Zerkane, S., Espes, D., Parc, P. L., & Cuppens, F. (2016, October). Vulnerability Analysis of Software Defined Networking [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Bouyahia, T., Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Context Aware Intrusion Response Based on Argumentation Logic [Paper]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. External link
Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Dynamic deployment of access and usage control policies using aspects [Paper]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). External link
Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2015, August). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Paper]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2015, May). Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems [Paper]. 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany. External link
Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (2015, September). On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks [Paper]. 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria. External link
Lazrig, I., Moataz, T., Ray, I., Ray, I., Ong, T., Kahn, M. G., Cuppens, F., & Boulahia Cuppens, N. (2015, July). Privacy Preserving Record Matching Using Automated Semi-trusted Broker [Paper]. 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, VA, USA. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Security Issue of WirelessHART Based SCADA Systems [Paper]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2015, October). Security Mechanisms Planning to Enforce Security Policies [Paper]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., Frey, V., & Ji, X. (2015, December). Similarity Measure for Security Policies in Service Provider Selection [Paper]. 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India. External link
Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2015, September). WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator [Paper]. 1st International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICS 2015) and 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Vienna, Austria. External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, October). Adapted Quantization Index Modulation for Database Watermarking [Paper]. 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), Taipei, Taiwan. External link
Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2014, September). Car2X Communication - Putting Security Negotiation into Practice [Paper]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). External link
Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (2014, September). Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks [Paper]. 10th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2014), Beijing, China. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, May). Détection de flux de contrôle illégaux dans les Smartphones [Paper]. INFORSID 2014, Lyon, France. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, November). Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps [Paper]. 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montréal, Qc, Canada. External link
Moataz, T., Boulahia Cuppens, N., Cuppens, F., Ray, I., & Ray, I. (2014, July). ELITE: zEro Links Identity managemenT systEm [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link
Bouyahia, T., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2014, September). Metric for Security Activities Assisted by Argumentative Logic [Paper]. 9th International Workshop on Data Privacy Management (DPM 2014), 7th International Workshop on Autonomous and Spontaneous Security (SETOP 2014), 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland. External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, August). Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records [Paper]. 36th annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, USA. External link
Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, June). Optimized and controlled provisioning of encrypted outsourced data [Paper]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. External link
Moataz, T., Justus, B., Ray, I., Boulahia Cuppens, N., Cuppens, F., & Ray, I. (2014, July). Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds [Paper]. 28th annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link
Tounsi, W., Justus, B., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2014, June). Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm [Paper]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, June). Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems [Paper]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2014, September). Reaching Agreement in Security Policy Negotiation [Paper]. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, July). Specification and Deployment of Integrated Security Policies for Outsourced Data [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link
Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (2014, July). Specifying and enforcing constraints in dynamic access control policies [Paper]. 12th Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada. External link
Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013, September). Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation [Paper]. 9th International Workshop on Security and Trust Management (STM 2013), Egham, UK. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (2013, March). Confidentiality-preserving query execution of fragmented outsourced data [Paper]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. External link
Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (2013, September). Conflict Management in Obligation with Deadline Policies [Paper]. International Conference on Availability, Reliability and Security, Regensburg, Germany. External link
Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (2013, July). Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective [Paper]. 1st Annual Conference on Privacy, Security and Trust, Tarragona, Spain. External link
Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (2013, July). Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase [Paper]. 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Fine-grained privacy control for the RFID middleware of EPCglobal networks [Paper]. 5th International Conference on Management of Emergent Digital EcoSystems (MEDES 2013), Luxembourg, Luxembourg. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2013, December). Formal Characterization of Illegal Control Flow in Android System [Paper]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. External link
Fourcot, F., Toutain, L., Köpsell, S., Cuppens, F., & Boulahia Cuppens, N. (2013, August). IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices [Paper]. 19th EUNICE/IFIP WG 6.6 International Workshop on Advances in Communication Networking, Chemnitz, Germany. External link
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., Dellas, N. L., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Boulahia Cuppens, N., & Cuppens, F. (2013, October). Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model [Paper]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, September). Model-Driven Extraction and Analysis of Network Security Policies [Paper]. 16th International Conference on Model-Driven Engineering Languages and Systems (MODELS 2013), Miami, FL, USA. External link
Hachana, S., Cuppens, F., Boulahia Cuppens, N., Atluri, V., & Morucci, S. (2013, December). Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management [Paper]. 9th International Conference on Information Systems Security (ICISS 2013), Kolkata, India. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Privacy-enhanced filtering and collection middleware in EPCglobal networks [Paper]. International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (8 pages). External link
Barhamgi, M., Benslimane, D., Amghar, Y., Boulahia Cuppens, N., & Cuppens, F. (2013, March). PrivComp: a privacy-aware data service composition system [Paper]. 16th International Conference on Extending Database Technology (EDBT 2013), Genoa, Italy. External link
Perez, S. M., Cosentino, V., Cabot, J., & Cuppens, F. (2013, August). Reverse Engineering of Database Security Policies [Paper]. 24th International Conference on Database and Expert Systems Applications (DEXA 2013), Prague, Czech Republic. External link
Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Mrissa, M., & Taktak, H. (2013, June). Secure and Privacy-Preserving Execution Model for Data Services [Paper]. 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013), Valencia, Spain. External link
Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (2013, December). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Paper]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. External link
Moataz, T., Shikfa, A., Boulahia Cuppens, N., & Cuppens, F. (2013, May). Semantic search over encrypted data [Paper]. 20th International Conference on Telecommunications (ICT 2013), Casablanca, Morocco (5 pages). External link
Samarji, L., Cuppens, F., Boulahia Cuppens, N., Kanoun, W., & Dubus, S. (2013, November). Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks [Paper]. 5th International Symposium on Cyberspace Safety and Security (CSS 2013), Zhangjiajie, China. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, July). Towards an Access-Control Metamodel for Web Content Management Systems [Paper]. CWE 2013 International Workshops, Aalborg, Denmark. External link
Cuppens, F., Boulahia Cuppens, N., & Viña, E. P. (2012, April). Adaptive Access Control Enforcement in Social Network Using Aspect Weaving [Paper]. 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012), South Korea. External link
Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2012, December). Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses [Paper]. 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Melbourne, Australia. External link
Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2012, October). Enabling Dynamic Security Policy in the Java Security Manager [Paper]. 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montréal, Qc, Canada. External link
Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Moataz, T., & Rimasson, X. (2012, June). Handling Stateful Firewall Anomalies [Paper]. 27th IFIP TC 11 Information Security and Privacy Conference on Information Security and Privacy Research (SEC 2012), Heraklion, Crete, Greece. External link
Perez, S. M., Cabot, J., García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2012, October). A model-driven approach for the extraction of network access-control policies [Paper]. Workshop on Model-Driven Security, Innsbruck, Austria. External link
Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2012, August). Privacy Policy Preferences Enforced by SPARQL Query Rewriting [Paper]. 7th International Conference on Availability, Reliability and Security (ARES 2012), Prague, Czech Republic. External link
Franco-Contreras, J., Coatrieux, G., Chazard, E., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2012, August). Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA, USA. External link
Kanoun, W., Samarji, L., Boulahia Cuppens, N., Dubus, S., & Cuppens, F. (2012, September). Towards a Temporal Response Taxonomy [Paper]. 7th International Workshop on Data Privacy Management (DPM 2012) and 5th International Workshop on Autonomous and Spontaneous Security (SETOP 2012), Pisa, Italy. External link
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2012, August). Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications [Paper]. 7th International Conference on Availability, Reliability and Security, Prague, Czech Republic. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Morucci, S. (2012, September). Towards Session-Aware RBAC Delegation: Function Switch [Paper]. 7th International Workshop on Data Privacy Management (DPM 2012) and 5th International Workshop on Autonomous and Spontaneous Security (SETOP 2012), Pisa, Italy. External link
Thomas, J. A., Cuppens, F., & Boulahia Cuppens, N. (2011, December). Consistency Policies for Dynamic Information Systems with Declassification Flows [Paper]. 7th International Conference on Information Systems Security (ICISS 2011), Kolkata, India. External link
Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2011, August). Declassification Policy Management in Dynamic Information Systems [Paper]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., Le Métayer, D., & Piolle, G. (2011, June). Delegation of Obligations and Responsibility [Paper]. 26th IFIP TC 11 International Information Security Conference on Future Challenges in Security and Privacy for Academia and Industry, Lucerne, Switzerland. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2011, May). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Paper]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. External link
Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2011, May). Privacy Enforcement of Composed Services in Cellular Networks [Paper]. 11th Annual International Conference on New Technologies of Distributed Systems, Paris, France (8 pages). External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2011, August). Reversible watermarking based on invariant image classification and dynamical error histogram shifting [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, MA, USA. External link
Boulahia Cuppens, N., Cuppens, F., & Nuadi, M. (2011, August). Smatch Model: Extending RBAC Sessions in Virtualization Environment [Paper]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. External link
Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (2011, September). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Paper]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. External link
Preda, S., Boulahia Cuppens, N., Cuppens, F., & Toutain, L. (2010, February). Architecture-Aware Adaptive Deployment of Contextual Security Policies [Paper]. International Conference on Availability, Reliability and Security, Krakow, Poland. External link
Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Paper]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. External link
Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2010, October). Expression and enforcement of confidentiality policy in active databases [Paper]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. External link
Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2010, June). fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality [Paper]. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Rome, Italy. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2010, February). From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach [Paper]. International Conference on Availability, Reliability and Security, Krakow, Poland. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (2010, August). Intelligent response system to mitigate the success likelihood of ongoing attacks [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2007, December). Managing Delegation in Access Control Models [Paper]. 15th International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, India (7 pages). External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (2010, September). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Paper]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. External link
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2010, February). Model-Driven Security Policy Deployment: Property Oriented Approach [Paper]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., & Boulahia Cuppens, N. (2010, October). Negotiating and delegating obligations [Paper]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. External link
Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2010, September). Privacy Administration in Distributed Service Infrastructure [Paper]. 6th Iternational ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2010, August). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link
Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2010, December). Rewriting of SPARQL/Update Queries for Securing Data Access [Paper]. 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Dubus, S. (2010, September). Risk-Aware Framework for Activating and Deactivating Policy-Based Response [Paper]. 4th International Conference on Network and System Security, Melbourne, VIC, Australia. External link
Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2010, May). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Paper]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. External link
Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (2010, September). Service Dependencies in Information Systems Security [Paper]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. External link
Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). A Service Dependency Model for Cost-Sensitive Intrusion Response [Paper]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2010, December). Watermarking to Enforce Medical Image Access and Usage Control Policy [Paper]. 6th International Conference on Signal-Image Technology and Internet Based Systems, Kuala Lumpur, Malaysia. External link
Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2009, September). Contextual Privacy Management in Extended Role Based Access Control Model [Paper]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International on Autonomous and Spontaneous Security (SETOP 2009), St. Malo, France. External link
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2009, March). Deploying Security Policy in Intra and Inter Workflow Management Systems [Paper]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2009, September). An Extended Role-Based Access Control Model for Delegating Obligations [Paper]. 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), Linz, Austria. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, July). Formalization and Management of Group Obligations [Paper]. IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, November). From state-based to event-based contextual security policies [Paper]. 4th International Conference on Digital Information Management, Ann Arbor, MI, USA. External link
Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2009, September). Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking [Paper]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International Workshop on Autonomous and Spontaneous Security, St. Malo, France. External link
Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2009, November). Modeling and Controlling Downgrading Operations in Information Systems [Paper]. 5th International Conference on Signal Image Technology and Internet Based Systems, Marrakesh, Morocco. External link
Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2009, July). Reaction Policy Model Based on Dynamic Organizations and Threat Context [Paper]. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montréal, Qc, Canada. External link
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2009, July). Reliable Process for Security Policy Deployment [Paper]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). External link
Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2009, October). A secured delegation of remote services on IPv6 home networks [Paper]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. External link
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (2009, March). Semantic context aware security policy deployment [Paper]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. External link
Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (2009, July). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Paper]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (2009, August). Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems [Paper]. International Conference on Computational Science and Engineering, Vancouver, BC, Canada. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Araujo, J. (2009, January). Automated reaction based on risk analysis and attackers skills in intrusion detection systems [Paper]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. External link
Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2008, March). Context Ontology for Secure Interoperability [Paper]. 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain. External link
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, January). Deploying Access Control in Distributed Workflow [Paper]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. External link
Le, C. T. P., Cuppens, F., Boulahia Cuppens, N., & Maillé, P. (2008, November). Evaluating the Trustworthiness of Contributors in a Collaborative Environment [Paper]. 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Orlando, FL, USA. External link
Cuppens, F., Boulahia Cuppens, N., Bouzida, Y., Kanoun, W., & Croissant, A. (2008, November). Expression and Deployment of Reaction Policies [Paper]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2008, July). Interactivity for Reactive Access Control [Paper]. International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal. External link
Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2008, November). Interoperability of Context Based System Policies Using O2O Contract [Paper]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. External link
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, March). Managing access and flow control requirements in distributed workflows [Paper]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. External link
Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (2008, September). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Paper]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. External link
Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (2008, October). An ontology-based approach to react to network attacks [Paper]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. External link
Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2008, October). Revocation Schemes for Delegation Licences [Paper]. 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK. External link
Cuppens, F., Boulahia Cuppens, N., & Thomas, J. A. (2008, December). A Robust Reputation Scheme for Decentralized Group Management Systems [Paper]. 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. External link
Boulahia Cuppens, N., & Cuppens, F. (2008, July). Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic [Paper]. 9th International Conference on Deontic Logic in Computer Science (DEON 2008), Luxembourg, Luxembourg. External link
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2007, October). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Paper]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, April). Aggregating and Deploying Network Access Control Policies [Paper]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. External link
Mallouli, W., Orset, J.-M., Cavalli, A. R., Boulahia Cuppens, N., & Cuppens, F. (2007, June). A formal approach for testing security rules [Paper]. 12th ACM Symposium on Access control models and technologies (SACMAT 2007), Sophia, Antipolis, France. External link
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2007, December). An Integrated Model for Access Control and Information Flow Requirements [Paper]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, May). Management of Exceptions on Access Control Policies [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link
Cuppens, F., Boulahia Cuppens, N., Ramard, T., & Thomas, J. A. (2007, December). Misbehaviors Detection to Ensure Availability in OLSR [Paper]. 3rd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN 2007), Beijing, China. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007, May). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2007, August). Resource Classification Based Negotiation in Web Services [Paper]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. External link
Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (2007, November). Security policy compliance with violation management [Paper]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2007, September). XML-BB: A Model to Handle Relationships Protection in XML Documents [Paper]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Analysis of Policy Anomalies on Distributed Network Security Setups [Paper]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. External link
Cuppens, F., Boulahia Cuppens, N., & Ramard, T. (2006, April). Availability Enforcement by Obligations and Aspects Identification [Paper]. 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria. External link
Bouzida, Y., Cuppens, F., & Gombault, S. (2006, June). Detecting and Reacting against Distributed Denial of Service Attacks [Paper]. IEEE International Conference on Communications, Istanbul, Turkey. External link
Bouzida, Y., & Cuppens, F. (2006, May). Detecting Known and Novel Network Intrusions [Paper]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. External link
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2006, November). An extended RBAC profile of XACML [Paper]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, May). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Paper]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, December). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Paper]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. External link
Cuppens, F., Boulahia Cuppens, N., & Coma, C. (2006, December). O2O: Virtual Private Organizations to Manage Security Policy Interoperability [Paper]. 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Paper]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. External link
Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (2006, July). Using Contextual Security Policies for Threat Response [Paper]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, June). Nomad: A Security Model with Non Atomic Actions and Deadlines [Paper]. 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Aix-en-Provence, France. External link
García, J., Cuppens, F., Autrel, F., Castellà-Roca, J., Borrell, J., Navarro, G., & Ortega-Ruiz, J. A. (2005, April). Protecting On-Line Casinos against Fraudulent Player Drop-Out [Paper]. International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, NV, USA. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, December). Protection of Relationships in XML Documents with the XML-BB Model [Paper]. 1st International Conference on Information Systems Security (ICISS 2005), Kolkata, India. External link
García, J., Autrel, F., Borrell, J., Castillo, S., Cuppens, F., & Navarro, G. (2004, October). Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation [Paper]. 6th International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain. External link
Cuppens, F., Boulahia Cuppens, N., Sans, T., & Miège, A. (2004, August). A Formal Approach to Specify and Deploy a Network Security Policy [Paper]. IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST 2004), Toulouse, France. External link
Kaci, S., Ali-Laouar, A., & Cuppens, F. (2004, April). Health care and social inference systems: An unauthorized inference control based on fuzzy logic [Paper]. 2nd International Workshop on Security in Information Systems, Porto, Portugal. External link
Cuppens, F., Gombault, S., & Sans, T. (2004, June). Selecting Appropriate Counter-Measures in an Intrusion Detection Framework [Paper]. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), Pacific Grove, CA. External link
Cuppens, F., & Miège, A. (2003, November). Administration Model for Or-BAC [Paper]. On The Move to Meaningful Internet Systems, Sicily, Italy. External link
Benferhat, S., Autrel, F., & Cuppens, F. (2003, September). Enhanced Correlation in an Intrusion Detection Process [Paper]. 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), St. Petersburg, Russia. External link
Cuppens, F., & Miège, A. (2003, December). Modelling Contexts in the Or-BAC Model [Paper]. 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA. External link
Kalam, A. A. E., Benferhat, S., Miège, A., Baida, R. E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., & Trouessin, G. (2003, June). Organization based access control [Paper]. IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy (12 pages). External link
Benferhat, S., Baida, R. E., & Cuppens, F. (2003, May). A Possibilistic Logic Encoding of Access Control [Paper]. 16th International Florida Artificial Intelligence Research Society Conference, St. Augustine, Florida. External link
Benferhat, S., Baida, R. E., & Cuppens, F. (2003, June). A stratification-based approach for handling conflicts in access control [Paper]. 8th ACM symposium on Access control models and technologies (SACMACT 2003), Como, Italy. External link
Cuppens, F., & Miège, A. (2002, May). Alert Correlation in a Cooperative Intrusion Detection Framework [Paper]. IEEE Symposium on Security and Privacy, Berkeley, CA, USA. External link
Cuppens, F., Autrel, F., Miège, A., & Benferhat, S. (2002, December). Recognizing Malicious Intention in an Intrusion Detection Process [Paper]. Soft Computing Systems - Design, Management and Applications (HISS 2002), Santiago, Chile. External link
Cuppens, F. (2001, December). Managing Alerts in a Multi-Intrusion Detection Environment [Paper]. 17th annual Computer Security Applications Conference, New Orleans, LA, USA. External link
Cuppens, F., & Ortalo, R. (2000, October). LAMBDA: A Language to Model a Database for Detection of Attacks [Paper]. 3rd International Workshop on Recent Advances in Intrusion Detection, Toulouse, France. External link
Carrère, J., Cuppens, F., & Saurel, C. (2000, June). LExIS: A Query Language to Scan Information Flow [Paper]. 5th International Conference on Applications of Natural Language to Information Systems (NLDB 2000), Versailles, France. External link
Cuppens, F., & Saurel, C. (1998, November). A logical formalization of integrity policies for database management systems [Paper]. IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA. External link
Cuppens, F., Cholvy, L., Saurel, C., & Carrère, J. (1998, June). Merging Security Policies: Analysis of a Practical Example [Paper]. 11th IEEE Computer Security Foundations Workshop, Rockport, MA, USA. External link
Cuppens, F., & Gabillon, A. (1998, September). Rules for Designing Multilevel Object-Oriented Databases [Paper]. 5th European Symposium on Research in Computer Security (ESORICS 1998), Louvain-la-Neuve, Belgium. External link
Carrère, J., Cuppens, F., & Saurel, C. (1998, July). SACADDOS: A Support Tool to Manage Multilevel Documents [Paper]. IFIP TC 11 WG 11. 3 12th International Working Conference on Database Security, Chalkidiki, Greece. External link
Cholvy, L., & Cuppens, F. (1997, May). Analyzing Consistency of Security Policies [Paper]. IEEE Symposium on Security and Privacy, Oakland, CA, USA. External link
Cuppens, F., & Demolombe, R. (1997, October). A Modal Logical Framework for Security Policies [Paper]. 10th International Symposium on Foundations of Intelligent Systems (ISMIS 1997), Charlotte, North Carolina, USA. External link
Cholvy, L., Cuppens, F., & Saurel, C. (1997, June). Towards a Logical Formalization of Responsibility [Paper]. 6th international conference on Artificial intelligence and law (ICAIL 1997), Melbourne, Australia. External link
Cuppens, F., & Demolombe, R. (1996, January). A Deontic Logic for Reasoning about Confidentiality [Paper]. 3rd International Workshop on Deontic Logic in Computer Science (ΔEON 1996), Sesimbra, Portugal. External link
Cuppens, F., & Gabillon, A. (1996, August). Formalisation de la Confidentialité dans une Base de Données à Objets [Paper]. 12e Journées Bases de données avancées, Cassis, France. External link
Cuppens, F., & Gabillon, A. (1996, July). A Logical Approach to Model a Multilevel Object-Oriented Database [Paper]. 10th Annual IFIP WG 11.3 Working Conference on Database Security, Como, Italy. External link
Cuppens, F. (1996, September). Querying a Multilevel Database: A Logical Analysis [Paper]. 22nd International Conference on Very Large Data Bases (VLDB 1996), San Francisco, CA, USA. External link
Cuppens, F., & Saurel, C. (1996, June). Specifying a security policy: a case study [Paper]. 9th IEEE Computer Security Foundations Workshop, Kenmare, Ireland (12 pages). External link
Cuppens, F., & Gabillon, A. (1995, August). Modelling a Multilevel Database with Temporal Downgrading Functionalities [Paper]. 9th annual IFIP TC 11 Working Conference on Database Security, Rensselaerville, New York. External link
Cholvy, L., & Cuppens, F. (1995, May). Solving Normative Conflicts by Merging Roles [Paper]. 5th international conference on Artificial intelligence and law, College Park, Maryland, USA. External link
Boulahia Cuppens, N., & Cuppens, F. (1994, May). Asynchronous composition and required security conditions [Paper]. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA. External link
Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1994, November). Decomposition of Multilevel Objects in an Object-Oriented Database [Paper]. 3rd European Symposium on Research in Computer Security (ESORICS 1994), Brighton, United Kingdom. External link
Cuppens, F., & Trouessin, G. (1994, November). Information Flow Controls vs Interference Controls: An Integrated Approach [Paper]. 3rd European Symposium on Research in Computer Security (ESORICS 1994), Brighton, United Kingdom. External link
Cholvy, L., & Cuppens, F. (1995, August). Providing Consistent Views in a Polyinstantiated Database [Paper]. 9th annual IFIP TC11 Working Conference on Database Security, Rensselaerville, New York. External link
Cuppens, F. (1993, May). A logical analysis of authorized and prohibited information flows [Paper]. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA. External link
Cuppens, F. (1993, June). A Logical Formalization of Secrecy [Paper]. Computer Security Foundations Workshop, Franconia, NH, USA. External link
Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1993, September). Multilevel Security in Object-Oriented Databases [Paper]. Conference Workshop on Security for Object-Oriented Systems (OOPSLA-93), Washington, DC, USA. External link
Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1993, December). MultiView model for object-oriented database [Paper]. 9th Annual Computer Security Applications Conference, Orlando, FL, USA. External link
Yazdanian, K., & Cuppens, F. (1993, August). Neighborhood data and database security [Paper]. 1992-1993 Workshop on New Security Paradigms. External link
Cuppens, F., & Yazdanian, K. (1992, May). A 'natural' decomposition of multi-level relations [Paper]. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA. External link
Bieber, P., & Cuppens, F. (1992, June). Secure Dependencies with Dynamic Level Assignments [Paper]. Computer Security Foundations Workshop, Franconia, NH, USA. External link
Bieber, P., & Cuppens, F. (1991, June). A Definition of Secure Dependencies Using the Logic of Security [Paper]. 4th Computer Security Foundations Workshop, Franconia, NH, USA. External link
Cuppens, F., & Yazdanian, K. (1991, November). Logic Hints and Security in Relational Databases [Paper]. IFIP WG 11.3 Workshop on Database Security V: Status and Prospects, Amsterdam, Netherlands. External link
Cuppens, F. (1993, January). A Modal Logic Framework to Solve Aggregation Problems [Paper]. IFIP WG 11.3 Workshop on Database Security V: Status and Prospects. External link
Cuppens, F. (1990, October). An Epistemic and Deontic Logic for Reasoning about Computer Security [Paper]. 1st European Symposium on Research In Computer Security (ESORICS 1990), Toulouse, France. Unavailable
Cuppens, F. (1989, September). Un langage de requêtes pour obtenir des réponses intelligentes [Paper]. 5e Journées Bases de données avancées (BDA), Genève, Suisse. Unavailable
Cuppens, F., & Demolombe, R. (1988, May). Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives [Paper]. 4e Journées Bases de données avancées (BDA), Bénodet, France. Unavailable
Cuppens, F., & Demolombe, R. (1988, June). A Prolog-Relational DBMS Interface Using Delayed Evaluation [Paper]. 3rd International Conference on Data and Knowledge Bases, Jerusalem, Israel. External link
Wakrime, A. A., Navarro-Arribas, G., Cuppens, F., Boulahia Cuppens, N., & Benaini, R. (2024). Risks and Security of Internet and Systems. External link
Kallel, S., Jmaiel, M., Zulkernine, M., Hadj Kacem, A., Cuppens, F., & Boulahia Cuppens, N. (eds.) (2023). Risks and Security of Internet and Systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. External link
Kallel, S., Cuppens, F., Boulahia Cuppens, N., & Kacem, A. H. (eds.) (2020). 14th International Conference on Risks and Security of Internet and Systems (CRiSIS 2019), Hammamet, Tunisia. External link
Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., Gritzalis, S., Pallas, F., Pohle, J., Sasse, M. A., Meng, W., Furnell, S., & García-Alfaro, J. (eds.) (2020). 2019 ESORICS International Workshops, Luxembourg City, Luxembourg. External link
Zemmari, A., Mosbah, M., Boulahia Cuppens, N., & Cuppens, F. (eds.) (2019). 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Antón, A. I., Gritzalis, S., Mylopoulos, J., & Kalloniatis, C. (eds.) (2019). 2018 ESORICS International Workshops, Barcelona, Spain. External link
Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., & García-Alfaro, J. (eds.) (2018). 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. External link
Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., & Gritzalis, S. (eds.) (2018). 2017 ESORICS International Workshops, Oslo, Norway. External link
Fortino, G., Palau, C. E., Guerrieri, A., Boulahia Cuppens, N., Cuppens, F., Chaouchi, H., & Gabillon, A. (eds.) (2018). 3rd International Conference on Interoperability (InterIoT 2017) and 4th International Conference on Safety and Security in IoT (SaSelot 2017), Valencia, Spain. External link
Cuppens, F., Boulahia Cuppens, N., Lanet, J.-L., & Legay, A. (eds.) (2017). 11th International Conference on Risks and Security of Internet and Systems (CRiSIS 2016), Roscoff, France. External link
Boulahia Cuppens, N., Lambrinoudakis, C., Cuppens, F., & Katsikas, S. K. (eds.) (2017). 2nd International WorkshopSecurity of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), Heraklion, Crete, Greece. External link
Cuppens, F., Wang, L., Boulahia Cuppens, N., Tawbi, N., & García-Alfaro, J. (eds.) (2017). 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Bécue, A., Boulahia Cuppens, N., Cuppens, F., Katsikas, S. K., & Lambrinoudakis, C. (eds.) (2016). 1st International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICS 2015) and 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Vienna, Austria. External link
Cuppens, F., García-Alfaro, J., Zincir-Heywood, A. N., & Fong, P. W. L. (eds.) (2015). 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montreal, QC, Canada. External link
Boulahia Cuppens, N., Cuppens, F., Jajodia, S., Kalam, A. A. E., & Sans, T. (eds.) (2014). 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco. External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Miri, A., & Tawbi, N. (eds.) (2013). 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montreal, QC, Canada. External link
Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (eds.) (2012). 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France. External link
Cuppens, F., Foley, S. N., Groza, B., & Minea, M. (eds.) (2011). CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011. External link
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (eds.) (2004). Information Security Management, Education and Privacy : IFIP 18th World Computer Congress TC11, 19th International Information Security Workshops, 22–27 August 2004, Toulouse, France. External link
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (eds.) (2004). Security and Protection in Information Processing Systems : IFIP 18th World Computer Congress TC11, 19th International Information Security Conference, 22–27 August 2004, Toulouse, France. External link
Cuppens, F., Deswarte, Y., Gollmann, D., & Waidner, M. (eds.) (2000). Computer Security: 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France. External link
Cuppens, F., & Boulahia Cuppens, N. (2018). Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. In From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Vol. 11170, pp. 78-103). External link
Franco-Contreras, J., Coatrieux, G., Massari, P., Darmoni, S. J., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2015). Data Quality Evaluation in Medical Database Watermarking. In Studies in Health Technology and Informatics (pp. 276-280). External link
Cuppens, F., & Boulahia Cuppens, N. (2011). Cover Story. In Encyclopedia of Cryptography and Security (pp. 264-265). External link
Cuppens, F., & Boulahia Cuppens, N. (2011). Multilevel Security Policies. In Encyclopedia of Cryptography and Security (pp. 811-812). External link