Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Boulahia Cuppens, Nora"'
Autor:
Mouël, Florian Le, Godon, Maxime, Brien, Renaud, Beurier, Erwan, Boulahia-Cuppens, Nora, Cuppens, Frédéric
Threshold cryptography has gained momentum in the last decades as a mechanism to protect long term secret keys. Rather than having a single secret key, this allows to distribute the ability to perform a cryptographic operation such as signing or encr
Externí odkaz:
http://arxiv.org/abs/2408.16137
Autor:
Merzouk, Mohamed Amine, Beurier, Erwan, Yaich, Reda, Boulahia-Cuppens, Nora, Cuppens, Frédéric
The escalating sophistication of cyberattacks has encouraged the integration of machine learning techniques in intrusion detection systems, but the rise of adversarial examples presents a significant challenge. These crafted perturbations mislead ML
Externí odkaz:
http://arxiv.org/abs/2406.17606
Autor:
Schott, Lucas, Delas, Josephine, Hajri, Hatem, Gherbi, Elies, Yaich, Reda, Boulahia-Cuppens, Nora, Cuppens, Frederic, Lamprier, Sylvain
Deep Reinforcement Learning (DRL) is an approach for training autonomous agents across various complex environments. Despite its significant performance in well known environments, it remains susceptible to minor conditions variations, raising concer
Externí odkaz:
http://arxiv.org/abs/2403.00420
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Navas, Renzo E., Cuppens, Frédéric, Boulahia Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.
Publikováno v:
In Computer Networks 14 March 2021 187
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ACM Computing Surveys
ACM Computing Surveys, 2022, 54 (6), pp.1-36. ⟨10.1145/3453153⟩
ACM Computing Surveys, 2022, 54 (6), pp.1-36. ⟨10.1145/3453153⟩
International audience; Ransomware remains an alarming threat in the 21 st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheles
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fb6ed7e2910e4d6e2beb04680479e17b
https://hal.science/hal-03672901
https://hal.science/hal-03672901
The use of firewalls is the dominant method to guarantee network access control, leading to distributed access control scenarios where the access control role is assigned to more than one component. Firewalls are network security components which pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______166::88eb23ef0411905a74f585b79b19d571
https://hal.science/hal-03628721
https://hal.science/hal-03628721
Publikováno v:
Detection of Intrusions & Malware & Vulnerability Assessment (9783540360148); 2006, p109-128, 20p
Publikováno v:
Detection of Intrusions & Malware & Vulnerability Assessment (9783540360148); 2006, p1-1, 1p