Joaquin Garcia-Alfaro
Joaquin Garcia-Alfaro
Telecom SudParis, SAMOVAR, Institut Polytechnique de Paris
Verified email at - Homepage
Cited by
Cited by
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
Detection and removal of firewall misconfiguration
F Cuppens, NB Cuppens, J Garcia‐alfaro
2005 IASTED International Conference on Communication, Network and …, 2005
J3Gen: A PRNG for low-cost passive RFID
J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí
Sensors 13 (3), 3816-3830, 2013
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti
International Conference on Financial Cryptography and Data Security, 34-46, 2010
Analysis of policy anomalies on distributed network security setups
JG Alfaro, F Cuppens, N Cuppens-Boulahia
European Symposium on Research in Computer Security, 496-511, 2006
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
G Cervera, M Barbeau, J Garcia-Alfaro, E Kranakis
Journal of Network and Computer Applications 36 (2), 744-755, 2013
Dynamic risk management response system to handle cyber threats
G Gonzalez-Granadillo, S Dubus, A Motzek, J Garcia-Alfaro, E Alvarez, ...
Future Generation Computer Systems 83, 535-552, 2018
Secure localization of nodes in wireless sensor networks with limited number of truth tellers
JG Alfaro, M Barbeau, E Kranakis
2009 Seventh annual communication networks and services research conference …, 2009
MIRAGE: a management tool for the analysis and deployment of network security policies
J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Preda
Data Privacy Management and Autonomous Spontaneous Security, 203-215, 2010
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network
F Cuppens, F Autrel, Y Bouzida, J GARCIA, S Gombault, T Sans
Ann. Télécommun 61 (1-2), 2006
Misconfiguration management of network security components
F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro
arXiv preprint arXiv:1912.07283, 2019
Real-time malicious fast-flux detection using DNS and bot related features
S Martinez-Bea, S Castillo-Perez, J Garcia-Alfaro
2013 Eleventh Annual Conference on Privacy, Security and Trust, 369-372, 2013
A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags
J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí
Wireless personal communications 59 (1), 27-42, 2011
Handling stateful firewall anomalies
F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson
IFIP International Information Security Conference, 174-186, 2012
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation
J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro
Information and Communications Security, 297-304, 2004
Management of stateful firewall misconfiguration
J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Martinez, J Cabot
Computers & Security 39, 64-85, 2013
Dynamic deployment of context-aware access control policies for constrained security devices
S Preda, F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, L Toutain
Journal of Systems and Software 84 (7), 1144-1159, 2011
Model-driven security policy deployment: property oriented approach
S Preda, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro, L Toutain
International Symposium on Engineering Secure Software and Systems, 123-139, 2010
Location-free link state routing for underwater acoustic sensor networks
M Barbeau, S Blouin, G Cervera, J Garcia-Alfaro, E Kranakis
2015 IEEE 28th Canadian conference on electrical and computer engineering …, 2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index
G Gonzalez-Granadillo, J Garcia-Alfaro, E Alvarez, M El-Barbori, H Debar
Computers & Electrical Engineering 47, 13-34, 2015
The system can't perform the operation now. Try again later.
Articles 1–20