<  Retour au portail Polytechnique Montréal

Documents publiés en "2024"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | F | M | N | S
Nombre de documents: 11

A

Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (décembre 2023). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe

B

Baghalizadeh Moghadam, N., Neal, C., Cuppens, F., & Boulahia Cuppens, N. (décembre 2024). NLP and Neural Networks for Insider Threat Detection [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe

C

Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (décembre 2023). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Communication écrite]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. Lien externe

F

Faillon, M.-A., Bout, B., Francq, J., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (septembre 2024). How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach [Communication écrite]. 29th European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland. Lien externe

M

Merzouk, M. A., Neal, C., Delas, J., Yaich, R., Boulahia-Cuppens, N., & Cuppens, F. (2024). Adversarial robustness of deep reinforcement learning-based intrusion detection. International Journal of Information Security, 27 pages. Lien externe

N

Nanamou, N. K., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (décembre 2024). From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data [Communication écrite]. 20th International Conference on Information Systems Security (ICISS 2024), Jaipur, India. Publié dans Lecture notes in computer science. Lien externe

S

Saint-Hilaire, K. A., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2024), Sanya, China. Lien externe

Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Bassi, F. (décembre 2024). Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs [Communication écrite]. 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China. Lien externe

Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (août 2024). Matching Knowledge Graphs for Cybersecurity Countermeasures Selection [Communication écrite]. 6th International Conference Science of Cyber Security (SciSec 2024), Copenhagen, Denmark. Lien externe

Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal automated generation of playbooks [Communication écrite]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. Lien externe

Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (juillet 2024). Optimal Automated Generation of Playbooks [Communication écrite]. 38th Annual IFIP WG 11.3 Conference (DBSec 2024), San Jose, CA, USA. Publié dans Lecture notes in computer science, 14901. Lien externe

Liste produite: Fri Dec 5 02:04:28 2025 EST.