Alert correlation in a cooperative intrusion detection framework F Cuppens, A Miege Proceedings 2002 IEEE symposium on security and privacy, 202-215, 2002 | 1180 | 2002 |
Organization based access control AA El Kalam, S Benferhat, R El Baida, P Balbiani, F Cuppens, Y Deswarte, ... null, 120, 2003 | 904* | 2003 |
Lambda: A language to model a database for detection of attacks F Cuppens, R Ortalo International Workshop on Recent Advances in Intrusion Detection, 197-216, 2000 | 497 | 2000 |
Managing alerts in a multi-intrusion detection environment F Cuppens Seventeenth Annual Computer Security Applications Conference, 22-31, 2001 | 452 | 2001 |
Reversible watermarking based on invariant image classification and dynamic histogram shifting G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux IEEE Transactions on information forensics and security 8 (1), 111-120, 2012 | 275 | 2012 |
Modelling contexts in the Or-BAC model F Cuppens, A Miege 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 243 | 2003 |
Fusion: General concepts and characteristics I Bloch, A Hunter, A Appriou, A Ayoun, S Benferhat, P Besnard, L Cholvy, ... International journal of intelligent systems 16 (10), 1107-1134, 2001 | 218 | 2001 |
Analyzing consistency of security policies L Cholvy, F Cuppens Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 201 | 1997 |
Modeling contextual security policies F Cuppens, N Cuppens-Boulahia International Journal of Information Security 7 (4), 285-305, 2008 | 199 | 2008 |
Complete analysis of configuration rules to guarantee reliable network security policies JG Alfaro, N Boulahia-Cuppens, F Cuppens International Journal of Information Security 7 (2), 103-122, 2008 | 190 | 2008 |
Cooperative Answering: A Methodology to Provide Intelligent Access to databases. F Cuppens, R Demolombe Expert Database Conf., 621-643, 1988 | 190 | 1988 |
A formal approach to specify and deploy a network security policy F Cuppens, N Cuppens-Boulahia, T Sans, A Miège IFIP World Computer Congress, TC 1, 203-218, 2004 | 172 | 2004 |
A service dependency model for cost-sensitive intrusion response N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 167 | 2010 |
High level conflict management strategies in advanced access control models F Cuppens, N Cuppens-Boulahia, MB Ghorbel Electronic Notes in Theoretical Computer Science 186, 3-26, 2007 | 154 | 2007 |
Efficient intrusion detection using principal component analysis Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault 3éme conférence sur la sécurité et architectures réseaux (SAR), La Londe …, 2004 | 133 | 2004 |
Neural networks vs. decision trees for intrusion detection Y Bouzida, F Cuppens IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM) 28, 29, 2006 | 128 | 2006 |
Administration model for or-bac F Cuppens, A Miège OTM Confederated International Conferences" On the Move to Meaningful …, 2003 | 121* | 2003 |
Nomad: A security model with non atomic actions and deadlines F Cuppens, N Cuppens-Boulahia, T Sans 18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005 | 116 | 2005 |
Correlation in an intrusion detection process F Cuppens, F Autrel, A Miege, S Benferhat SECI'02: Sécurité des Communications sur Internet, ., 2002 | 100 | 2002 |
A logical view of secure dependencies P Bieber, F Cuppens Journal of Computer Security 1 (1), 99-129, 1992 | 88 | 1992 |