Nora Cuppens
Orcid: 0000-0001-8792-0413Affiliations:
- Polytechnique Montréal, Department of IT and software engineering, QC, Canada
- IMT Atlantique, Department of Systems, Networks, Cybersecurity and Digital Law, Cesson-Sévigné, France
According to our database1,
Nora Cuppens
authored at least 250 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on polymtl.ca
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., December, 2024
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey.
CoRR, 2024
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
ACM Comput. Surv., 2022
Investigating the practicality of adversarial evasion attacks on network intrusion detection.
Ann. des Télécommunications, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT.
IEEE Internet Things J., 2021
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming.
Comput. Networks, 2021
IEEE Access, 2021
Proceedings of the 10th International Symposium on Signal, Image, Video and Communications, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Quality of Information and Communications Technology, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2020
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume I: Knowledge Representation, 2020
2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Int. J. Inf. Sec., 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform.
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense.
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Cooperative Design, Visualization, and Engineering, 2018
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.
Proceedings of the From Database to Cyber Security, 2018
Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform.
World Wide Web, 2016
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Towards a new generation of industrial firewalls: Operational-process aware filtering.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
J. Inf. Secur. Appl., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the International Conference on Protocol Engineering, 2015
Proceedings of the Digital Healthcare Empowering Europeans, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation.
IEEE Trans. Inf. Forensics Secur., 2014
J. Netw. Comput. Appl., 2014
Log content extraction engine based on ontology for the purpose of a posteriori access control.
Int. J. Knowl. Learn., 2014
EURASIP J. Inf. Secur., 2014
Privacy query rewriting algorithm instrumented by a privacy-aware access control model.
Ann. des Télécommunications, 2014
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting.
IEEE Trans. Inf. Forensics Secur., 2013
SIGMOD Rec., 2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Formal specification and management of security policies with collective group obligations.
J. Comput. Secur., 2013
Inf. Secur. Tech. Rep., 2013
Comput. Electr. Eng., 2013
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Model-Driven Engineering Languages and Systems, 2013
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices.
Proceedings of the Advances in Communication Networking, 2013
Proceedings of the Current Trends in Web Engineering, 2013
Proceedings of the 20st International Conference on Telecommunications, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the Advanced Information Systems Engineering, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Int. J. Secur. Softw. Eng., 2012
Bell Labs Tech. J., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
Proceedings of the Database Systems for Advanced Applications, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations.
Int. J. Mob. Comput. Multim. Commun., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Reversible watermarking based on invariant image classification and dynamical error histogram shifting.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Computer Security, 2010
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
Int. J. Inf. Comput. Secur., 2009
Proceedings of the Trust, 2009
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the CRiSIS 2009, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Interactivity for Reactive Access Control.
Proceedings of the SECRYPT 2008, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008
Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Proceedings of the CRiSIS '08, 2008
Proceedings of the CRiSIS '08, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
J. Comput. Virol., 2007
Ann. des Télécommunications, 2007
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
Proceedings of the Advances in Computer Science, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Computer Safety, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Computer Security, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the Advances in Computer Science, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Proceedings of the 6th Refinement Workshop, 1994
Proceedings of the Computer Security, 1994
1993
Multilevel Security in Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993