![]() | Monter d'un niveau |
Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (décembre 2023). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe
Baghalizadeh Moghadam, N., Neal, C., Cuppens, F., & Boulahia Cuppens, N. (décembre 2024). NLP and Neural Networks for Insider Threat Detection [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe
Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (décembre 2023). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe
Faillon, M.-A., Bout, B., Francq, J., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (septembre 2024). How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach [Communication écrite]. 29th European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland. Lien externe
Merzouk, M. A., Neal, C., Delas, J., Yaich, R., Boulahia-Cuppens, N., & Cuppens, F. (2024). Adversarial robustness of deep reinforcement learning-based intrusion detection. International Journal of Information Security, 27 pages. Lien externe
Nanamou, N. K., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (décembre 2024). From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data [Communication écrite]. 20th International Conference on Information Systems Security (ICISS 2024), Jaipur, India. Publié dans Lecture notes in computer science. Lien externe
Saint-Hilaire, K. A., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2024), Sanya, China. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (août 2024). Matching Knowledge Graphs for Cybersecurity Countermeasures Selection [Communication écrite]. 6th International Conference Science of Cyber Security (SciSec 2024), Copenhagen, Denmark. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal automated generation of playbooks [Communication écrite]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal Automated Generation of Playbooks [Communication écrite]. 38th Annual IFIP WG 11.3 Conference (DBSec 2024), San Jose, CA, USA. Publié dans Lecture notes in computer science, 14901. Lien externe