Zobrazeno 1 - 10
of 285
pro vyhledávání: '"Cuppens, Frédéric"'
Autor:
Mouël, Florian Le, Godon, Maxime, Brien, Renaud, Beurier, Erwan, Boulahia-Cuppens, Nora, Cuppens, Frédéric
Threshold cryptography has gained momentum in the last decades as a mechanism to protect long term secret keys. Rather than having a single secret key, this allows to distribute the ability to perform a cryptographic operation such as signing or encr
Externí odkaz:
http://arxiv.org/abs/2408.16137
Autor:
Merzouk, Mohamed Amine, Beurier, Erwan, Yaich, Reda, Boulahia-Cuppens, Nora, Cuppens, Frédéric
The escalating sophistication of cyberattacks has encouraged the integration of machine learning techniques in intrusion detection systems, but the rise of adversarial examples presents a significant challenge. These crafted perturbations mislead ML
Externí odkaz:
http://arxiv.org/abs/2406.17606
Autor:
Schott, Lucas, Delas, Josephine, Hajri, Hatem, Gherbi, Elies, Yaich, Reda, Boulahia-Cuppens, Nora, Cuppens, Frederic, Lamprier, Sylvain
Deep Reinforcement Learning (DRL) is an approach for training autonomous agents across various complex environments. Despite its significant performance in well known environments, it remains susceptible to minor conditions variations, raising concer
Externí odkaz:
http://arxiv.org/abs/2403.00420
Attack graphs provide a representation of possible actions that adversaries can perpetrate to attack a system. They are used by cybersecurity experts to make decisions, e.g., to decide remediation and recovery plans. Different approaches can be used
Externí odkaz:
http://arxiv.org/abs/2202.04016
Many companies and organizations use firewalls to control the access to their network infrastructure. Firewalls are network security components which provide means to filter traffic within corporate networks, as well as to police incoming and outcomi
Externí odkaz:
http://arxiv.org/abs/1912.07283
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Navas, Renzo E., Cuppens, Frédéric, Boulahia Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.
Publikováno v:
In Computer Networks 14 March 2021 187
Autor:
Cuppens, Frédéric, Gabillon, Alban
Publikováno v:
Data and Knowledge Engineering 37, 2 (2001) 177-201
In a multilevel database, cover stories are usually managed using the ambiguous technique of polyinstantiation. In this paper, we define a new technique to manage cover stories and propose a formal representation of a multilevel database containing c
Externí odkaz:
http://arxiv.org/abs/1405.5628
Publikováno v:
Proceedings of the 15th International Conference on Advanced Computing and Communication (ADCOM'07), 2007
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our b
Externí odkaz:
http://arxiv.org/abs/1012.2720
Autor:
Preda, Stere, Cuppens-Boulahia, Nora, Cuppens, Frederic, Garcia-Alfaro, Joaquin, Toutain, Laurent
Publikováno v:
Proc. 2007 International Conference on Security and Cryptography (Secrypt 2007), Barcelona, Spain, July 2007
We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify th
Externí odkaz:
http://arxiv.org/abs/0905.1362