Zobrazeno 1 - 10
of 273
pro vyhledávání: '"Nora Cuppens"'
Publikováno v:
IEEE Access, Vol 9, Pp 46462-46475 (2021)
This paper is about the estimation of the cyber-resilience of CPS. We define two new resilience estimation metrics: $k$ -steerability and $\ell $ -monitorability. They aim at assisting designers to evaluate and increase the cyber-resilience of CPS wh
Externí odkaz:
https://doaj.org/article/48a134a23dbe4258ab973a1434d285c5
Publikováno v:
ACM Computing Surveys. 54:1-36
Ransomware remains an alarming threat in the 21st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheless, in recent years, the a
Publikováno v:
IEEE Access, Vol 9, Pp 46462-46475 (2021)
This paper is about the estimation of the cyber-resilience of CPS. We define two new resilience estimation metrics: $k$ -steerability and $\ell $ -monitorability. They aim at assisting designers to evaluate and increase the cyber-resilience of CPS wh
Publikováno v:
Journal of Surveillance, Security and Safety.
Aim: Data anonymization aims to enable data publishing without compromising the individuals’ privacy. The reidentification and sensitive information inference risks of a dataset are important factors in the decision-making process for the technique
Publikováno v:
ISIVC'2020: 10th International Symposium on Signal, Image, Video and Communications
ISIVC'2020: 10th International Symposium on Signal, Image, Video and Communications, Apr 2021, Saint-Étienne (virtual), France. ⟨10.1109/ISIVC49222.2021.9487550⟩
ISIVC
ISIVC'2020: 10th International Symposium on Signal, Image, Video and Communications, Apr 2021, Saint-Étienne (virtual), France. ⟨10.1109/ISIVC49222.2021.9487550⟩
ISIVC
International audience; We introduce an extension of the Random Distortion Testing (RDT) framework which allows its use when the noise variance is estimated. This asymptotic extension, named AsympRDT, shows that we asymptotically retain the level of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9c5b6f5a3112d6f6c1447f4683e0ab01
https://hal-imt-atlantique.archives-ouvertes.fr/hal-03238994
https://hal-imt-atlantique.archives-ouvertes.fr/hal-03238994
Autor:
Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Net
Autor:
Abderrahim Ait Wakrime, Guillermo Navarro-Arribas, Frédéric Cuppens, Nora Cuppens, Redouane Benaini
This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6–8, 2023. The 13 full papers and 2 short papers
Publikováno v:
Computer Networks
Computer Networks, Elsevier, 2021, 187, pp.107751. ⟨10.1016/j.comnet.2020.107751⟩
Computer Networks, 2021, 187, pp.107751. ⟨10.1016/j.comnet.2020.107751⟩
Computer Networks, Elsevier, 2021, 187, pp.107751. ⟨10.1016/j.comnet.2020.107751⟩
Computer Networks, 2021, 187, pp.107751. ⟨10.1016/j.comnet.2020.107751⟩
International audience; Wireless communication is a key technology for the Internet of Things (IoT).Due to its open nature, the physical layer of wireless systems is a high-priority target for an adversary whose goal is to disrupt the normal behavior
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12ea3719a089b65dc1a8166c51f01781
https://hal.archives-ouvertes.fr/hal-03088384v1/document
https://hal.archives-ouvertes.fr/hal-03088384v1/document
Publikováno v:
Foundations and Practice of Security ISBN: 9783030708801
FPS
FPS
Network Function Virtualization (NFV) is introduced as a new methodology that offers several advantages such as the optimization of the resources and the improvement of network efficiency and performance. However, potential security issues are an imp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c62033b952f45084dc0ccdf52b75646f
https://doi.org/10.1007/978-3-030-70881-8_5
https://doi.org/10.1007/978-3-030-70881-8_5
Publikováno v:
Advances in Security, Networks, and Internet of Things ISBN: 9783030710163
The a posteriori access control is a particular type of access control in which security auditors tend to verify policy compliance by analyzing logs. However, in this type of access control, the investigations are done after the occurrence of a log e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8ea5286655d58a2433bc22ff4a428347
https://doi.org/10.1007/978-3-030-71017-0_19
https://doi.org/10.1007/978-3-030-71017-0_19