Monter d'un niveau |
Autrel, F., & Cuppens, F. (2006). CRIM: un module de corrélation d'alertes et de réaction aux attaques. Annales des télécommunications, 61(9-10), 1172-1192. Lien externe
Bouzida, Y., & Cuppens, F. (mai 2006). Detecting Known and Novel Network Intrusions [Communication écrite]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. Lien externe
Bouzida, Y., Cuppens, F., & Gombault, S. (juin 2006). Detecting and Reacting against Distributed Denial of Service Attacks [Communication écrite]. IEEE International Conference on Communications, Istanbul, Turkey. Lien externe
Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. Lien externe
Cuppens, F., Boulahia Cuppens, N., & Coma, C. (décembre 2006). O2O: Virtual Private Organizations to Manage Security Policy Interoperability [Communication écrite]. 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India. Lien externe
Cuppens, F., Boulahia Cuppens, N., & Ramard, T. (avril 2006). Availability Enforcement by Obligations and Aspects Identification [Communication écrite]. 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria. Lien externe
Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. Lien externe
Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (juillet 2006). Using Contextual Security Policies for Threat Response [Communication écrite]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Analysis of Policy Anomalies on Distributed Network Security Setups [Communication écrite]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Communication écrite]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. Lien externe
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (novembre 2006). An extended RBAC profile of XACML [Communication écrite]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. Lien externe
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2006). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Communication écrite]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. Lien externe
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (décembre 2006). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Communication écrite]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. Lien externe