Search Results - "Cuppens, Frederic"
-
1
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics
Published in IEEE access (01-01-2021)“…This paper is about the estimation of the cyber-resilience of CPS. We define two new resilience estimation metrics: <inline-formula> <tex-math…”
Get full text
Journal Article -
2
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures
Published in Annales des télécommunications (2023)Get full text
Journal Article -
3
Investigating the practicality of adversarial evasion attacks on network intrusion detection
Published in Annales des télécommunications (01-12-2022)“…As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise…”
Get full text
Journal Article -
4
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
Published in IEEE transactions on information forensics and security (01-01-2013)“…In this paper, we propose a new reversible watermarking scheme. One first contribution is a histogram shifting modulation which adaptively takes care of the…”
Get full text
Journal Article -
5
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2021)“…Wireless communication is a key technology for the Internet of Things (IoT). Due to its open nature, the physical layer of wireless systems is a high-priority…”
Get full text
Journal Article -
6
Adversarial robustness of deep reinforcement learning-based intrusion detection
Published in International journal of information security (01-12-2024)“…Machine learning techniques, including Deep Reinforcement Learning (DRL), enhance intrusion detection systems by adapting to new threats. However, DRL’s…”
Get full text
Journal Article -
7
Foreword of the special issue on « FPS 2021» symposium
Published in Annales des télécommunications (01-08-2023)Get full text
Journal Article -
8
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT
Published in IEEE internet of things journal (15-05-2021)“…Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems…”
Get full text
Journal Article -
9
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation
Published in IEEE transactions on information forensics and security (01-03-2014)“…In this paper, we adapt the robust reversible watermarking modulation originally proposed by Vleeschouwer for images to the protection of relational databases…”
Get full text
Journal Article -
10
Modeling contextual security policies
Published in International journal of information security (01-08-2008)“…As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based…”
Get full text
Journal Article -
11
Management of stateful firewall misconfiguration
Published in Computers & security (01-11-2013)“…Firewall configurations are evolving into dynamic policies that depend on protocol states. As a result, stateful configurations tend to be much more error…”
Get full text
Journal Article -
12
Formal enforcement and management of obligation policies
Published in Data & knowledge engineering (2012)“…Obligations are generally actions that users are required to take and are essential for the expression of a large number of requirements. For instance,…”
Get full text
Journal Article -
13
Alert correlation in a cooperative intrusion detection framework
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (2002)“…This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module…”
Get full text
Conference Proceeding Journal Article -
14
Deployment of a posteriori access control using IHE ATNA
Published in International journal of information security (01-10-2015)“…In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control…”
Get full text
Journal Article -
15
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform
Published in World wide web (Bussum) (01-01-2016)“…Radio Frequency IDentification (RFID) technology offers a new way of automating the identification and storing of information in RFID tags. The emerging…”
Get full text
Journal Article -
16
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things
Published in 2020 IEEE Symposium on Computers and Communications (ISCC) (01-07-2020)“…The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the…”
Get full text
Conference Proceeding -
17
Dynamic deployment of context-aware access control policies for constrained security devices
Published in The Journal of systems and software (01-07-2011)“…Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when…”
Get full text
Journal Article -
18
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Published in Journal of network and computer applications (01-03-2014)“…The EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains…”
Get full text
Journal Article -
19
Mining a high level access control policy in a network with multiple firewalls
Published in Journal of information security and applications (01-02-2015)“…A policy mining approach that aims to automatically extract a high level of abstraction policy from the rules configured on a firewall has been recently…”
Get full text
Journal Article -
20
Privacy query rewriting algorithm instrumented by a privacy-aware access control model
Published in Annales des télécommunications (01-02-2014)“…In this paper, we present an approach to instrument a Simple Protocol And RDF Query Language query rewriting algorithm enforcing privacy preferences. The term…”
Get full text
Journal Article