Nora Cuppens

966 total citations
44 papers, 376 citations indexed

About

Nora Cuppens is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Nora Cuppens has authored 44 papers receiving a total of 376 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 15 papers in Signal Processing and 15 papers in Artificial Intelligence. Recurrent topics in Nora Cuppens's work include Network Security and Intrusion Detection (16 papers), Advanced Malware Detection Techniques (15 papers) and Information and Cyber Security (7 papers). Nora Cuppens is often cited by papers focused on Network Security and Intrusion Detection (16 papers), Advanced Malware Detection Techniques (15 papers) and Information and Cyber Security (7 papers). Nora Cuppens collaborates with scholars based in France, Canada and United States. Nora Cuppens's co-authors include Frédéric Cuppens, Joaquín García-Alfaro, Jean‐Louis Lanet, Georgios Z. Papadopoulos, Laurent Toutain, Pierre Bieber, Michel Barbeau, Wissam Mallouli, Ana Cavalli and Wei Pan and has published in prestigious journals such as IEEE Access, ACM Computing Surveys and IEEE Internet of Things Journal.

In The Last Decade

Nora Cuppens

38 papers receiving 357 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nora Cuppens France 10 251 142 142 135 51 44 376
Ang Cui United States 9 169 0.7× 136 1.0× 241 1.7× 216 1.6× 97 1.9× 16 395
Massimo Merro Italy 13 278 1.1× 78 0.5× 54 0.4× 256 1.9× 31 0.6× 45 485
Xing Gao United States 10 208 0.8× 157 1.1× 127 0.9× 193 1.4× 25 0.5× 30 399
Alok Tongaonkar United States 14 383 1.5× 96 0.7× 244 1.7× 312 2.3× 82 1.6× 24 496
Ke Tian United States 10 179 0.7× 199 1.4× 279 2.0× 195 1.4× 13 0.3× 35 443
Ihor Kuz Australia 12 264 1.1× 118 0.8× 84 0.6× 230 1.7× 152 3.0× 41 466
Jafar Haadi Jafarian United States 10 554 2.2× 163 1.1× 231 1.6× 265 2.0× 34 0.7× 26 641
Hartmut König Germany 8 185 0.7× 62 0.4× 51 0.4× 89 0.7× 35 0.7× 56 280
Adam Slagell United States 12 319 1.3× 109 0.8× 129 0.9× 219 1.6× 27 0.5× 24 449
Eduardo K. Viegas Brazil 13 458 1.8× 92 0.6× 289 2.0× 355 2.6× 15 0.3× 58 591

Countries citing papers authored by Nora Cuppens

Since Specialization
Citations

This map shows the geographic impact of Nora Cuppens's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nora Cuppens with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nora Cuppens more than expected).

Fields of papers citing papers by Nora Cuppens

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nora Cuppens. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nora Cuppens. The network helps show where Nora Cuppens may publish in the future.

Co-authorship network of co-authors of Nora Cuppens

This figure shows the co-authorship network connecting the top 25 collaborators of Nora Cuppens. A scholar is included among the top collaborators of Nora Cuppens based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nora Cuppens. Nora Cuppens is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Cuppens, Nora, et al.. (2025). Design of an Intelligent Trust Management Architecture for 5G Service Deployment. PolyPublie (École Polytechnique de Montréal). 310–317.
2.
Mosbah, Mohamed, Florence Sèdes, Nadia Tawbi, et al.. (2024). Foundations and Practice of Security. Lecture notes in computer science.
3.
Mosbah, Mohamed, Florence Sèdes, Nadia Tawbi, et al.. (2024). Foundations and Practice of Security. Lecture notes in computer science.
4.
Cuppens, Frédéric, et al.. (2023). Parameterizing poisoning attacks in federated learning-based intrusion detection. SPIRE - Sciences Po Institutional REpository. 1–8. 4 indexed citations
5.
Lambrinoudakis, Costas, Nora Cuppens, John Mylopoulos, et al.. (2022). Computer Security. ESORICS 2021 International Workshops. Lecture notes in computer science. 5 indexed citations
6.
Cuppens, Frédéric, et al.. (2022). Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. SPIRE - Sciences Po Institutional REpository. 1–6. 5 indexed citations
7.
Barbeau, Michel, et al.. (2021). Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access. 9. 46462–46475. 9 indexed citations
8.
Cuppens, Nora, et al.. (2021). A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. ACM Computing Surveys. 54(6). 1–36. 48 indexed citations
9.
Cuppens, Nora, et al.. (2020). Resilience properties and metrics: how far have we gone?. PolyPublie (École Polytechnique de Montréal). 6 indexed citations
10.
Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, et al.. (2020). Computer Security. Lecture notes in computer science. 2 indexed citations
11.
Cuppens, Frédéric, et al.. (2020). IANVS: A Moving Target Defense Framework for a Resilient Internet of Things. HAL (Le Centre pour la Communication Scientifique Directe). 1–6. 8 indexed citations
12.
Cuppens, Frédéric, et al.. (2020). MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet of Things Journal. 8(10). 7818–7832. 41 indexed citations
13.
Espès, David, et al.. (2019). DTE Access Control Model for Integrated ICS Systems. PolyPublie (École Polytechnique de Montréal). 1–9. 1 indexed citations
14.
Cuppens, Frédéric, Nora Cuppens, Costas Lambrinoudakis, et al.. (2019). Computer Security. Lecture notes in computer science. 6 indexed citations
15.
Fortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, et al.. (2018). Interoperability, Safety and Security in IoT. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 9 indexed citations
16.
Moataz, Tarik, Indrajit Ray, Indrakshi Ray, et al.. (2017). Substring search over encrypted data. Journal of Computer Security. 26(1). 1–30. 8 indexed citations
17.
Espès, David, et al.. (2016). Security analysis of WirelessHART communication scheme. SPIRE - Sciences Po Institutional REpository. 1 indexed citations
18.
Wang, Pan, et al.. (2010). An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. PubMed. 2010. 4740–4743. 12 indexed citations
19.
Pan, Wei, et al.. (2009). Comparison of some reversible watermarking methods in application to medical images. PubMed. 6. 2172–2175. 10 indexed citations
20.
Bieber, Pierre, et al.. (2002). Abstract machines for communication security. PolyPublie (École Polytechnique de Montréal). se 13. 137–146. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026