Monter d'un niveau |
Autrel, F., Benferhat, S., & Cuppens, F. (2004). Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Annales des télécommunications, 59(9-10), 1072-1091. Lien externe
Cuppens, F., & Miège, A. (2004). AdOrBAC: an administration model for Or-BAC. Computer Systems Science and Engineering, 19(3). Non disponible
Cuppens, F., Boulahia Cuppens, N., Sans, T., & Miège, A. (août 2004). A Formal Approach to Specify and Deploy a Network Security Policy [Communication écrite]. IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST 2004), Toulouse, France. Lien externe
Cuppens, F., Gombault, S., & Sans, T. (juin 2004). Selecting Appropriate Counter-Measures in an Intrusion Detection Framework [Communication écrite]. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), Pacific Grove, CA. Lien externe
Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. Lien externe
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (édit.) (2004). Information Security Management, Education and Privacy : IFIP 18th World Computer Congress TC11, 19th International Information Security Workshops, 22–27 August 2004, Toulouse, France. Lien externe
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (édit.) (2004). Security and Protection in Information Processing Systems : IFIP 18th World Computer Congress TC11, 19th International Information Security Conference, 22–27 August 2004, Toulouse, France. Lien externe
García, J., Autrel, F., Borrell, J., Castillo, S., Cuppens, F., & Navarro, G. (octobre 2004). Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation [Communication écrite]. 6th International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain. Lien externe
Kaci, S., Ali-Laouar, A., & Cuppens, F. (avril 2004). Health care and social inference systems: An unauthorized inference control based on fuzzy logic [Communication écrite]. 2nd International Workshop on Security in Information Systems, Porto, Portugal. Lien externe