D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 8,329 305 World Ranking 7431 National Ranking 314

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer security
  • Operating system
  • The Internet

His primary scientific interests are in Computer security, Security policy, Access control, Computer security model and Intrusion detection system. His research in Computer security intersects with topics in Dependency and Service. His Security policy study incorporates themes from Programming language, State, Deontic logic and The Internet.

His work on Role-based access control is typically connected to Delegation as part of general Access control study, connecting several disciplines of science. In his research, Dependency theory, Modal operator, Confidentiality and Theoretical computer science is intimately related to Permission, which falls under the overarching field of Computer security model. His Intrusion detection system research also works with subjects such as

  • False positive paradox which is related to area like Planning process,
  • Cluster analysis and related Alert correlation and Data security.

His most cited work include:

  • Alert correlation in a cooperative intrusion detection framework (664 citations)
  • Organization based access control (503 citations)
  • LAMBDA: A Language to Model a Database for Detection of Attacks (291 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Access control, Security policy, Computer security model and Intrusion detection system. The various areas that Frédéric Cuppens examines in his Computer security study include Security information and event management and Cloud computing security. His Access control study integrates concerns from other disciplines, such as Distributed computing, Workflow and Interoperability.

His work carried out in the field of Security policy brings together such families of science as Control, Deontic logic, Software deployment and Permission. His work deals with themes such as Information security, Information security standards and Security engineering, which intersect with Computer security model. His Security service research is multidisciplinary, relying on both Security through obscurity and Security testing.

He most often published in these fields:

  • Computer security (57.47%)
  • Access control (28.25%)
  • Security policy (25.00%)

What were the highlights of his more recent work (between 2013-2021)?

  • Computer security (57.47%)
  • Access control (28.25%)
  • Computer network (10.71%)

In recent papers he was focusing on the following fields of study:

Frédéric Cuppens spends much of his time researching Computer security, Access control, Computer network, Security policy and Cloud computing security. His Computer security research is multidisciplinary, incorporating elements of Android and Situation calculus. The Role-based access control research he does as part of his general Access control study is frequently linked to other disciplines of science, such as RDF query language and SPARQL, therefore creating a link between diverse domains of science.

His Security policy research includes elements of Data security, Network service, Argumentative, Intrusion response and Provisioning. In Cloud computing security, Frédéric Cuppens works on issues like Security service, which are connected to Security through obscurity and Security information and event management. His Computer security model research integrates issues from Information security standards and Security convergence.

Between 2013 and 2021, his most popular works were:

  • Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation (33 citations)
  • Software Defined Networking Reactive Stateful Firewall (12 citations)
  • Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems (12 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer security
  • Computer network

The scientist’s investigation covers issues in Computer security, Access control, Computer network, Security policy and Encryption. His Computer security model and Stateful firewall study in the realm of Computer security connects with subjects such as SCADA. His biological study spans a wide range of topics, including Security service, Network security policy, Cloud computing security, Argumentative and Intrusion response.

He has included themes like Rewriting, Instrumentation and Privacy software in his Access control study. The various areas that Frédéric Cuppens examines in his Computer network study include The Internet and Upgrade. His Security policy research includes elements of Data security and File format.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Alert correlation in a cooperative intrusion detection framework

F. Cuppens;A. Miege.
ieee symposium on security and privacy (2002)

1169 Citations

Organization based access control

A.A.E. Kalam;R.E. Baida;P. Balbiani;S. Benferhat.
ieee international workshop on policies for distributed systems and networks (2003)

854 Citations

LAMBDA: A Language to Model a Database for Detection of Attacks

Frédéric Cuppens;Rodolphe Ortalo.
recent advances in intrusion detection (2000)

485 Citations

Managing alerts in a multi-intrusion detection environment

F. Cuppens.
annual computer security applications conference (2001)

451 Citations

Modelling contexts in the Or-BAC model

F. Cuppens;A. Miege.
annual computer security applications conference (2003)

234 Citations

Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

G. Coatrieux;Wei Pan;N. Cuppens-Boulahia;F. Cuppens.
IEEE Transactions on Information Forensics and Security (2013)

231 Citations

Fusion: General concepts and characteristics

Isabelle Bloch;Anthony A. Hunter;Alain A. Appriou;Andr A. Ayoun.
International Journal of Intelligent Systems (2001)

212 Citations

Analyzing consistency of security policies

L. Cholvy;F. Cuppens.
ieee symposium on security and privacy (1997)

202 Citations

Cooperative Answering: A Methodology to Provide Intelligent Access to databases.

Frédéric Cuppens;Robert Demolombe.
Expert Database Conf. (1988)

192 Citations

Modeling contextual security policies

Frédéric Cuppens;Nora Cuppens-Boulahia.
International Journal of Information Security (2008)

191 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Frédéric Cuppens

Hervé Debar

Hervé Debar

Télécom SudParis

Publications: 37

Salem Benferhat

Salem Benferhat

Artois University

Publications: 30

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 27

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 20

Yves Le Traon

Yves Le Traon

University of Luxembourg

Publications: 18

Peng Ning

Peng Ning

Google (United States)

Publications: 16

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 14

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 14

Eric Jason Brandwine

Eric Jason Brandwine

Amazon (United States)

Publications: 13

Wesley W. Chu

Wesley W. Chu

University of California, Los Angeles

Publications: 12

Scott D. Stoller

Scott D. Stoller

Stony Brook University

Publications: 11

Henri Prade

Henri Prade

Paul Sabatier University

Publications: 11

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 10

Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

Publications: 9

Lingyu Wang

Lingyu Wang

Concordia University

Publications: 9

Paulo Veríssimo

Paulo Veríssimo

King Abdullah University of Science and Technology

Publications: 9

Trending Scientists

Benjamin Steinberg

Benjamin Steinberg

City College of New York

Meir Pachter

Meir Pachter

Air Force Institute of Technology

Frederick D. Lewis

Frederick D. Lewis

Northwestern University

Patrick Bertrand

Patrick Bertrand

Université Catholique de Louvain

Kenneth S. Vecchio

Kenneth S. Vecchio

University of California, San Diego

Eric Dumonteil

Eric Dumonteil

Tulane University

Helge Küster

Helge Küster

University of Hannover

Nancy Hogg

Nancy Hogg

Cancer Research UK London Research Institute

Dominique Bonnet

Dominique Bonnet

The Francis Crick Institute

Pilar Montero

Pilar Montero

University of Granada

John H. C. Gash

John H. C. Gash

Vrije Universiteit Amsterdam

Dietrich Althausen

Dietrich Althausen

Leibniz Association

Yimin Liu

Yimin Liu

Chinese Academy of Sciences

Kevin M. Spencer

Kevin M. Spencer

Harvard University

Joaquim Bellmunt

Joaquim Bellmunt

Beth Israel Deaconess Medical Center

Something went wrong. Please try again later.