Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Yosra Ben Mustapha"'
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319238289
SecureComm (1)
Proceedings SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks
SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks
SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278-286, ⟨10.1007/978-3-319-23829-6_20⟩
SecureComm (1)
Proceedings SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks
SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks
SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278-286, ⟨10.1007/978-3-319-23829-6_20⟩
International audience; As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4403092988e2ef7f52813ab3eb983c0d
https://doi.org/10.1007/978-3-319-23829-6_20
https://doi.org/10.1007/978-3-319-23829-6_20
Autor:
Hervé Debar, Yosra Ben Mustapha
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642405754
SSCC
SSCC
As computer and network security threats become more sophisticated and the number of service dependencies is increasing, optimal response decision is becoming a challenging task for security administrators. They should deploy and implement proper net
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d7f1b15c6a012417d941e78597f34650
https://doi.org/10.1007/978-3-642-40576-1_31
https://doi.org/10.1007/978-3-642-40576-1_31
Publikováno v:
International journal of electronic security and digital forensics
International journal of electronic security and digital forensics, Inderscience Publishers, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩
International Journal of Electronic Security and Digital Forensics
International journal of electronic security and digital forensics, Inderscience Publishers, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩
International Journal of Electronic Security and Digital Forensics
International audience; The management of security events, from the risk analysis, to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, the fact that network and system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d7bf0a67ff9560a000bf9838b3c12df
https://hal.archives-ouvertes.fr/hal-00724431
https://hal.archives-ouvertes.fr/hal-00724431
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642334474
ICGS3/e-Democracy
ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability
ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩
ICGS3/e-Democracy
ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability
ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩
International audience; The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8bac634883a252bf91c256c10730d64
https://doi.org/10.1007/978-3-642-33448-1_21
https://doi.org/10.1007/978-3-642-33448-1_21
Publikováno v:
International Conference Mathematical Methods, Models and Architectures for Computer Network Security
International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N
MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security"
MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩
Lecture Notes in Computer Science ISBN: 9783642337031
MMM-ACNS
International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N
MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security"
MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩
Lecture Notes in Computer Science ISBN: 9783642337031
MMM-ACNS
International audience; In SIEM environments, security analysts process massive amount of alerts often imprecise. Alert correlation has been designed to efficiently analyze these large volume of alerts. However, a major limitation of existing correla
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73b85785340debffec819a5f658b367f
https://hal.sorbonne-universite.fr/hal-00738459
https://hal.sorbonne-universite.fr/hal-00738459
Publikováno v:
Proceedings SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1-8, ⟨10.1109/SAR-SSI.2011.5931395⟩
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1-8, ⟨10.1109/SAR-SSI.2011.5931395⟩
International audience; The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b7672f36c36256fa11fa38bc094063d4
https://hal.archives-ouvertes.fr/hal-01301872
https://hal.archives-ouvertes.fr/hal-01301872
Publikováno v:
Proceedings ComNet 2010 : 2nd International Conference on Communications and Networking
2nd International Conference on Communications and Networking (ComNet 2010)
2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩
2nd International Conference on Communications and Networking (ComNet 2010)
2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩
International audience; Privacy in the digital world is a critical problem which is becoming even more imperious with the growth of the Internet, accompanied by the proliferation of e-services (e.g. ecommerce, e-health). One research track for effici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01dcea475d38fd9588cbca308f75a287
https://hal.archives-ouvertes.fr/hal-01306061/document
https://hal.archives-ouvertes.fr/hal-01306061/document