<  Retour au portail Polytechnique Montréal

Documents publiés en "2006"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | D | G | H | S
Nombre de documents: 13

A

Autrel, F., & Cuppens, F. (2006). CRIM: un module de corrélation d'alertes et de réaction aux attaques. Annales des télécommunications, 61(9-10), 1172-1192. Lien externe

B

Bouzida, Y., & Cuppens, F. (mai 2006). Detecting Known and Novel Network Intrusions [Communication écrite]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. Lien externe

Bouzida, Y., Cuppens, F., & Gombault, S. (juin 2006). Detecting and Reacting against Distributed Denial of Service Attacks [Communication écrite]. IEEE International Conference on Communications, Istanbul, Turkey. Lien externe

C

Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Coma, C. (décembre 2006). O2O: Virtual Private Organizations to Manage Security Policy Interoperability [Communication écrite]. 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Ramard, T. (avril 2006). Availability Enforcement by Obligations and Aspects Identification [Communication écrite]. 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria. Lien externe

Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. Lien externe

D

Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (juillet 2006). Using Contextual Security Policies for Threat Response [Communication écrite]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. Lien externe

G

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Analysis of Policy Anomalies on Distributed Network Security Setups [Communication écrite]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. Lien externe

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Communication écrite]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. Lien externe

H

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (novembre 2006). An extended RBAC profile of XACML [Communication écrite]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. Lien externe

S

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2006). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Communication écrite]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. Lien externe

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (décembre 2006). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Communication écrite]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. Lien externe

Liste produite: Sun May 5 03:28:50 2024 EDT.