Monter d'un niveau |
Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. Lien externe
Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (septembre 2008). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Communication écrite]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. Lien externe
Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (octobre 2008). An ontology-based approach to react to network attacks [Communication écrite]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. Lien externe
Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. Lien externe
Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. Lien externe
Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Service Dependencies in Information Systems Security [Communication écrite]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. Lien externe
Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. Lien externe
Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (juillet 2006). Using Contextual Security Policies for Threat Response [Communication écrite]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. Lien externe
Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. Lien externe
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. Lien externe
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (août 2007). Resource Classification Based Negotiation in Web Services [Communication écrite]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. Lien externe
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (novembre 2006). An extended RBAC profile of XACML [Communication écrite]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. Lien externe
Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Communication écrite]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. Lien externe
Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). A Service Dependency Model for Cost-Sensitive Intrusion Response [Communication écrite]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. Lien externe
Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (juillet 2009). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Communication écrite]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. Lien externe