Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., & García-Alfaro, J. (eds.) (2018). 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. External link
Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (eds.) (2012). 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France. External link
Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2019, January). Misconfiguration management of network security components [Paper]. 7th International Symposium on System and Information Security (SSI 2019), Sao Paulo, Brazil (9 pages). External link
Cuppens, F., Wang, L., Boulahia Cuppens, N., Tawbi, N., & García-Alfaro, J. (eds.) (2017). 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Cuppens, F., García-Alfaro, J., Zincir-Heywood, A. N., & Fong, P. W. L. (eds.) (2015). 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montreal, QC, Canada. External link
Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Moataz, T., & Rimasson, X. (2012, June). Handling Stateful Firewall Anomalies [Paper]. 27th IFIP TC 11 Information Security and Privacy Conference on Information Security and Privacy Research (SEC 2012), Heraklion, Crete, Greece. External link
García-Alfaro, J., Lioudakis, G. V., Boulahia Cuppens, N., Foley, S. N., & Fitzgerald, W. M. (eds.) (2014). 8th International Workshop on Data Privacy Management (DPM 2013) and 6th International Workshop on Autonomous Spontaneous Security (SETOP 2013), Egham, UK. External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Miri, A., & Tawbi, N. (eds.) (2013). 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montreal, QC, Canada. External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Perez, S. M., & Cabot, J. (2013). Management of stateful firewall misconfiguration. Computers & Security, 39, 64-85. External link
García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Vimercati, S. D. C. (eds.) (2012). 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous Spontaneus Security (SETOP 2011), Leuven, Belgium. External link
García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Roudier, Y. (eds.) (2010). 4th International Workshop on Data Privacy Management (DPM 2010) and 2nd International Workshop on Autonomous Spontaneous Security (SETOP 2009), St. Malo, France. External link
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (2010, September). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Paper]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. External link
García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2008). Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2), 103-122. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, April). Aggregating and Deploying Network Access Control Policies [Paper]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, May). Management of Exceptions on Access Control Policies [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Analysis of Policy Anomalies on Distributed Network Security Setups [Paper]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. External link
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Paper]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. External link
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2013). Semantic analysis of role mining results and shadowed roles detection. Information Security Technical Report, 17(4), 131-147. External link
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2012, August). Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications [Paper]. 7th International Conference on Availability, Reliability and Security, Prague, Czech Republic. External link
Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., Gritzalis, S., Pallas, F., Pohle, J., Sasse, M. A., Meng, W., Furnell, S., & García-Alfaro, J. (eds.) (2020). 2019 ESORICS International Workshops, Luxembourg City, Luxembourg. External link
Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (eds.) (2024). Foundations and Practice of Security. External link
Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (eds.) (2023). Foundations and Practice of Security. External link
Nicolescu, G., Tria, A., Fernandez, J. M., Marion, J.-Y., & García-Alfaro, J. (2020, December). Foundations and Practice of Security [Paper]. 13th International Symposium on Foundations and Practice of Security (FPS 2020), Montréal, Québec. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2015, May). Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems [Paper]. 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany. External link
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., Dellas, N. L., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Boulahia Cuppens, N., & Cuppens, F. (2013, October). Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model [Paper]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, September). Model-Driven Extraction and Analysis of Network Security Policies [Paper]. 16th International Conference on Model-Driven Engineering Languages and Systems (MODELS 2013), Miami, FL, USA. External link
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Cuppens, F., & Boulahia Cuppens, N. (2013). A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7), 2263-2281. External link
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, July). Towards an Access-Control Metamodel for Web Content Management Systems [Paper]. CWE 2013 International Workshops, Aalborg, Denmark. External link
Perez, S. M., Cabot, J., García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2012, October). A model-driven approach for the extraction of network access-control policies [Paper]. Workshop on Model-Driven Security, Innsbruck, Austria. External link
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. External link
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2010, February). Model-Driven Security Policy Deployment: Property Oriented Approach [Paper]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. External link
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2009, July). Reliable Process for Security Policy Deployment [Paper]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). External link
Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2009, October). A secured delegation of remote services on IPv6 home networks [Paper]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. External link
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (2009, March). Semantic context aware security policy deployment [Paper]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. External link
Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., Rubio-Hernan, J., & García-Alfaro, J. (2019, September). Reflective Attenuation of Cyber-Physical Attacks [Paper]. ESORICS International Workshops, Luxembourg City, Luxembourg. External link
Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., & García-Alfaro, J. (2018, November). A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) [Paper]. 11th International Symposium on Foundations and Practice of Security (FPS 2018), Montréal, Qc, Canada. External link
Tounsi, W., Boulahia Cuppens, N., García-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152-166. External link
Tounsi, W., Justus, B., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2014, June). Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm [Paper]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Fine-grained privacy control for the RFID middleware of EPCglobal networks [Paper]. 5th International Conference on Management of Emergent Digital EcoSystems (MEDES 2013), Luxembourg, Luxembourg. External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Privacy-enhanced filtering and collection middleware in EPCglobal networks [Paper]. International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (8 pages). External link
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2011, May). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Paper]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. External link
Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2010, May). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Paper]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. External link