<  Back to the Polytechnique Montréal portal

Items where Author is "Debar, Hervé"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Jump to: B | C | D | H | K
Number of items: 15.

B

Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. External link

Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (2008, September). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Paper]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. External link

Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (2008, October). An ontology-based approach to react to network attacks [Paper]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. External link

C

Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. External link

Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. External link

D

Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (2010, September). Service Dependencies in Information Systems Security [Paper]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. External link

Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. External link

Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (2006, July). Using Contextual Security Policies for Threat Response [Paper]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. External link

Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. External link

H

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. External link

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2007, August). Resource Classification Based Negotiation in Web Services [Paper]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. External link

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2006, November). An extended RBAC profile of XACML [Paper]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. External link

K

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Paper]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. External link

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). A Service Dependency Model for Cost-Sensitive Intrusion Response [Paper]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. External link

Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (2009, July). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Paper]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. External link

List generated on: Mon Apr 22 07:51:38 2024 EDT