Search Results - "Cuppens, Frederic"

Refine Results
  1. 1

    Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics by Barbeau, Michel, Cuppens, Frederic, Cuppens, Nora, Dagnas, Romain, Garcia-Alfaro, Joaquin

    Published in IEEE access (01-01-2021)
    “…This paper is about the estimation of the cyber-resilience of CPS. We define two new resilience estimation metrics: <inline-formula> <tex-math…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Investigating the practicality of adversarial evasion attacks on network intrusion detection by Merzouk, Mohamed Amine, Cuppens, Frédéric, Boulahia-Cuppens, Nora, Yaich, Reda

    Published in Annales des télécommunications (01-12-2022)
    “…As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise…”
    Get full text
    Journal Article
  4. 4

    Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting by Coatrieux, Gouenou, Pan, Wei, Cuppens-Boulahia, Nora, Cuppens, Frédéric, Roux, Christian

    “…In this paper, we propose a new reversible watermarking scheme. One first contribution is a histogram shifting modulation which adaptively takes care of the…”
    Get full text
    Journal Article
  5. 5

    Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming by Navas, Renzo E., Cuppens, Frédéric, Boulahia Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.

    “…Wireless communication is a key technology for the Internet of Things (IoT). Due to its open nature, the physical layer of wireless systems is a high-priority…”
    Get full text
    Journal Article
  6. 6

    Adversarial robustness of deep reinforcement learning-based intrusion detection by Merzouk, Mohamed Amine, Neal, Christopher, Delas, Joséphine, Yaich, Reda, Boulahia-Cuppens, Nora, Cuppens, Frédéric

    “…Machine learning techniques, including Deep Reinforcement Learning (DRL), enhance intrusion detection systems by adapting to new threats. However, DRL’s…”
    Get full text
    Journal Article
  7. 7
  8. 8

    MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT by Navas, Renzo E., Cuppens, Frederic, Boulahia Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.

    Published in IEEE internet of things journal (15-05-2021)
    “…Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems…”
    Get full text
    Journal Article
  9. 9

    Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation by Franco-Contreras, Javier, Coatrieux, Gouenou, Cuppens, Frederic, Cuppens-Boulahia, Nora, Roux, Christian

    “…In this paper, we adapt the robust reversible watermarking modulation originally proposed by Vleeschouwer for images to the protection of relational databases…”
    Get full text
    Journal Article
  10. 10

    Modeling contextual security policies by Cuppens, Frédéric, Cuppens-Boulahia, Nora

    “…As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based…”
    Get full text
    Journal Article
  11. 11

    Management of stateful firewall misconfiguration by Garcia-Alfaro, Joaquin, Cuppens, Frédéric, Cuppens-Boulahia, Nora, Martinez, Salvador, Cabot, Jordi

    Published in Computers & security (01-11-2013)
    “…Firewall configurations are evolving into dynamic policies that depend on protocol states. As a result, stateful configurations tend to be much more error…”
    Get full text
    Journal Article
  12. 12

    Formal enforcement and management of obligation policies by Elrakaiby, Yehia, Cuppens, Frédéric, Cuppens-Boulahia, Nora

    Published in Data & knowledge engineering (2012)
    “…Obligations are generally actions that users are required to take and are essential for the expression of a large number of requirements. For instance,…”
    Get full text
    Journal Article
  13. 13

    Alert correlation in a cooperative intrusion detection framework by Cuppens, F., Miege, A.

    “…This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    Deployment of a posteriori access control using IHE ATNA by Azkia, Hanieh, Cuppens-Boulahia, Nora, Cuppens, Frédéric, Coatrieux, Gouenou, Oulmakhzoune, Said

    “…In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control…”
    Get full text
    Journal Article
  15. 15

    Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform by Tounsi, Wiem, Cuppens-Boulahia, Nora, Cuppens, Frédéric, Pujolle, Guy

    Published in World wide web (Bussum) (01-01-2016)
    “…Radio Frequency IDentification (RFID) technology offers a new way of automating the identification and storing of information in RFID tags. The emerging…”
    Get full text
    Journal Article
  16. 16

    IANVS: A Moving Target Defense Framework for a Resilient Internet of Things by Navas, Renzo E., Sandaker, Hakon, Cuppens, Frederic, Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.

    “…The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the…”
    Get full text
    Conference Proceeding
  17. 17

    Dynamic deployment of context-aware access control policies for constrained security devices by Preda, Stere, Cuppens, Frédéric, Cuppens-Boulahia, Nora, Garcia-Alfaro, Joaquin, Toutain, Laurent

    Published in The Journal of systems and software (01-07-2011)
    “…Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when…”
    Get full text
    Journal Article
  18. 18

    KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems by Tounsi, Wiem, Cuppens-Boulahia, Nora, Garcia-Alfaro, Joaquin, Chevalier, Yannick, Cuppens, Frédéric

    “…The EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains…”
    Get full text
    Journal Article
  19. 19

    Mining a high level access control policy in a network with multiple firewalls by Hachana, Safaà, Cuppens-Boulahia, Nora, Cuppens, Frédéric

    “…A policy mining approach that aims to automatically extract a high level of abstraction policy from the rules configured on a firewall has been recently…”
    Get full text
    Journal Article
  20. 20

    Privacy query rewriting algorithm instrumented by a privacy-aware access control model by Oulmakhzoune, Said, Cuppens-Boulahia, Nora, Cuppens, Frédéric, Morucci, Stéphane, Barhamgi, Mahmoud, Benslimane, Djamal

    Published in Annales des télécommunications (01-02-2014)
    “…In this paper, we present an approach to instrument a Simple Protocol And RDF Query Language query rewriting algorithm enforcing privacy preferences. The term…”
    Get full text
    Journal Article