Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Boulahia Cuppens, N., Zerkane, S., Li, Y., Espes, D., Parc, P. L., & Cuppens, F. (2017, July). Firewall Policies Provisioning Through SDN in the Cloud [Paper]. 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2016, May). Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud [Paper]. 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2016), Ghent, Belgium. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., Frey, V., & Ji, X. (2015, December). Similarity Measure for Security Policies in Service Provider Selection [Paper]. 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India. External link
Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2014, September). Reaching Agreement in Security Policy Negotiation [Paper]. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China. External link