Frédéric Cuppens
Orcid: 0000-0003-1124-2200
According to our database1,
Frédéric Cuppens
authored at least 299 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., December, 2024
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey.
CoRR, 2024
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
Ann. des Télécommunications, August, 2023
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures.
Ann. des Télécommunications, April, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 34th International Workshop on Rapid System Prototyping, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Investigating the practicality of adversarial evasion attacks on network intrusion detection.
Ann. des Télécommunications, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT.
IEEE Internet Things J., 2021
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming.
Comput. Networks, 2021
IEEE Access, 2021
Proceedings of the 10th International Symposium on Signal, Image, Video and Communications, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Quality of Information and Communications Technology, 2020
Proceedings of the 11th International Conference on Network of the Future, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume I: Knowledge Representation, 2020
2019
Proceedings of the European Conference on Networks and Communications, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Int. J. Inf. Sec., 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense.
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.
Proceedings of the From Database to Cyber Security, 2018
Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform.
World Wide Web, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Towards a new generation of industrial firewalls: Operational-process aware filtering.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
J. Inf. Secur. Appl., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the International Conference on Protocol Engineering, 2015
Proceedings of the Digital Healthcare Empowering Europeans, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation.
IEEE Trans. Inf. Forensics Secur., 2014
J. Netw. Comput. Appl., 2014
Log content extraction engine based on ontology for the purpose of a posteriori access control.
Int. J. Knowl. Learn., 2014
EURASIP J. Inf. Secur., 2014
Privacy query rewriting algorithm instrumented by a privacy-aware access control model.
Ann. des Télécommunications, 2014
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting.
IEEE Trans. Inf. Forensics Secur., 2013
SIGMOD Rec., 2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Formal specification and management of security policies with collective group obligations.
J. Comput. Secur., 2013
Inf. Secur. Tech. Rep., 2013
Comput. Electr. Eng., 2013
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Model-Driven Engineering Languages and Systems, 2013
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices.
Proceedings of the Advances in Communication Networking, 2013
Proceedings of the Current Trends in Web Engineering, 2013
Proceedings of the 20st International Conference on Telecommunications, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the Database and Expert Systems Applications, 2013
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the Advanced Information Systems Engineering, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Int. J. Secur. Softw. Eng., 2012
Bell Labs Tech. J., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
Proceedings of the Database Systems for Advanced Applications, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations.
Int. J. Mob. Comput. Multim. Commun., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Reversible watermarking based on invariant image classification and dynamical error histogram shifting.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Computer Security, 2010
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
Int. J. Inf. Comput. Secur., 2009
Proceedings of the Trust, 2009
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the CRiSIS 2009, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Interactivity for Reactive Access Control.
Proceedings of the SECRYPT 2008, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008
Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Proceedings of the CRiSIS '08, 2008
Proceedings of the CRiSIS '08, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
J. Comput. Virol., 2007
Ann. des Télécommunications, 2007
Ann. des Télécommunications, 2007
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
Proceedings of the Advances in Computer Science, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Foreword.
Ann. des Télécommunications, 2006
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006
Ann. des Télécommunications, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Computer Safety, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Computer Security, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the Advances in Computer Science, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
AdOrBAC: an administration model for Or-BAC.
Comput. Syst. Sci. Eng., 2004
Ann. des Télécommunications, 2004
Health care and social inference systems: An unauthorized inference control based on fuzzy logic.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Sixteenth International Florida Artificial Intelligence Research Society Conference, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Recognizing Malicious Intention in an Intrusion Detection Process.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002
2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the Natural Language Processing and Information Systems, 2000
1999
1998
A Logical Formalization of Integrity Policies for Database Management Systems.
Proceedings of the Integrity and Internal Control in Information Systems, 1998
Proceedings of the Computer Security, 1998
SACADDOS: A Support Tool to Manage Multilevel Documents.
Proceedings of the Database Security XII: Status and Prospects, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the Foundations of Intelligent Systems, 10th International Symposium, 1997
Proceedings of the Sixth International Conference on Artificial Intelligence and Law, 1997
1996
Proceedings of the Deontic Logic, Agency and Normative Systems, 1996
A Logical Approach to Model a Multilevel Object-Oriented Database.
Proceedings of the Database Security Volume X, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
Formalisation de la Confidentialité dans une Base de Données à Objets.
Proceedings of the 12èmes Journées Bases de Données Avancées, 1996
1995
Proceedings of the Fifth International Conference on Artificial Intelligence and Law, 1995
Modelling a Multilevel Database with Temporal Downgrading Functionalities.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Proceedings of the Computer Security, 1994
Proceedings of the Computer Security, 1994
Providing Consistent Views in a Polyinstantiated Database.
Proceedings of the Database Security, 1994
1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Multilevel Security in Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
Decis. Support Syst., 1991
Logic Hints and Security in Relational Databases.
Proceedings of the Database Security, 1991
A Modal Logic Framework to Solve Aggregation Problems.
Proceedings of the Database Security, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
An Epistemic and Deontic Logic for Reasoning about Computer Security.
Proceedings of the ESORICS 90, 1990
1989
Inf. Syst., 1989
Un langage de requêtes pour obtenir des résponses intelligentes.
Proceedings of the Cinquièmes Journées Bases de Données Avancées, 1989
1988
Proceedings of the Third International Conference on Data and Knowledge Bases: Improving Usability and Responsiveness, 1988
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
Proceedings of the Expert Database Systems, 1988
Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives.
Proceedings of the Quatrièmes Journées Bases de Données Avancées, 1988