Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    Optimal Automated Generation of Playbooks

    Cyberattacks have become more complex and analysts need help managing all alerts promptly. Many organizations implement Security, Orchestration, Automation, and Response (SOAR) tools to automate Incident Respo...

    Kéren A. Saint-Hilaire, Christopher Neal in Data and Applications Security and Privacy… (2024)

  2. No Access

    Living Reference Work Entry In depth

    Cover Story

    Frédéric Cuppens, Nora Cuppens-Boulahia in Encyclopedia of Cryptography, Security and…

  3. No Access

    Chapter and Conference Paper

    Automated Enrichment of Logical Attack Graphs via Formal Ontologies

    Attack graphs represent the possible actions of adversaries to attack a system. Cybersecurity experts use them to make decisions concerning remediation and recovery plans. There are different attack graph-buil...

    Kéren Saint-Hilaire, Frédéric Cuppens in ICT Systems Security and Privacy Protection (2024)

  4. No Access

    Chapter and Conference Paper

    Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection

    The increasing complexity of cyberattacks has prompted researchers to keep pace with this trend by proposing automated cyberattack classification methods. Current research directions favor supervised learning ...

    Victor Aurora, Christopher Neal, Alexandre Proulx in Foundations and Practice of Security (2024)

  5. No Access

    Book and Conference Proceedings

    Computer Security. ESORICS 2023 International Workshops

    CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I

    Sokratis Katsikas, Frédéric Cuppens in Lecture Notes in Computer Science (2024)

  6. No Access

    Chapter and Conference Paper

    Automated Attacker Behaviour Classification Using Threat Intelligence Insights

    As the sophistication and occurrence of cyberattacks continues to rise, it is increasingly crucial for organizations to invest in threat intelligence. In this research, we propose a way to automate some part o...

    Pierre Crochelet, Christopher Neal in Foundations and Practice of Security (2024)

  7. No Access

    Book and Conference Proceedings

    Risks and Security of Internet and Systems

    18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers

    Abderrahim Ait Wakrime in Lecture Notes in Computer Science (2024)

  8. Article

    Foreword of the special issue on « FPS 2021» symposium

    Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont in Annals of Telecommunications (2023)

  9. Article

    Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures

    Ahmad Samer Wazan, Frédéric Cuppens in Annals of Telecommunications (2023)

  10. No Access

    Chapter and Conference Paper

    Trust Management Framework for Containerized Workloads Applications to 5G Networks

    As mobile networks grow, managing the security of communication between all its internal components becomes more challenging because of the increasing number of services, network functions, and stakeholders in...

    Aicha Miloudi, Luis Suárez in Applied Cryptography and Network Security … (2023)

  11. No Access

    Book and Conference Proceedings

    Computer Security. ESORICS 2022 International Workshops

    CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

    Sokratis Katsikas, Frédéric Cuppens in Lecture Notes in Computer Science (2023)

  12. No Access

    Book and Conference Proceedings

    Risks and Security of Internet and Systems

    17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers

    Slim Kallel, Mohamed Jmaiel in Lecture Notes in Computer Science (2023)

  13. No Access

    Article

    Investigating the practicality of adversarial evasion attacks on network intrusion detection

    As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise of adversarial examples, original data to which a ...

    Mohamed Amine Merzouk, Frédéric Cuppens in Annals of Telecommunications (2022)

  14. No Access

    Chapter and Conference Paper

    Attacker Attribution via Characteristics Inference Using Honeypot Data

    Increasingly, the computer networks supporting the operations of organizations face a higher quantity and sophistication of cyber-incidents. Due to the evolving complexity of these attacks, detection alone is ...

    Pierre Crochelet, Christopher Neal, Nora Boulahia Cuppens in Network and System Security (2022)

  15. No Access

    Book and Conference Proceedings

    Risks and Security of Internet and Systems

    16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers

    Bo Luo, Mohamed Mosbah in Lecture Notes in Computer Science (2022)

  16. No Access

    Chapter and Conference Paper

    A Priority-Based Domain Type Enforcement for Exception Management

    Network Function Virtualization (NFV) is introduced as a new methodology that offers several advantages such as the optimization of the resources and the improvement of network efficiency and performance. Howe...

    Manel Smine, David Espes, Nora Cuppens-Boulahia in Foundations and Practice of Security (2021)

  17. No Access

    Chapter and Conference Paper

    A Posteriori Access Control with an Administrative Policy

    The a posteriori access control is a particular type of access control in which security auditors tend to verify policy compliance by analyzing logs. However, in this type of access control, the investigations...

    Farah Dernaika, Nora Cuppens-Boulahia in Advances in Security, Networks, and Intern… (2021)

  18. No Access

    Chapter and Conference Paper

    A Deeper Analysis of Adversarial Examples in Intrusion Detection

    During the last decade, machine learning algorithms have massively integrated the defense arsenal made available to security professionals, especially for intrusion detection. However, and despite the progress...

    Mohamed Amine Merzouk, Frédéric Cuppens in Risks and Security of Internet and Systems (2021)

  19. No Access

    Chapter and Conference Paper

    A Posteriori Analysis of Policy Temporal Compliance

    The a posteriori access control is being more and more deployed especially in environments where more flexibility is needed when requesting access to information resources. To check if the security rules are b...

    Farah Dernaika, Nora Cuppens-Boulahia in Risks and Security of Internet and Systems (2021)

  20. No Access

    Book and Conference Proceedings

    Risks and Security of Internet and Systems

    14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings

    Slim Kallel, Frédéric Cuppens in Lecture Notes in Computer Science (2020)

previous disabled Page of 8