Search

Your search keyword '"Cuppens-Boulahia, Nora"' showing total 685 results

Search Constraints

Start Over You searched for: Author "Cuppens-Boulahia, Nora" Remove constraint Author: "Cuppens-Boulahia, Nora"
685 results on '"Cuppens-Boulahia, Nora"'

Search Results

1. Misconfiguration Management of Network Security Components

3. A Priority-Based Domain Type Enforcement for Exception Management

4. A Posteriori Analysis of Policy Temporal Compliance

5. A Certificate-Less Key Exchange Protocol for IoT

6. A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems

7. Optimal Distribution of Privacy Budget in Differential Privacy

8. Accountability in the A Posteriori Access Control: A Requirement and a Mechanism

9. Network Functions Virtualization Access Control as a Service

10. Norms and Deontic Logic

11. Security Analysis of WirelessHART Communication Scheme

12. Multi-Criteria Recommender Approach for Supporting Intrusion Response System

15. Detection and Response to Data Exfiltration from Internet of Things Android Devices

16. Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

17. Stratification Based Model for Security Policy with Exceptions and Contraries to Duty

18. Linking Differential Identifiability with Differential Privacy

19. USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework

20. Managing Delegation in Access Control Models

21. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator

22. Reliable Process for Security Policy Deployment

23. Aggregating and Deploying Network Access Control Policies

25. Detection of Side Channel Attacks Based on Data Tainting in Android Systems

26. wIDS: A Multilayer IDS for Wireless-Based SCADA Systems

27. DIscovery and REgistration Protocol : For Device and Person Identity Management in IoT

28. Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems

29. Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud

30. Security Issue of WirelessHART Based SCADA Systems

31. Context Aware Intrusion Response Based on Argumentation Logic

32. Security Mechanisms Planning to Enforce Security Policies

33. Building a Fair System Using Access Rights

34. Enabling Dynamic Security Policy in the Java Security Manager

35. Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks

36. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

37. Similarity Measure for Security Policies in Service Provider Selection

38. On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks

39. Adapted Quantization Index Modulation for Database Watermarking

40. Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps

41. Metric for Security Activities Assisted by Argumentative Logic

42. Using Requirements Engineering in an Automatic Security Policy Derivation Process

43. Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

44. Contextual Privacy Management in Extended Role Based Access Control Model

45. Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds

46. Specification and Deployment of Integrated Security Policies for Outsourced Data

47. ELITE: zEro Links Identity managemenT systEm

48. Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model

Catalog

Books, media, physical & digital resources