BibTeX records: Hervé Debar

download as .bib file

@inproceedings{DBLP:conf/IEEEares/Abbas-Escribano23,
  author       = {Marwan Abbas{-}Escribano and
                  Herv{\'{e}} Debar},
  title        = {An Improved Honeypot Model for Attack Detection and Analysis},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {142:1--142:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3604993},
  doi          = {10.1145/3600160.3604993},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Abbas-Escribano23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-10139,
  author       = {Konstantinos Lampropoulos and
                  Apostolis Zarras and
                  Eftychia Lakka and
                  Polyanthi Barmpaki and
                  Kostas Drakonakis and
                  Manos Athanatos and
                  Herv{\'{e}} Debar and
                  Andreas Alexopoulos and
                  Aristeidis Sotiropoulos and
                  George Tsakirakis and
                  Nikos Dimakopoulos and
                  Dimitris Tsolovos and
                  Matthias Pocs and
                  Michalis Smyrlis and
                  Ioannis Basdekis and
                  Georgios Spanoudakis and
                  Ovidiu Mihaila and
                  Bogdan Prelipcean and
                  Eliot Salant and
                  Sotiris Athanassopoulos and
                  Petros Papachristou and
                  Ioannis Ladakis and
                  John Chang and
                  Evangelos Floros and
                  Konstantinos Smyrlis and
                  Rouven Besters and
                  Pietro Randine and
                  Karianna Fjeld Lovaas and
                  John Cooper and
                  Iulia Ilie and
                  Gabriel Danciu and
                  Marwan Darwish Khabbaz},
  title        = {White paper on cybersecurity in the healthcare sector. The {HEIR}
                  solution},
  journal      = {CoRR},
  volume       = {abs/2310.10139},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.10139},
  doi          = {10.48550/ARXIV.2310.10139},
  eprinttype    = {arXiv},
  eprint       = {2310.10139},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-10139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RasoamananaLD22,
  author       = {Aina Toky Rasoamanana and
                  Olivier Levillain and
                  Herv{\'{e}} Debar},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Towards a Systematic and Automatic Use of State Machine Inference
                  to Uncover Security Flaws and Fingerprint {TLS} Stacks},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {637--657},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_31},
  doi          = {10.1007/978-3-031-17143-7\_31},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RasoamananaLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/ShahidD21,
  author       = {Mustafizur R. Shahid and
                  Herv{\'{e}} Debar},
  editor       = {M. Arif Wani and
                  Ishwar K. Sethi and
                  Weisong Shi and
                  Guangzhi Qu and
                  Daniela Stan Raicu and
                  Ruoming Jin},
  title        = {{CVSS-BERT:} Explainable Natural Language Processing to Determine
                  the Severity of a Computer Security Vulnerability from its Description},
  booktitle    = {20th {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2021, Pasadena, CA, USA, December 13-16, 2021},
  pages        = {1600--1607},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICMLA52953.2021.00256},
  doi          = {10.1109/ICMLA52953.2021.00256},
  timestamp    = {Tue, 01 Feb 2022 17:24:07 +0100},
  biburl       = {https://dblp.org/rec/conf/icmla/ShahidD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2021-1,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9},
  doi          = {10.1007/978-3-030-90019-9},
  isbn         = {978-3-030-90018-2},
  timestamp    = {Thu, 04 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2021-2,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {399},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90022-9},
  doi          = {10.1007/978-3-030-90022-9},
  isbn         = {978-3-030-90021-2},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08510,
  author       = {Mustafizur R. Shahid and
                  Herv{\'{e}} Debar},
  title        = {{CVSS-BERT:} Explainable Natural Language Processing to Determine
                  the Severity of a Computer Security Vulnerability from its Description},
  journal      = {CoRR},
  volume       = {abs/2111.08510},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08510},
  eprinttype    = {arXiv},
  eprint       = {2111.08510},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08510.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoutignyBBLDJ20,
  author       = {Fran{\c{c}}ois Boutigny and
                  St{\'{e}}phane Betg{\'{e}}{-}Brezetz and
                  Gregory Blanc and
                  Antoine Lavignotte and
                  Herv{\'{e}} Debar and
                  Houda Jmila},
  title        = {Solving security constraints for 5G slice embedding: {A} proof-of-concept},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101662},
  doi          = {10.1016/J.COSE.2019.101662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoutignyBBLDJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DebarBT20,
  author       = {Herv{\'{e}} Debar and
                  Razvan Beuran and
                  Yasuo Tan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Quantitative Study of Vulnerabilities in the Internet of Medical
                  Things},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {164--175},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009105801640175},
  doi          = {10.5220/0009105801640175},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DebarBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/AguasLBD20,
  author       = {Elkin Aguas and
                  Anthony Lambert and
                  Gr{\'{e}}gory Blanc and
                  Herv{\'{e}} Debar},
  title        = {Automated Saturation Mitigation Controlled by Deep Reinforcement Learning},
  booktitle    = {28th {IEEE} International Conference on Network Protocols, {ICNP}
                  2020, Madrid, Spain, October 13-16, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICNP49622.2020.9259356},
  doi          = {10.1109/ICNP49622.2020.9259356},
  timestamp    = {Tue, 24 Nov 2020 11:13:22 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/AguasLBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/ShahidBJZD20,
  author       = {Mustafizur R. Shahid and
                  Gregory Blanc and
                  Houda Jmila and
                  Zonghua Zhang and
                  Herv{\'{e}} Debar},
  title        = {Generative Deep Learning for Internet of Things Network Traffic Generation},
  booktitle    = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2020, Perth, Australia, December 1-4, 2020},
  pages        = {70--79},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PRDC50213.2020.00018},
  doi          = {10.1109/PRDC50213.2020.00018},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/ShahidBJZD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KiennertIDL19,
  author       = {Christophe Kiennert and
                  Ziad Ismail and
                  Herv{\'{e}} Debar and
                  Jean Leneutre},
  title        = {A Survey on Game-Theoretic Approaches for Intrusion Detection and
                  Response Optimization},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {5},
  pages        = {90:1--90:31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3232848},
  doi          = {10.1145/3232848},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KiennertIDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BajanKD19,
  author       = {Pierre{-}Marie Bajan and
                  Christophe Kiennert and
                  Herv{\'{e}} Debar},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Methodology of a Network Simulation in the Context of an Evaluation:
                  Application to an {IDS}},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {378--388},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007378603780388},
  doi          = {10.5220/0007378603780388},
  timestamp    = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BajanKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/ShahidBZD19,
  author       = {Mustafizur R. Shahid and
                  Gregory Blanc and
                  Zonghua Zhang and
                  Herv{\'{e}} Debar},
  editor       = {Aris Gkoulalas{-}Divanis and
                  Mirco Marchetti and
                  Dimiter R. Avresky},
  title        = {Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders},
  booktitle    = {18th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2019, Cambridge, MA, USA, September 26-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NCA.2019.8935007},
  doi          = {10.1109/NCA.2019.8935007},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/ShahidBZD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-11831,
  author       = {Mustafizur Rahman Shahid and
                  Gregory Blanc and
                  Zonghua Zhang and
                  Herv{\'{e}} Debar},
  title        = {Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders},
  journal      = {CoRR},
  volume       = {abs/1912.11831},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.11831},
  eprinttype    = {arXiv},
  eprint       = {1912.11831},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-11831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GranadilloDMGAM18,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Samuel Dubus and
                  Alexander Motzek and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Ender Alvarez and
                  Matteo Merialdo and
                  Serge Papillon and
                  Herv{\'{e}} Debar},
  title        = {Dynamic risk management response system to handle cyber threats},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {83},
  pages        = {535--552},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.05.043},
  doi          = {10.1016/J.FUTURE.2017.05.043},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/GranadilloDMGAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/ShahidBZD18,
  author       = {Mustafizur R. Shahid and
                  Gregory Blanc and
                  Zonghua Zhang and
                  Herv{\'{e}} Debar},
  editor       = {Naoki Abe and
                  Huan Liu and
                  Calton Pu and
                  Xiaohua Hu and
                  Nesreen K. Ahmed and
                  Mu Qiao and
                  Yang Song and
                  Donald Kossmann and
                  Bing Liu and
                  Kisung Lee and
                  Jiliang Tang and
                  Jingrui He and
                  Jeffrey S. Saltz},
  title        = {IoT Devices Recognition Through Network Traffic Analysis},
  booktitle    = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
                  Seattle, WA, USA, December 10-13, 2018},
  pages        = {5187--5192},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigData.2018.8622243},
  doi          = {10.1109/BIGDATA.2018.8622243},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/ShahidBZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BoutignyBDBLP18,
  author       = {Fran{\c{c}}ois Boutigny and
                  St{\'{e}}phane Betg{\'{e}}{-}Brezetz and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}gory Blanc and
                  Antoine Lavignotte and
                  Ion Popescu},
  title        = {Multi-Provider Secure Virtual Network Embedding},
  booktitle    = {9th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2018, Paris, France, February 26-28, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NTMS.2018.8328706},
  doi          = {10.1109/NTMS.2018.8328706},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/BoutignyBDBLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SahayBZD17,
  author       = {Rishikesh Sahay and
                  Gregory Blanc and
                  Zonghua Zhang and
                  Herv{\'{e}} Debar},
  title        = {ArOMA: An {SDN} based autonomic DDoS mitigation framework},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {482--499},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.07.008},
  doi          = {10.1016/J.COSE.2017.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SahayBZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MotzekGDGM17,
  author       = {Alexander Motzek and
                  Gustavo {Gonzalez Granadillo} and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Ralf M{\"{o}}ller},
  title        = {Selection of Pareto-efficient response plans based on financial and
                  operational assessments},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {12},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0063-6},
  doi          = {10.1186/S13635-017-0063-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MotzekGDGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GranadilloGD17,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Herv{\'{e}} Debar},
  title        = {A polytope-based approach to measure the impact of events against
                  critical infrastructures},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {83},
  number       = {1},
  pages        = {3--21},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.02.004},
  doi          = {10.1016/J.JCSS.2016.02.004},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GranadilloGD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/SahayBZTD17,
  author       = {Rishikesh Sahay and
                  Gregory Blanc and
                  Zonghua Zhang and
                  Khalifa Toumi and
                  Herv{\'{e}} Debar},
  editor       = {Marc Lacoste and
                  Fernando Ramos},
  title        = {Adaptive Policy-driven Attack Mitigation in {SDN}},
  booktitle    = {Proceedings of the 1st International Workshop on Security and Dependability
                  of Multi-Domain Infrastructures, XDOMO'17, Belgrade, Serbia, April
                  23-26, 2017},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3071064.3071068},
  doi          = {10.1145/3071064.3071068},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/SahayBZTD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17,
  author       = {Maxim Kolomeec and
                  Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Herv{\'{e}} Debar},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Choosing Models for Security Metrics Visualization},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_7},
  doi          = {10.1007/978-3-319-65127-9\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-06073,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {An n-sided polygonal model to calculate the impact of cyber security
                  events},
  journal      = {CoRR},
  volume       = {abs/1711.06073},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.06073},
  eprinttype    = {arXiv},
  eprint       = {1711.06073},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-06073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GranadilloMGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Alexander Motzek and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {Selection of Mitigation Actions Based on Financial and Operational
                  Impact Assessments},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.3},
  doi          = {10.1109/ARES.2016.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GranadilloMGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SalaunDD16,
  author       = {Micka{\"{e}}l Sala{\"{u}}n and
                  Marion Daubignard and
                  Herv{\'{e}} Debar},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {StemJail: Dynamic Role Compartmentalization},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {865--876},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897912},
  doi          = {10.1145/2897845.2897912},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SalaunDD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/GranadilloGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {An n-Sided Polygonal Model to Calculate the Impact of Cyber Security
                  Events},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_7},
  doi          = {10.1007/978-3-319-54876-0\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/GranadilloGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YungDG16,
  author       = {Jonathan Yung and
                  Herv{\'{e}} Debar and
                  Louis Granboulan},
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Security Issues and Mitigation in Ethernet {POWERLINK}},
  booktitle    = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61437-3\_6},
  doi          = {10.1007/978-3-319-61437-3\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YungDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AguessyBBCD16,
  author       = {Fran{\c{c}}ois{-}Xavier Aguessy and
                  Olivier Bettan and
                  Gregory Blanc and
                  Vania Conan and
                  Herv{\'{e}} Debar},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Hybrid Risk Assessment Model Based on Bayesian Networks},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_2},
  doi          = {10.1007/978-3-319-44524-3\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GranadilloAMMGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Ender Alvarez and
                  Alexander Motzek and
                  Matteo Merialdo and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Towards an Automated and Dynamic Risk Management Response System},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {37--53},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_3},
  doi          = {10.1007/978-3-319-47560-8\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GranadilloAMMGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FabreDVB16,
  author       = {Pierre{-}Edouard Fabre and
                  Herv{\'{e}} Debar and
                  Jouni Viinikka and
                  Gr{\'{e}}gory Blanc},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {{ML:} DDoS Damage Control with {MPLS}},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {101--116},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_7},
  doi          = {10.1007/978-3-319-47560-8\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/FabreDVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/GranadilloED16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Mohammed El{-}Barbori and
                  Herv{\'{e}} Debar},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {New Types of Alert Correlation for Security Information and Event
                  Management Systems},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792462},
  doi          = {10.1109/NTMS.2016.7792462},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/GranadilloED16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Jose Rubio{-}Hernan and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {Considering Internal Vulnerabilities and the Attacker's Knowledge
                  to Model the Impact of Cyber Events as Geometrical Prisms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {340--348},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0082},
  doi          = {10.1109/TRUSTCOM.2016.0082},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AguessyBBCD16,
  author       = {Fran{\c{c}}ois{-}Xavier Aguessy and
                  Olivier Bettan and
                  Gr{\'{e}}gory Blanc and
                  Vania Conan and
                  Herv{\'{e}} Debar},
  title        = {Bayesian Attack Model for Dynamic Risk Assessment},
  journal      = {CoRR},
  volume       = {abs/1606.09042},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.09042},
  eprinttype    = {arXiv},
  eprint       = {1606.09042},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AguessyBBCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/GranadilloGAED15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ender Alvarez and
                  Mohammed El{-}Barbori and
                  Herv{\'{e}} Debar},
  title        = {Selecting optimal countermeasures for attacks against critical systems
                  using the attack volume model and the {RORI} index},
  journal      = {Comput. Electr. Eng.},
  volume       = {47},
  pages        = {13--34},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.compeleceng.2015.07.023},
  doi          = {10.1016/J.COMPELECENG.2015.07.023},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/GranadilloGAED15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BelhaouaneGD15,
  author       = {Malek Belhaouane and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {On the Isofunctionality of Network Access Control Lists},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {168--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.78},
  doi          = {10.1109/ARES.2015.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BelhaouaneGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LevillainGD15,
  author       = {Olivier Levillain and
                  Baptiste Gourdin and
                  Herv{\'{e}} Debar},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {{TLS} Record Protocol: Security Analysis and Defense-in-depth Countermeasures
                  for {HTTPS}},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {225--236},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714592},
  doi          = {10.1145/2714576.2714592},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LevillainGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/GranadilloJD15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {Attack Volume Model: Geometrical Approach and Application},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_15},
  doi          = {10.1007/978-3-319-31811-0\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/GranadilloJD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar and
                  Christophe Ponchel and
                  Laura Rodriguez Martin},
  editor       = {Mohamad Badra and
                  Azzedine Boukerche and
                  Pascal Urien},
  title        = {Considering technical and financial impact in the selection of security
                  countermeasures against Advanced Persistent Threats (APTs)},
  booktitle    = {7th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2015, Paris, France, July 27-29, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NTMS.2015.7266480},
  doi          = {10.1109/NTMS.2015.7266480},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/GranadilloGDPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KheirBDGY15,
  author       = {Nizar Kheir and
                  Gregory Blanc and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Dingqi Yang},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Automated Classification of C{\&}C Connections Through Malware
                  {URL} Clustering},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_17},
  doi          = {10.1007/978-3-319-18467-8\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KheirBDGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelhaouaneGD15,
  author       = {Malek Belhaouane and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Evaluating the Comprehensive Complexity of Authorization-based Access
                  Control Policies using Quantitative Metrics},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {53--64},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005544100530064},
  doi          = {10.5220/0005544100530064},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelhaouaneGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GranadilloGD15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using a 3D Geometrical Model to Improve Accuracy in the Evaluation
                  and Selection of Countermeasures Against Complex Cyber Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {538--555},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_29},
  doi          = {10.1007/978-3-319-28865-9\_29},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GranadilloGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GranadilloBDJ14,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Malek Belhaouane and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob},
  title        = {RORI-based countermeasure selection using the OrBAC formalism},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {1},
  pages        = {63--79},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0207-8},
  doi          = {10.1007/S10207-013-0207-8},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GranadilloBDJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/PukkawannaBGKD14,
  author       = {Sirikarn Pukkawanna and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Youki Kadobayashi and
                  Herv{\'{e}} Debar},
  title        = {Classification of {SSL} Servers based on their {SSL} Handshake for
                  Automated Security Assessment},
  booktitle    = {Third International Workshop on Building Analysis Datasets and Gathering
                  Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland,
                  September 11, 2014},
  pages        = {30--39},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BADGERS.2014.10},
  doi          = {10.1109/BADGERS.2014.10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/badgers/PukkawannaBGKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MustaphaDB14,
  author       = {Yosra Ben Mustapha and
                  Herv{\'{e}} Debar and
                  Gregory Blanc},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Policy Enforcement Point Model},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {278--286},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_20},
  doi          = {10.1007/978-3-319-23829-6\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/MustaphaDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/GranadilloPBD14,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Christophe Ponchel and
                  Gregory Blanc and
                  Herv{\'{e}} Debar},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  G{\"{u}}rkan G{\"{u}}r},
  title        = {Combining Technical and Financial Impacts for Countermeasure Selection},
  booktitle    = {Proceedings 2014 International Workshop on Advanced Intrusion Detection
                  and Prevention, {AIDP} 2014, Marrakesh, Morocco, June 2014},
  series       = {{EPTCS}},
  volume       = {165},
  pages        = {1--14},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.165.1},
  doi          = {10.4204/EPTCS.165.1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/GranadilloPBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/LevillainDM13,
  author       = {Olivier Levillain and
                  Herv{\'{e}} Debar and
                  Benjamin Morin},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {Parsifal: Writing efficient and robust binary parsers, quickly},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766344},
  doi          = {10.1109/CRISIS.2013.6766344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/LevillainDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccit/DassoukiDSH13,
  author       = {Khaled Dassouki and
                  Herv{\'{e}} Debar and
                  Ha{\"{\i}}dar Safa and
                  Abbas Hijazi},
  title        = {A {TCP} delay-based mechanism for detecting congestion in the Internet},
  booktitle    = {Third International Conference on Communications and Information Technology,
                  {ICCIT} 2013, Beirut, Lebanon, June 19-21, 2013},
  pages        = {141--145},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCITechnology.2013.6579538},
  doi          = {10.1109/ICCITECHNOLOGY.2013.6579538},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccit/DassoukiDSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HachemGD13,
  author       = {Nabil Hachem and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {An Adaptive Mitigation Framework for Handling Suspicious Network Flows
                  via {MPLS} Policies},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_20},
  doi          = {10.1007/978-3-642-41488-6\_20},
  timestamp    = {Sun, 02 Jun 2019 21:12:28 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HachemGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/MustaphaD13,
  author       = {Yosra Ben Mustapha and
                  Herv{\'{e}} Debar},
  editor       = {Sabu M. Thampi and
                  Pradeep K. Atrey and
                  Chun{-}I Fan and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical
                  Colored Petri Net},
  booktitle    = {Security in Computing and Communications - International Symposium,
                  {SSCC} 2013, Mysore, India, August 22-24, 2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {377},
  pages        = {313--321},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40576-1\_31},
  doi          = {10.1007/978-3-642-40576-1\_31},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sscc/MustaphaD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WazanBDG13,
  author       = {Ahmad Samer Wazan and
                  Gregory Blanc and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Attribute-Based Mining Process for the Organization-Based Access Control
                  Model},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {421--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.53},
  doi          = {10.1109/TRUSTCOM.2013.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WazanBDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranadilloMHD12,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Yosra Ben Mustapha and
                  Nabil Hachem and
                  Herv{\'{e}} Debar},
  title        = {An ontology-driven approach to model {SIEM} information and operations
                  using the {SWRL} formalism},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {104--123},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048412},
  doi          = {10.1504/IJESDF.2012.048412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GranadilloMHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LevillainEMD12,
  author       = {Olivier Levillain and
                  Arnaud {\'{E}}balard and
                  Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Robert H'obbes' Zakon},
  title        = {One year of {SSL} internet measurement},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420953},
  doi          = {10.1145/2420950.2420953},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/BernardDB12,
  author       = {Catherine Bernard and
                  Herv{\'{e}} Debar and
                  Salim Benayoune},
  title        = {Cross-domain vulnerabilities over social networks},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {8--13},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412370},
  doi          = {10.1109/CASON.2012.6412370},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/BernardDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/WaillyLD12,
  author       = {Aur{\'{e}}lien Wailly and
                  Marc Lacoste and
                  Herv{\'{e}} Debar},
  editor       = {Dejan S. Milojicic and
                  Dongyan Xu and
                  Vanish Talwar},
  title        = {{VESPA:} multi-layered self-protection for cloud resources},
  booktitle    = {9th International Conference on Autonomic Computing, ICAC'12, San
                  Jose, CA, USA, September 16 - 20, 2012},
  pages        = {155--160},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2371536.2371564},
  doi          = {10.1145/2371536.2371564},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/WaillyLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/HachemDG12,
  author       = {Nabil Hachem and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{HADEGA:} {A} novel MPLS-based mitigation solution to handle network
                  attacks},
  booktitle    = {31st {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2012, Austin, TX, USA, December 1-3, 2012},
  pages        = {171--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PCCC.2012.6407750},
  doi          = {10.1109/PCCC.2012.6407750},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/HachemDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob and
                  Chrystel Gaber and
                  Mohammed Achemlal},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Individual Countermeasure Selection Based on the Return On Response
                  Investment Index},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_14},
  doi          = {10.1007/978-3-642-33704-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12,
  author       = {Yosra Ben Mustapha and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_18},
  doi          = {10.1007/978-3-642-33704-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/RiekePDDH12,
  author       = {Roland Rieke and
                  Elsa Prieto and
                  Rodrigo Diaz and
                  Herv{\'{e}} Debar and
                  Andrew Hutchison},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  title        = {Challenges for Advanced Security Monitoring - The {MASSIF} Project},
  booktitle    = {Trust, Privacy and Security in Digital Business - 9th International
                  Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7449},
  pages        = {222--223},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32287-7\_23},
  doi          = {10.1007/978-3-642-32287-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/RiekePDDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CarleDDK12,
  author       = {Georg Carle and
                  Herv{\'{e}} Debar and
                  Falko Dressler and
                  Hartmut K{\"{o}}nig},
  title        = {Network Attack Detection and Defense Early Warning Systems - Challenges
                  and Perspectives (Dagstuhl Seminar 12061)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {2},
  pages        = {1--20},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.2.1},
  doi          = {10.4230/DAGREP.2.2.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/CarleDDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GranadilloMHD11,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Yosra Ben Mustapha and
                  Nabil Hachem and
                  Herv{\'{e}} Debar},
  editor       = {Christos K. Georgiadis and
                  Hamid Jahankhani and
                  Elias Pimenidis and
                  Rabih Bashroush and
                  Ameer Al{-}Nemrat},
  title        = {An Ontology-Based Model for {SIEM} Environments},
  booktitle    = {Global Security, Safety and Sustainability {\&} e-Democracy -
                  7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy
                  2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {99},
  pages        = {148--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_21},
  doi          = {10.1007/978-3-642-33448-1\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/GranadilloMHD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JacobFD10,
  author       = {Gr{\'{e}}goire Jacob and
                  Eric Filiol and
                  Herv{\'{e}} Debar},
  title        = {Formalization of Viruses and Malware Through Process Algebras},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {597--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.59},
  doi          = {10.1109/ARES.2010.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JacobFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KheirCCD10,
  author       = {Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {A Service Dependency Model for Cost-Sensitive Intrusion Response},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {626--642},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_38},
  doi          = {10.1007/978-3-642-15497-3\_38},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KheirCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DebarKCC10,
  author       = {Herv{\'{e}} Debar and
                  Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Service Dependencies in Information Systems Security},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_1},
  doi          = {10.1007/978-3-642-14706-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/monami/SchooFSMMDMZ10,
  author       = {Peter Schoo and
                  Volker Fusenig and
                  Victor Souza and
                  M{\'{a}}rcio Melo and
                  Paul Murray and
                  Herv{\'{e}} Debar and
                  Houssem Medhioub and
                  Djamal Zeghlache},
  editor       = {Kostas Pentikousis and
                  Ram{\'{o}}n Ag{\"{u}}ero Calvo and
                  Marta Garc{\'{\i}}a{-}Arranz and
                  Symeon Papavassiliou},
  title        = {Challenges for Cloud Networking Security},
  booktitle    = {Mobile Networks and Management - Second International {ICST} Conference,
                  {MONAMI} 2010, Santander, Spain, September 22-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {68},
  pages        = {298--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21444-8\_26},
  doi          = {10.1007/978-3-642-21444-8\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/monami/SchooFSMMDMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KheirCCD10,
  author       = {Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact
                  Assessment},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {148--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_14},
  doi          = {10.1007/978-3-642-15257-3\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/KheirCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/HaidarCCD09,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  title        = {XeNA: an access negotiation framework using {XACML}},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {64},
  number       = {1-2},
  pages        = {155--169},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12243-008-0050-5},
  doi          = {10.1007/S12243-008-0050-5},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/HaidarCCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Cuppens-Boulahia09,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Herv{\'{e}} Debar},
  title        = {An ontology-based approach to react to network attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {280--305},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031041},
  doi          = {10.1504/IJICS.2009.031041},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/MorinMDD09,
  author       = {Benjamin Morin and
                  Ludovic M{\'{e}} and
                  Herv{\'{e}} Debar and
                  Mireille Ducass{\'{e}}},
  title        = {A logic-based model to support alert correlation in intrusion detection},
  journal      = {Inf. Fusion},
  volume       = {10},
  number       = {4},
  pages        = {285--299},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.inffus.2009.01.005},
  doi          = {10.1016/J.INFFUS.2009.01.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/MorinMDD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ViinikkaDMLT09,
  author       = {Jouni Viinikka and
                  Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Anssi Lehikoinen and
                  Mika P. Tarvainen},
  title        = {Processing intrusion detection alert aggregates with time series modeling},
  journal      = {Inf. Fusion},
  volume       = {10},
  number       = {4},
  pages        = {312--324},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.inffus.2009.01.003},
  doi          = {10.1016/J.INFFUS.2009.01.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/ViinikkaDMLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JacobFD09,
  author       = {Gr{\'{e}}goire Jacob and
                  Eric Filiol and
                  Herv{\'{e}} Debar},
  title        = {Functional polymorphic engines: formalisation, implementation and
                  use cases},
  journal      = {J. Comput. Virol.},
  volume       = {5},
  number       = {3},
  pages        = {247--261},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11416-008-0095-z},
  doi          = {10.1007/S11416-008-0095-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JacobFD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KheirDCCV09,
  author       = {Nizar Kheir and
                  Herv{\'{e}} Debar and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jouni Viinikka},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {A Service Dependency Modeling Framework for Policy-Based Response
                  Enforcement},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {176--195},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_11},
  doi          = {10.1007/978-3-642-02918-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KheirDCCV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JacobDF09,
  author       = {Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar and
                  Eric Filiol},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Malware Behavioral Detection by Attribute-Automata Using Abstraction
                  from Platform and Language},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_5},
  doi          = {10.1007/978-3-642-04342-0\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JacobDF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0902-0322,
  author       = {Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar and
                  Eric Filiol},
  title        = {Malware Detection using Attribute-Automata to parse Abstract Behavioral
                  Descriptions},
  journal      = {CoRR},
  volume       = {abs/0902.0322},
  year         = {2009},
  url          = {http://arxiv.org/abs/0902.0322},
  eprinttype    = {arXiv},
  eprint       = {0902.0322},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0902-0322.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0902-0469,
  author       = {Gr{\'{e}}goire Jacob and
                  Eric Filiol and
                  Herv{\'{e}} Debar},
  title        = {Formalization of malware through process calculi},
  journal      = {CoRR},
  volume       = {abs/0902.0469},
  year         = {2009},
  url          = {http://arxiv.org/abs/0902.0469},
  eprinttype    = {arXiv},
  eprint       = {0902.0469},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0902-0469.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JacobFD08,
  author       = {Gr{\'{e}}goire Jacob and
                  Eric Filiol and
                  Herv{\'{e}} Debar},
  title        = {Malware as interaction machines: a new framework for behavior modelling},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {235--250},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0085-1},
  doi          = {10.1007/S11416-008-0085-1},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JacobFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JacobDF08,
  author       = {Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar and
                  Eric Filiol},
  title        = {Behavioral detection of malware: from a survey towards an established
                  taxonomy},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {251--266},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0086-0},
  doi          = {10.1007/S11416-008-0086-0},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JacobDF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/Cuppens-BoulahiaCVVGD08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jorge E. L{\'{o}}pez de Vergara and
                  Enrique V{\'{a}}zquez and
                  Javier Guerra and
                  Herv{\'{e}} Debar},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {An ontology-based approach to react to network attacks},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {27--35},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757461},
  doi          = {10.1109/CRISIS.2008.4757461},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/Cuppens-BoulahiaCVVGD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Diala Abi Haidar and
                  Herv{\'{e}} Debar},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Negotiation of Prohibition: An Approach Based on Policy Rewriting},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_12},
  doi          = {10.1007/978-0-387-09699-5\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/CarlinetMDG08,
  author       = {Yannick Carlinet and
                  Ludovic M{\'{e}} and
                  Herv{\'{e}} Debar and
                  Yvon Gourhant},
  editor       = {Andr{\'{e}} Cotton and
                  Oana Dini and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
                  Mihaela Ion and
                  Manuela Popescu and
                  Masaru Takesue},
  title        = {Analysis of Computer Infection Risk Factors Based on Customer Network
                  Usage},
  booktitle    = {Proceedings of the Second International Conference on Emerging Security
                  Information, Systems and Technologies, {SECURWARE} 2008, August 25-31,
                  2008, Cap Esterel, France},
  pages        = {317--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SECURWARE.2008.30},
  doi          = {10.1109/SECURWARE.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/CarlinetMDG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08,
  author       = {Marc Dacier and
                  Herv{\'{e}} Debar and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {8102 Working Group -- Attack Taxonomy},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1495},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/KemmererBFKHWJDHZH08,
  author       = {Richard A. Kemmerer and
                  Roland B{\"{u}}schkes and
                  Ali Fessi and
                  Hartmut K{\"{o}}nig and
                  Peter Herrmann and
                  Stephen D. Wolthusen and
                  Marko Jahnke and
                  Herv{\'{e}} Debar and
                  Ralph Holz and
                  Tanja Zseby and
                  Dirk Haage},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Outcome Working Group -- Situational Awareness},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1494},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/KemmererBFKHWJDHZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CuppensDBG07,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar and
                  Danielle Boulanger and
                  Alban Gabillon},
  title        = {Introduction Selection of articles from the {SAR-SSI} 2006},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {62},
  number       = {11-12},
  pages        = {1327},
  year         = {2007},
  url          = {https://doi.org/10.1007/BF03253321},
  doi          = {10.1007/BF03253321},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CuppensDBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DebarTCC07,
  author       = {Herv{\'{e}} Debar and
                  Yohann Thomas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Enabling automated threat response through the use of a dynamic security
                  policy},
  journal      = {J. Comput. Virol.},
  volume       = {3},
  number       = {3},
  pages        = {195--210},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-007-0039-z},
  doi          = {10.1007/S11416-007-0039-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DebarTCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HaidarCCD07,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Resource Classification Based Negotiation in Web Services},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {313--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.54},
  doi          = {10.1109/IAS.2007.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HaidarCCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4765,
  author       = {Herv{\'{e}} Debar and
                  David A. Curry and
                  Benjamin S. Feinstein},
  title        = {The Intrusion Detection Message Exchange Format {(IDMEF)}},
  journal      = {{RFC}},
  volume       = {4765},
  pages        = {1--157},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4765},
  doi          = {10.17487/RFC4765},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CuppensDB06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar and
                  Elisa Bertino},
  title        = {Foreword},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {3-4},
  pages        = {242--244},
  year         = {2006},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CuppensDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/DebarT06,
  author       = {Herv{\'{e}} Debar and
                  Elvis Tombini},
  title        = {WebAnalyzer: accurate detection of {HTTP} attack traces in web server
                  logs},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {5-6},
  pages        = {682--704},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03219929},
  doi          = {10.1007/BF03219929},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/DebarT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DebarV06,
  author       = {Herv{\'{e}} Debar and
                  Jouni Viinikka},
  title        = {Security information management as an outsourced service},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {417--435},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610707430},
  doi          = {10.1108/09685220610707430},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DebarV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ThomasDM06,
  author       = {Yohann Thomas and
                  Herv{\'{e}} Debar and
                  Benjamin Morin},
  title        = {Improving Security Management through Passive Network Observation},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {382--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.74},
  doi          = {10.1109/ARES.2006.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ThomasDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ViinikkaDMS06,
  author       = {Jouni Viinikka and
                  Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Renaud S{\'{e}}guier},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Time series modeling for {IDS} alert management},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {102--113},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128835},
  doi          = {10.1145/1128817.1128835},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ViinikkaDMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DebarTBC06,
  author       = {Herv{\'{e}} Debar and
                  Yohann Thomas and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Contextual Security Policies for Threat Response},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_7},
  doi          = {10.1007/11790754\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DebarTBC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/HaidarCCD06,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Ari Juels and
                  Ernesto Damiani and
                  Alban Gabillon},
  title        = {An extended {RBAC} profile of {XACML}},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
                  2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180367.1180372},
  doi          = {10.1145/1180367.1180372},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/HaidarCCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/DebarV05,
  author       = {Herv{\'{e}} Debar and
                  Jouni Viinikka},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Intrusion Detection: Introduction to Intrusion Detection and Security
                  Information Management},
  booktitle    = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {3655},
  pages        = {207--236},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554578\_7},
  doi          = {10.1007/11554578\_7},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/DebarV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciap/MorinD05,
  author       = {Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Fabio Roli and
                  Sergio Vitulano},
  title        = {Conceptual Analysis of Intrusion Alarms},
  booktitle    = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference,
                  Cagliari, Italy, September 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3617},
  pages        = {91--98},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11553595\_11},
  doi          = {10.1007/11553595\_11},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iciap/MorinD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/DebarMCAMVBDO04,
  author       = {Herv{\'{e}} Debar and
                  Benjamin Morin and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Ludovic M{\'{e}} and
                  Bernard Vivinis and
                  Salem Benferhat and
                  Mireille Ducass{\'{e}} and
                  Rodolphe Ortalo},
  title        = {D{\'{e}}tection d'intrusions : corr{\'{e}}lation d'alertes},
  journal      = {Tech. Sci. Informatiques},
  volume       = {23},
  number       = {3},
  pages        = {359--390},
  year         = {2004},
  url          = {https://doi.org/10.3166/tsi.23.359-390},
  doi          = {10.3166/TSI.23.359-390},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/DebarMCAMVBDO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TombiniDMD04,
  author       = {Elvis Tombini and
                  Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Mireille Ducass{\'{e}}},
  title        = {A Serial Combination of Anomaly and Misuse IDSes Applied to {HTTP}
                  Traffic},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {428--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.4},
  doi          = {10.1109/CSAC.2004.4},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TombiniDMD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/DacierPD04,
  author       = {Marc Dacier and
                  Fabien Pouget and
                  Herv{\'{e}} Debar},
  title        = {Honeypots: Practical Means to Validate Malicious Fault Assumptions},
  booktitle    = {10th {IEEE} Pacific Rim International Symposium on Dependable Computing
                  {(PRDC} 2004), 3-5 March 2004, Papeete, Tahiti},
  pages        = {383--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PRDC.2004.1276594},
  doi          = {10.1109/PRDC.2004.1276594},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/DacierPD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ViinikkaD04,
  author       = {Jouni Viinikka and
                  Herv{\'{e}} Debar},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Monitoring {IDS} Background Noise Using {EWMA} Control Charts and
                  Alert Information},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {166--187},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_9},
  doi          = {10.1007/978-3-540-30143-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ViinikkaD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorinD03,
  author       = {Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Correlation of Intrusion Symptoms: An Application of Chronicles},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {94--112},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_6},
  doi          = {10.1007/978-3-540-45248-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MorinD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorinMDD02,
  author       = {Benjamin Morin and
                  Ludovic M{\'{e}} and
                  Herv{\'{e}} Debar and
                  Mireille Ducass{\'{e}}},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {{M2D2:} {A} Formal Data Model for {IDS} Alert Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {115--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_7},
  doi          = {10.1007/3-540-36084-0\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MorinMDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DebarM02,
  author       = {Herv{\'{e}} Debar and
                  Benjamin Morin},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Evaluation of the Diagnostic Capabilities of Commercial Intrusion
                  Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {177--198},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_10},
  doi          = {10.1007/3-540-36084-0\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DebarM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DebarW01,
  author       = {Herv{\'{e}} Debar and
                  Andreas Wespi},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Aggregation and Correlation of Intrusion-Detection Alerts},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_6},
  doi          = {10.1007/3-540-45474-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DebarW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/DebarDW00,
  author       = {Herv{\'{e}} Debar and
                  Marc Dacier and
                  Andreas Wespi},
  title        = {A revised taxonomy for intrusion-detection systems},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {55},
  number       = {7-8},
  pages        = {361--378},
  year         = {2000},
  url          = {https://doi.org/10.1007/BF02994844},
  doi          = {10.1007/BF02994844},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/DebarDW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WespiDDN00,
  author       = {Andreas Wespi and
                  Herv{\'{e}} Debar and
                  Marc Dacier and
                  Mehdi Nassehi},
  title        = {Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process
                  Behavior},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-305},
  doi          = {10.3233/JCS-2000-82-305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WespiDDN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AlmgrenDD00,
  author       = {Magnus Almgren and
                  Herv{\'{e}} Debar and
                  Marc Dacier},
  title        = {A Lightweight Tool for Detecting Web Server Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/a-lightweight-tool-for-detecting-web-server-attacks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AlmgrenDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WespiDD00,
  author       = {Andreas Wespi and
                  Marc Dacier and
                  Herv{\'{e}} Debar},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Intrusion Detection Using Variable-Length Audit Trail Patterns},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {110--129},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_8},
  doi          = {10.1007/3-540-39945-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WespiDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2000,
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3},
  doi          = {10.1007/3-540-39945-3},
  isbn         = {3-540-41085-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DebarDW99,
  author       = {Herv{\'{e}} Debar and
                  Marc Dacier and
                  Andreas Wespi},
  title        = {Towards a taxonomy of intrusion-detection systems},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {8},
  pages        = {805--822},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(98)00017-6},
  doi          = {10.1016/S1389-1286(98)00017-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DebarDW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AsokanDSW99,
  author       = {N. Asokan and
                  Herv{\'{e}} Debar and
                  Michael Steiner and
                  Michael Waidner},
  title        = {Authenticating public terminals},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {8},
  pages        = {861--870},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(98)00020-6},
  doi          = {10.1016/S1389-1286(98)00020-6},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AsokanDSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WespiD99,
  author       = {Andreas Wespi and
                  Herv{\'{e}} Debar},
  title        = {Building an Intrusion-Detection System to Detect Suspicious Process
                  Behavior},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Wespi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WespiD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DebarDNW98,
  author       = {Herv{\'{e}} Debar and
                  Marc Dacier and
                  Mehdi Nassehi and
                  Andreas Wespi},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Fixed vs. Variable-Length Patterns for Detecting Suspicious Process
                  Behavior},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055852},
  doi          = {10.1007/BFB0055852},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DebarDNW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DebarBS92,
  author       = {Herv{\'{e}} Debar and
                  Monique Becker and
                  Didier Siboni},
  title        = {A neural network component for an intrusion detection system},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {240--250},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213257},
  doi          = {10.1109/RISP.1992.213257},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DebarBS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics