Nora Cuppens

ORCID: 0000-0001-8792-0413
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Access Control and Trust
  • Smart Grid Security and Resilience
  • Cybercrime and Law Enforcement Studies
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Digital and Cyber Forensics
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Adversarial Robustness in Machine Learning
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Network Packet Processing and Optimization
  • Security in Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Data Visualization and Analytics
  • Spam and Phishing Detection
  • Distributed systems and fault tolerance
  • Energy Efficient Wireless Sensor Networks
  • Data Quality and Management
  • Cybersecurity and Cyber Warfare Studies
  • Opportunistic and Delay-Tolerant Networks

Polytechnique Montréal
2020-2025

Université de Montréal
2020-2024

IMT Atlantique
2017-2022

Université de Bretagne Occidentale
2009-2020

Laboratoire des Sciences et Techniques de l’Information de la Communication et de la Connaissance
2009-2020

Centre National de la Recherche Scientifique
2018-2020

Université Bretagne Loire
2018-2019

Gestion de l'Eau, Acteurs, Usages
2019

Institut Mines-Télécom
2009-2017

École nationale supérieure de techniques avancées Bretagne
2006-2017

Ransomware remains a modern trend. Attackers are still using cryptovirology forcing victims to pay. Notable attacks have been spreading since 2012, starting with Reveton's ransomware attack the more recent 2017 WannaCry, Petya and Bad Rabbit cyberattacks. This as Service (RaaS) can lure criminals into developing tools perform an without previous knowledge of cryptosystem itself. We present in this paper graph-based countermeasure detect malicious threads. It is new mechanism that doesn't...

10.1145/3230833.3234691 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2018-08-13

Nowadays, security policies are the key point of every modern infrastructure. The specification and testing such fundamental steps in development a secure system since any error set rules is likely to harm global security. To address both challenges, we propose framework specify test their implementation on system. Our makes it possible generate an automatic manner, sequences, order validate conformance policy. behavior specified using formal description technique based extended finite state...

10.1145/1266840.1266860 article EN 2007-06-20

In this article, we propose a new additive lossless watermarking scheme which identifies parts of the image that can be reversibly watermarked and conducts message embedding in conventional Haar wavelet transform coefficients. Our approach makes use an approximation signal is invariant to watermark addition for classifying order avoid over/underflows. The method has been tested on different sets medical images some usual natural test as Lena. Experimental result analysis conducted with...

10.1109/iembs.2010.5626621 article EN 2010-08-01

A security policy of an information system is a set requirements that correspond to permissions, prohibitions and obligations execute some actions when contextual conditions are satisfied. Traditional approaches consider the enforces its associated if only executed in this permitted by (if closed) or not prohibited open) every obligatory actually (no violation obligations). In paper, we investigate more sophisticated approach which specification compliant with even though may be violated....

10.1145/1314436.1314441 article EN 2007-11-02

Several reversible watermarking schemes have been proposed for images of sensitive content, like medical imaging, which any modification may affect their interpretation. In this work, we distinguish these methods according to the way watermark insertion is conducted: additive and substitutive. Some approaches tested on different sets issued from three distinct modalities: magnetic resonance images, positron emission tomography ultrasound imaging. Comparison analysis has conducted with...

10.1109/iembs.2009.5332425 article EN Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2009-09-01

Privacy is among the key challenges to data integration in many sectors, including healthcare, e-government, etc. The PAIRSE project aims at providing a flexible, looselycoupled and privacy-preserving system P2P environments. exploits recent Web standards technologies such asWeb services ontologies export from autonomous providers as reusable services, proposes use of service composition viable solution answer needs on fly. proposed new algorithms service/composition execution models that...

10.1145/2536669.2536677 article EN ACM SIGMOD Record 2013-10-17

Cyber Security data analysis is an important growing domain: more and visualization systems are offered to operators in order improve their threat detection performances or facilitate suspect behaviors characterization. As today trend regroup employees structures such as Operations Center (SOC) Computer Emergency Response Team (CERT), collaborative approach seems be relevant this context. We think that 3D Collaborative Virtual Environments (3DCVE) can used users Situational Awareness, they...

10.1109/3dcve.2018.8637109 preprint EN 2018-03-01
Coming Soon ...