![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (2023, December). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link
Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (2023, December). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link
Charpentier, A., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2023, August). Real-Time Defensive Strategy Selection via Deep Reinforcement Learning [Paper]. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, Italy (11 pages). External link
Crochelet, P., Neal, C., Boulahia Cuppens, N., & Cuppens, F. (2022, December). Attacker Attribution via Characteristics Inference Using Honeypot Data [Paper]. 16th International Conference on Network and System Security (NSS 2022), Denarau Island, Fiji. External link
Faillon, M.-A., Bout, B., Francq, J., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2024, September). How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach [Paper]. 29th European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland. External link
Grzeczkowicz, R. J. É., Neal, C., Baghalizadeh Moghadam, N., Boulahia Cuppens, N., & Cuppens, F. (2024, November). Classifying Insider Threat Scenarios Through Explainable Articial Intelligence [Paper]. Risks and Security of Internet and Systems (CRiSIS 2024), Aix-en-Provence, France. Published in Lecture notes in computer science. External link
Merzouk, M. A., Neal, C., Delas, J., Yaich, R., Boulahia-Cuppens, N., & Cuppens, F. (2024). Adversarial robustness of deep reinforcement learning-based intrusion detection. International Journal of Information Security, 27 pages. External link
Merzouk, M. A., Delas, J., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2022, August). Evading deep reinforcement learning-based network intrusion detection with adversarial attacks [Paper]. 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria (6 pages). External link
Nanamou, N. K., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (2024, December). From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data [Paper]. 20th International Conference on Information Systems Security (ICISS 2024), Jaipur, India. Published in Lecture notes in computer science. External link
Neal, C. (2021). Methods for Assessing the Cybersecurity Posture of Critical Infrastructure via Testbed-Based Experimentation [Ph.D. thesis, Polytechnique Montréal]. Available
Neal, C., Dagdougui, H., Lodi, A., & Fernandez, J. M. (2021, January). Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm [Paper]. 11th IEEE Annual Computing and Communication Workshop and Conference (CCWC 2021), Nevada, USA. External link
Neal, C., Al Mallah, R., Fernandez, J. M., & Lodi, A. (2020, August). Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input [Paper]. 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2020), London, ON, Canada (6 pages). External link
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (2024, August). Matching Knowledge Graphs for Cybersecurity Countermeasures Selection [Paper]. 6th International Conference Science of Cyber Security (SciSec 2024), Copenhagen, Denmark. External link
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (2024, July). Optimal Automated Generation of Playbooks [Paper]. 38th Annual IFIP WG 11.3 Conference (DBSec 2024), San Jose, CA, USA. Published in Lecture notes in computer science, 14901. External link
Saint-Hilaire, K. A., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (2024, December). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Paper]. 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2024), Sanya, China. External link
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (2024, July). Optimal automated generation of playbooks [Paper]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. External link