Observation of a threshold effect in the anomalous J/ψ suppression

MC Abreu, B Alessandro, C Alexa, R Arnaldi, J Astruc… - Physics Letters B, 1999 - Elsevier
We report on a search for a phase transition from ordinary nuclear matter to a state of
deconfined quarks and gluons as predicted by lattice QCD calculations. A new …

Complete analysis of configuration rules to guarantee reliable network security policies

JG Alfaro, N Boulahia-Cuppens, F Cuppens - International Journal of …, 2008 - Springer
The use of different network security components, such as firewalls and network intrusion
detection systems (NIDSs), is the dominant method to monitor and guarantee the security …

A formal approach to specify and deploy a network security policy

F Cuppens, N Cuppens-Boulahia, T Sans… - IFIP World Computer …, 2004 - Springer
Current firewall configuration languages have no well founded semantics. Each firewall
implements its own algorithm that parses specific proprietary languages. The main …

Diagnosis of scan path failures

S Edirisooriya, G Edirisooriya - Proceedings 13th IEEE VLSI …, 1995 - ieeexplore.ieee.org
Scan based diagnostic schemes are used to diagnose faults in faulty circuits. Such
techniques assume that the scan path itself is fault-free. However, the logic circuitry …

Detection and removal of firewall misconfiguration

F Cuppens, NB Cuppens, J Garcia‐alfaro - 2005 IASTED International …, 2005 - hal.science
To police network traffic, firewalls must be configured with a set of filtering rules. The
existence of errors in this set is very likely to degrade the network security policy. The …

Definition of a formal framework for specifying security policies. The Or-BAC model and extensions.

A Miege - 2005 - pastel.hal.science
This thesis presents a new access control model called Or-BAC (Organization-Based
Access Control). We aim at overcoming the limitations of the existing models while …

Aggregating and deploying network access control policies

JG Alfaro, F Cuppens… - … Reliability and Security …, 2007 - ieeexplore.ieee.org
The existence of errors or inconsistencies in the configuration of security components, such
as filtering routers and/or firewalls, may lead to weak access control policies-potentially easy …

[图书][B] Formal analysis of firewall policies

RM Marmorstein - 2008 - search.proquest.com
This dissertation describes a technique for formally analyzing a firewall security policy using
a quasi-reduced multiway decision diagram model. The analysis allows a system …

Data network security policies

P Moody, PA Watson - US Patent 8,495,721, 2013 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer
storage medium, for specifying a data network security policy. In one aspect, a system …

[PDF][PDF] THESIS/THÈSE

HT Vu - 2021 - researchportal.unamur.be
The thesis is entitled “Integration of Constraints into Dimensionality Reduction Methods for
Visualization”. The constraints here are different kinds of users' feedback when they interact …