![]() | Monter d'un niveau |
Baghalizadeh Moghadam, N., Cuppens, F., & Boulahia Cuppens, N. (juin 2025). An NLP-Based Framework Leveraging Email and Multimodal User Data [Communication écrite]. 22nd International Conference on Security and Cryptography (SECRYPT 2025), Bilbao, Spain. Lien externe
Ben Salem, R., Cuppens, F., Boulahia Cuppens, N., & Khechine, H. (août 2025). Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats [Communication écrite]. 20th International conference on Availability, Reliability and Security (ARES 2025), Ghent, Belgium. Publié dans Lecture notes in computer science, 15995. Lien externe
Bouakkaz, S., Suárez, L., Boulahia Cuppens, N., & Cuppens, F. (février 2025). Design of an Intelligent Trust Management Architecture for 5G Service Deployment [Communication écrite]. 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), Porto, Portugal. Lien externe
Risks and Security of Internet and Systems [Communication écrite] (novembre 2024). 19th International Conference on Risks and Security of Internet and Systems (CRiSIS 2024), Aix-en-Provence, France (560 pages). Publié dans Lecture notes in computer science, 15456. Lien externe
Cuppens, F., & Boulahia Cuppens, N. (2025). Cover Story. Dans Jajodia, S., Samarati, P., & Yung, M. (édit.), Encyclopedia of Cryptography, Security and Privacy (p. 450-452). Lien externe
Cuppens, F., & Boulahia Cuppens, N. (2025). Multilevel Security Policies. Dans Jajodia, S., Samarati, P., & Yung, M. (édit.), Encyclopedia of Cryptography, Security and Privacy (p. 1597-1599). Lien externe
Garcia-Alfaro, J., Barker, K., Navarro-Arribas, G., Delgado-Segura, S., Katsikas, S., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Pawlicki, M., & Choraś, M. (septembre 2024). Computer Security. ESORICS 2024 International Workshops [Communication écrite]. 29th European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland (545 pages). Publié dans Lecture notes in computer science. Lien externe
Grzeczkowicz, R. J. É., Neal, C., Baghalizadeh Moghadam, N., Boulahia Cuppens, N., & Cuppens, F. (novembre 2024). Classifying Insider Threat Scenarios Through Explainable Articial Intelligence [Communication écrite]. Risks and Security of Internet and Systems (CRiSIS 2024), Aix-en-Provence, France. Publié dans Lecture notes in computer science. Lien externe
Merzouk, M. A., Beurier, E., Yaich, R., Boulahia Cuppens, N., Cuppens, F., & Khomh, F. (juin 2025). Diffusion-Based Adversarial Purification for Intrusion Detection [Communication écrite]. 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy (DBSec 2025), Gjøvik, Norway. Publié dans Lecture notes in computer science. Lien externe
Nanamou, N. K., Baghalizadeh Moghadam, N., Leblanc, T., Saint-Hilaire, K., Boulahia Cuppens, N., Cuppens, F., & Bkakria, A. (novembre 2025). Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators [Communication écrite]. 18th International Symposium on Foundations & Practice of Security (FPS 2025), Brest, France. Lien externe
Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., Bassi, F., & Hadji, M. (2025). A real-time automated attack-defense graph generation approach. Journal of Information Security and Applications, 94, 104266 (28 pages). Lien externe
Wanko Naa, F., Boulahia Cuppens, N., & Cuppens, F. (juin 2025). Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management [Communication écrite]. 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy (DBSec 2025), Gjøvik, Norway. Publié dans Lecture notes in computer science. Lien externe