<  Retour au portail Polytechnique Montréal

Documents publiés en "2018"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | E | F | G | J | K | M | N | S
Nombre de documents: 24

A

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. Lien externe

B

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (octobre 2018). A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (octobre 2018). Linking Differential Identifiability with Differential Privacy [Communication écrite]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. Lien externe

Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (octobre 2018). Optimal Distribution of Privacy Budget in Differential Privacy [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Bouder, H. L., Thomas, G., Bourget, E., Graa, M., Boulahia Cuppens, N., & Lanet, J.-L. (juillet 2018). Theoretical Security Evaluation of the Human Semantic Authentication Protocol [Communication écrite]. 15th International Joint Conference on e-Business and Telecommunications, Porto, Portugal. Lien externe

Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., & García-Alfaro, J. (édit.) (2018). 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. Lien externe

Bourget, E., Cuppens, F., Boulahia Cuppens, N., Dubus, S., Foley, S. N., & Laarouchi, Y. (juillet 2018). Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes [Communication écrite]. 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2018), Bergamo, Italy. Lien externe

C

Clédel, T., Foley, S. N., Boulahia Cuppens, N., Cuppens, F., Kermarrec, Y., Dubois, F., Laarouchi, Y., & Comte, G. L. (octobre 2018). Towards the Evaluation of End-to-End Resilience Through External Consistency [Communication écrite]. 10th International Symposium on Cyberspace Safety and Security (CSS 2018), Amalfi, Italy. Lien externe

Cuppens, F., & Boulahia Cuppens, N. (2018). Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. Dans From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Vol. 11170, p. 78-103). Lien externe

E

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (octobre 2018). RIICS: Risk Based IICS Segmentation Method [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (décembre 2018). SONICS: A Segmentation Method for Integrated ICS and Corporate System [Communication écrite]. 14th International Conference on Information Systems Security (ICISS 2018), Bangalore, India. Lien externe

F

Fortino, G., Palau, C. E., Guerrieri, A., Boulahia Cuppens, N., Cuppens, F., Chaouchi, H., & Gabillon, A. (édit.) (2018). 3rd International Conference on Interoperability (InterIoT 2017) and 4th International Conference on Safety and Security in IoT (SaSelot 2017), Valencia, Spain. Lien externe

G

Graa, M., Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (septembre 2018). Detection and Response to Data Exfiltration from Internet of Things Android Devices [Communication écrite]. 33rd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2018), Poznan, Poland. Lien externe

J

Ji, X., Guernic, G. L., Boulahia Cuppens, N., & Cuppens, F. (octobre 2018). USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework [Communication écrite]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. Lien externe

K

Kabil, A., Duval, T., Boulahia Cuppens, N., Comte, G. L., Halgand, Y., & Ponchel, C. (octobre 2018). 3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training [Communication écrite]. 15th International Conference on Cooperative Design, Visualization, and Engineering (CDVE 2018), Hangzhou, China. Lien externe

Kabil, A., Duval, T., Boulahia Cuppens, N., Comte, G. L., Halgand, Y., & Ponchel, C. (décembre 2018). From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform [Communication écrite]. 14th International Conference on Information Systems Security (ICISS 2018), Bangalore, India. Lien externe

Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., & Gritzalis, S. (édit.) (2018). 2017 ESORICS International Workshops, Oslo, Norway. Lien externe

Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (octobre 2018). A Certificate-Less Key Exchange Protocol for IoT [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Kome, M. L., Cuppens, F., Boulahia Cuppens, N., & Frey, V. (octobre 2018). CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0 [Communication écrite]. 5th International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain. Lien externe

M

Moataz, T., Ray, I., Ray, I., Shikfa, A., Cuppens, F., & Boulahia Cuppens, N. (2018). Substring search over encrypted data. Journal of Computer Security, 26(1), 1-30. Lien externe

Moussaileb, R., Bouget, B., Palisse, A., Bouder, H. L., Boulahia Cuppens, N., & Lanet, J.-L. (août 2018). Ransomware's Early Mitigation Mechanisms [Communication écrite]. 13th International Conference on Availability, Reliability and Security, Hamburg Germany. Lien externe

N

Navas, R. E., Bouder, H. L., Boulahia Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (septembre 2018). Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack [Communication écrite]. 17th International Conference on Ad-Hoc Networks and Wireless (AdHoc-Now 2018), Saint-Malo, France. Lien externe

S

Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., & García-Alfaro, J. (novembre 2018). A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) [Communication écrite]. 11th International Symposium on Foundations and Practice of Security (FPS 2018), Montréal, Qc, Canada. Lien externe

Smine, M., Boulahia Cuppens, N., & Cuppens, F. (octobre 2018). Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Liste produite: Fri Aug 16 03:01:49 2024 EDT.