Kamu erişimi zorunlu olan makaleler - Nora CuppensDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 2
Similarity measure for security policies in service provider selection
Y Li, N Cuppens-Boulahia, JM Crom, F Cuppens, V Frey, X Ji
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
Zorunlu olanlar: European Commission
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach
R Yaich, N Cuppens, F Cuppens
Proceedings of the 12th International Conference on Availability …, 2017
Zorunlu olanlar: European Commission
Bir yerde sunuluyor: 14
Management of stateful firewall misconfiguration
J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Martinez, J Cabot
Computers & Security 39, 64-85, 2013
Zorunlu olanlar: Government of Spain
Dynamic deployment of context-aware access control policies for constrained security devices
S Preda, F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, L Toutain
Journal of Systems and Software 84 (7), 1144-1159, 2011
Zorunlu olanlar: Government of Spain
A privacy-aware access control model for distributed network monitoring
EI Papagiannakopoulou, MN Koukovini, GV Lioudakis, J Garcia-Alfaro, ...
Computers & Electrical Engineering 39 (7), 2263-2281, 2013
Zorunlu olanlar: Government of Spain
Resilience estimation of cyber-physical systems via quantitative metrics
M Barbeau, F Cuppens, N Cuppens, R Dagnas, J Garcia-Alfaro
IEEE Access 9, 46462-46475, 2021
Zorunlu olanlar: Natural Sciences and Engineering Research Council of Canada, European Commission
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
W Tounsi, N Cuppens-Boulahia, J Garcia-Alfaro, Y Chevalier, F Cuppens
Journal of Network and Computer Applications 39, 152-166, 2014
Zorunlu olanlar: Government of Spain
A deeper analysis of adversarial examples in intrusion detection
MA Merzouk, F Cuppens, N Boulahia-Cuppens, R Yaich
Risks and Security of Internet and Systems: 15th International Conference …, 2021
Zorunlu olanlar: European Commission
Metrics to enhance the resilience of cyber-physical systems
M Barbeau, F Cuppens, N Cuppens, R Dagnas, J Garcia-Alfaro
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
Zorunlu olanlar: Natural Sciences and Engineering Research Council of Canada, European Commission
Expression and enforcement of security policy for virtual resource allocation in IaaS cloud
Y Li, N Cuppens-Boulahia, JM Crom, F Cuppens, V Frey
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
Zorunlu olanlar: European Commission
A study on mitigation techniques for scada-driven cyber-physical systems (position paper)
M Segovia, AR Cavalli, N Cuppens, J Garcia-Alfaro
International Symposium on Foundations and Practice of Security, 257-264, 2018
Zorunlu olanlar: European Commission
Formal verification of a key establishment protocol for EPC Gen2 RFID systems: work in progress
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012
Zorunlu olanlar: Government of Spain
Reflective attenuation of cyber-physical attacks
M Segovia, AR Cavalli, N Cuppens, J Rubio-Hernan, J Garcia-Alfaro
Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020
Zorunlu olanlar: European Commission
Theoretical security evaluation of the Human Semantic Authentication protocol
H Le Bouder, G Thomas, E Bourget, M Graa, N Cuppens-Boulahia, ...
SECRYPT 2018-15th International Conference on Security and Cryptography 1 …, 2018
Zorunlu olanlar: European Commission
Firewall policies provisioning through SDN in the cloud
N Cuppens, S Zerkane, Y Li, D Espes, P Le Parc, F Cuppens
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017
Zorunlu olanlar: European Commission
Automated enrichment of logical attack graphs via formal ontologies
K Saint-Hilaire, F Cuppens, N Cuppens, J Garcia-Alfaro
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2023
Zorunlu olanlar: European Commission
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir