![]() | Monter d'un niveau |
Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (décembre 2023). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe
Baghalizadeh Moghadam, N., Neal, C., Cuppens, F., & Boulahia Cuppens, N. (décembre 2024). NLP and Neural Networks for Insider Threat Detection [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe
Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (décembre 2023). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe
Faillon, M.-A., Bout, B., Francq, J., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (septembre 2024). How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach [Communication écrite]. 29th European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland. Lien externe
Nanamou, N. K., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (décembre 2024). From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data [Communication écrite]. 20th International Conference on Information Systems Security (ICISS 2024), Jaipur, India. Publié dans Lecture notes in computer science. Lien externe
Ragab, A., Mannan, M., & Youssef, A. (septembre 2023). ESORICS 2023 International Workshops [Communication écrite]. European Symposium on Research in Computer Security (ESORICS 2023), The Hague, The Netherlands. Lien externe
Saint-Hilaire, K. A., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2024), Sanya, China. Lien externe
Saint-Hilaire, K., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (juin 2023). Automated enrichment of logical attack graphs via formal ontologies [Communication écrite]. 38th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2023), Poznan, Poland. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (août 2024). Matching Knowledge Graphs for Cybersecurity Countermeasures Selection [Communication écrite]. 6th International Conference Science of Cyber Security (SciSec 2024), Copenhagen, Denmark. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal automated generation of playbooks [Communication écrite]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal Automated Generation of Playbooks [Communication écrite]. 38th Annual IFIP WG 11.3 Conference (DBSec 2024), San Jose, CA, USA. Publié dans Lecture notes in computer science, 14901. Lien externe
Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (édit.) (2024). Foundations and Practice of Security. Lien externe
Wakrime, A. A., Navarro-Arribas, G., Cuppens, F., Boulahia Cuppens, N., & Benaini, R. (2024). Risks and Security of Internet and Systems. Lien externe