Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hervé Debar
@inproceedings{DBLP:conf/IEEEares/Abbas-Escribano23, author = {Marwan Abbas{-}Escribano and Herv{\'{e}} Debar}, title = {An Improved Honeypot Model for Attack Detection and Analysis}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {142:1--142:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3604993}, doi = {10.1145/3600160.3604993}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Abbas-Escribano23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10139, author = {Konstantinos Lampropoulos and Apostolis Zarras and Eftychia Lakka and Polyanthi Barmpaki and Kostas Drakonakis and Manos Athanatos and Herv{\'{e}} Debar and Andreas Alexopoulos and Aristeidis Sotiropoulos and George Tsakirakis and Nikos Dimakopoulos and Dimitris Tsolovos and Matthias Pocs and Michalis Smyrlis and Ioannis Basdekis and Georgios Spanoudakis and Ovidiu Mihaila and Bogdan Prelipcean and Eliot Salant and Sotiris Athanassopoulos and Petros Papachristou and Ioannis Ladakis and John Chang and Evangelos Floros and Konstantinos Smyrlis and Rouven Besters and Pietro Randine and Karianna Fjeld Lovaas and John Cooper and Iulia Ilie and Gabriel Danciu and Marwan Darwish Khabbaz}, title = {White paper on cybersecurity in the healthcare sector. The {HEIR} solution}, journal = {CoRR}, volume = {abs/2310.10139}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10139}, doi = {10.48550/ARXIV.2310.10139}, eprinttype = {arXiv}, eprint = {2310.10139}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RasoamananaLD22, author = {Aina Toky Rasoamanana and Olivier Levillain and Herv{\'{e}} Debar}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint {TLS} Stacks}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {637--657}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_31}, doi = {10.1007/978-3-031-17143-7\_31}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RasoamananaLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/ShahidD21, author = {Mustafizur R. Shahid and Herv{\'{e}} Debar}, editor = {M. Arif Wani and Ishwar K. Sethi and Weisong Shi and Guangzhi Qu and Daniela Stan Raicu and Ruoming Jin}, title = {{CVSS-BERT:} Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description}, booktitle = {20th {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2021, Pasadena, CA, USA, December 13-16, 2021}, pages = {1600--1607}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICMLA52953.2021.00256}, doi = {10.1109/ICMLA52953.2021.00256}, timestamp = {Tue, 01 Feb 2022 17:24:07 +0100}, biburl = {https://dblp.org/rec/conf/icmla/ShahidD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2021-1, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9}, doi = {10.1007/978-3-030-90019-9}, isbn = {978-3-030-90018-2}, timestamp = {Thu, 04 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2021-2, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {399}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90022-9}, doi = {10.1007/978-3-030-90022-9}, isbn = {978-3-030-90021-2}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08510, author = {Mustafizur R. Shahid and Herv{\'{e}} Debar}, title = {{CVSS-BERT:} Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description}, journal = {CoRR}, volume = {abs/2111.08510}, year = {2021}, url = {https://arxiv.org/abs/2111.08510}, eprinttype = {arXiv}, eprint = {2111.08510}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoutignyBBLDJ20, author = {Fran{\c{c}}ois Boutigny and St{\'{e}}phane Betg{\'{e}}{-}Brezetz and Gregory Blanc and Antoine Lavignotte and Herv{\'{e}} Debar and Houda Jmila}, title = {Solving security constraints for 5G slice embedding: {A} proof-of-concept}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101662}, doi = {10.1016/J.COSE.2019.101662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoutignyBBLDJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DebarBT20, author = {Herv{\'{e}} Debar and Razvan Beuran and Yasuo Tan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Quantitative Study of Vulnerabilities in the Internet of Medical Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {164--175}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009105801640175}, doi = {10.5220/0009105801640175}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DebarBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/AguasLBD20, author = {Elkin Aguas and Anthony Lambert and Gr{\'{e}}gory Blanc and Herv{\'{e}} Debar}, title = {Automated Saturation Mitigation Controlled by Deep Reinforcement Learning}, booktitle = {28th {IEEE} International Conference on Network Protocols, {ICNP} 2020, Madrid, Spain, October 13-16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICNP49622.2020.9259356}, doi = {10.1109/ICNP49622.2020.9259356}, timestamp = {Tue, 24 Nov 2020 11:13:22 +0100}, biburl = {https://dblp.org/rec/conf/icnp/AguasLBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/ShahidBJZD20, author = {Mustafizur R. Shahid and Gregory Blanc and Houda Jmila and Zonghua Zhang and Herv{\'{e}} Debar}, title = {Generative Deep Learning for Internet of Things Network Traffic Generation}, booktitle = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2020, Perth, Australia, December 1-4, 2020}, pages = {70--79}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PRDC50213.2020.00018}, doi = {10.1109/PRDC50213.2020.00018}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prdc/ShahidBJZD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KiennertIDL19, author = {Christophe Kiennert and Ziad Ismail and Herv{\'{e}} Debar and Jean Leneutre}, title = {A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {5}, pages = {90:1--90:31}, year = {2019}, url = {https://doi.org/10.1145/3232848}, doi = {10.1145/3232848}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KiennertIDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BajanKD19, author = {Pierre{-}Marie Bajan and Christophe Kiennert and Herv{\'{e}} Debar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Methodology of a Network Simulation in the Context of an Evaluation: Application to an {IDS}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {378--388}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007378603780388}, doi = {10.5220/0007378603780388}, timestamp = {Wed, 05 Jun 2019 13:01:15 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BajanKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/ShahidBZD19, author = {Mustafizur R. Shahid and Gregory Blanc and Zonghua Zhang and Herv{\'{e}} Debar}, editor = {Aris Gkoulalas{-}Divanis and Mirco Marchetti and Dimiter R. Avresky}, title = {Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders}, booktitle = {18th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2019, Cambridge, MA, USA, September 26-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NCA.2019.8935007}, doi = {10.1109/NCA.2019.8935007}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/ShahidBZD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-11831, author = {Mustafizur Rahman Shahid and Gregory Blanc and Zonghua Zhang and Herv{\'{e}} Debar}, title = {Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders}, journal = {CoRR}, volume = {abs/1912.11831}, year = {2019}, url = {http://arxiv.org/abs/1912.11831}, eprinttype = {arXiv}, eprint = {1912.11831}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-11831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GranadilloDMGAM18, author = {Gustavo {Gonzalez Granadillo} and Samuel Dubus and Alexander Motzek and Joaqu{\'{\i}}n Garc{\'{\i}}a and Ender Alvarez and Matteo Merialdo and Serge Papillon and Herv{\'{e}} Debar}, title = {Dynamic risk management response system to handle cyber threats}, journal = {Future Gener. Comput. Syst.}, volume = {83}, pages = {535--552}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.05.043}, doi = {10.1016/J.FUTURE.2017.05.043}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/GranadilloDMGAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/ShahidBZD18, author = {Mustafizur R. Shahid and Gregory Blanc and Zonghua Zhang and Herv{\'{e}} Debar}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {IoT Devices Recognition Through Network Traffic Analysis}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {5187--5192}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622243}, doi = {10.1109/BIGDATA.2018.8622243}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/ShahidBZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BoutignyBDBLP18, author = {Fran{\c{c}}ois Boutigny and St{\'{e}}phane Betg{\'{e}}{-}Brezetz and Herv{\'{e}} Debar and Gr{\'{e}}gory Blanc and Antoine Lavignotte and Ion Popescu}, title = {Multi-Provider Secure Virtual Network Embedding}, booktitle = {9th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2018, Paris, France, February 26-28, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NTMS.2018.8328706}, doi = {10.1109/NTMS.2018.8328706}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/BoutignyBDBLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SahayBZD17, author = {Rishikesh Sahay and Gregory Blanc and Zonghua Zhang and Herv{\'{e}} Debar}, title = {ArOMA: An {SDN} based autonomic DDoS mitigation framework}, journal = {Comput. Secur.}, volume = {70}, pages = {482--499}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.07.008}, doi = {10.1016/J.COSE.2017.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SahayBZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MotzekGDGM17, author = {Alexander Motzek and Gustavo {Gonzalez Granadillo} and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a and Ralf M{\"{o}}ller}, title = {Selection of Pareto-efficient response plans based on financial and operational assessments}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {12}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0063-6}, doi = {10.1186/S13635-017-0063-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MotzekGDGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/GranadilloGD17, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a and Herv{\'{e}} Debar}, title = {A polytope-based approach to measure the impact of events against critical infrastructures}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {3--21}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.02.004}, doi = {10.1016/J.JCSS.2016.02.004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/GranadilloGD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/SahayBZTD17, author = {Rishikesh Sahay and Gregory Blanc and Zonghua Zhang and Khalifa Toumi and Herv{\'{e}} Debar}, editor = {Marc Lacoste and Fernando Ramos}, title = {Adaptive Policy-driven Attack Mitigation in {SDN}}, booktitle = {Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, XDOMO'17, Belgrade, Serbia, April 23-26, 2017}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3071064.3071068}, doi = {10.1145/3071064.3071068}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/SahayBZTD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17, author = {Maxim Kolomeec and Gustavo {Gonzalez Granadillo} and Elena Doynikova and Andrey Chechulin and Igor V. Kotenko and Herv{\'{e}} Debar}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Choosing Models for Security Metrics Visualization}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {75--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_7}, doi = {10.1007/978-3-319-65127-9\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-06073, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {An n-sided polygonal model to calculate the impact of cyber security events}, journal = {CoRR}, volume = {abs/1711.06073}, year = {2017}, url = {http://arxiv.org/abs/1711.06073}, eprinttype = {arXiv}, eprint = {1711.06073}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-06073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GranadilloMGD16, author = {Gustavo {Gonzalez Granadillo} and Alexander Motzek and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {Selection of Mitigation Actions Based on Financial and Operational Impact Assessments}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.3}, doi = {10.1109/ARES.2016.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GranadilloMGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SalaunDD16, author = {Micka{\"{e}}l Sala{\"{u}}n and Marion Daubignard and Herv{\'{e}} Debar}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {StemJail: Dynamic Role Compartmentalization}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {865--876}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897912}, doi = {10.1145/2897845.2897912}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SalaunDD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/GranadilloGD16, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {87--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_7}, doi = {10.1007/978-3-319-54876-0\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/GranadilloGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YungDG16, author = {Jonathan Yung and Herv{\'{e}} Debar and Louis Granboulan}, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Security Issues and Mitigation in Ethernet {POWERLINK}}, booktitle = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, pages = {87--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61437-3\_6}, doi = {10.1007/978-3-319-61437-3\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YungDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AguessyBBCD16, author = {Fran{\c{c}}ois{-}Xavier Aguessy and Olivier Bettan and Gregory Blanc and Vania Conan and Herv{\'{e}} Debar}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Hybrid Risk Assessment Model Based on Bayesian Networks}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {21--40}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_2}, doi = {10.1007/978-3-319-44524-3\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GranadilloAMMGD16, author = {Gustavo {Gonzalez Granadillo} and Ender Alvarez and Alexander Motzek and Matteo Merialdo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Towards an Automated and Dynamic Risk Management Response System}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {37--53}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_3}, doi = {10.1007/978-3-319-47560-8\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GranadilloAMMGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FabreDVB16, author = {Pierre{-}Edouard Fabre and Herv{\'{e}} Debar and Jouni Viinikka and Gr{\'{e}}gory Blanc}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {{ML:} DDoS Damage Control with {MPLS}}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {101--116}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_7}, doi = {10.1007/978-3-319-47560-8\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/FabreDVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/GranadilloED16, author = {Gustavo {Gonzalez Granadillo} and Mohammed El{-}Barbori and Herv{\'{e}} Debar}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {New Types of Alert Correlation for Security Information and Event Management Systems}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792462}, doi = {10.1109/NTMS.2016.7792462}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/GranadilloED16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16, author = {Gustavo {Gonzalez Granadillo} and Jose Rubio{-}Hernan and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {340--348}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0082}, doi = {10.1109/TRUSTCOM.2016.0082}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AguessyBBCD16, author = {Fran{\c{c}}ois{-}Xavier Aguessy and Olivier Bettan and Gr{\'{e}}gory Blanc and Vania Conan and Herv{\'{e}} Debar}, title = {Bayesian Attack Model for Dynamic Risk Assessment}, journal = {CoRR}, volume = {abs/1606.09042}, year = {2016}, url = {http://arxiv.org/abs/1606.09042}, eprinttype = {arXiv}, eprint = {1606.09042}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AguessyBBCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/GranadilloGAED15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ender Alvarez and Mohammed El{-}Barbori and Herv{\'{e}} Debar}, title = {Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the {RORI} index}, journal = {Comput. Electr. Eng.}, volume = {47}, pages = {13--34}, year = {2015}, url = {https://doi.org/10.1016/j.compeleceng.2015.07.023}, doi = {10.1016/J.COMPELECENG.2015.07.023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/GranadilloGAED15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BelhaouaneGD15, author = {Malek Belhaouane and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {On the Isofunctionality of Network Access Control Lists}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {168--173}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.78}, doi = {10.1109/ARES.2015.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BelhaouaneGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LevillainGD15, author = {Olivier Levillain and Baptiste Gourdin and Herv{\'{e}} Debar}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {{TLS} Record Protocol: Security Analysis and Defense-in-depth Countermeasures for {HTTPS}}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {225--236}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714592}, doi = {10.1145/2714576.2714592}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LevillainGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/GranadilloJD15, author = {Gustavo {Gonzalez Granadillo} and Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Attack Volume Model: Geometrical Approach and Application}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {242--257}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_15}, doi = {10.1007/978-3-319-31811-0\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/GranadilloJD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar and Christophe Ponchel and Laura Rodriguez Martin}, editor = {Mohamad Badra and Azzedine Boukerche and Pascal Urien}, title = {Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)}, booktitle = {7th International Conference on New Technologies, Mobility and Security, {NTMS} 2015, Paris, France, July 27-29, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NTMS.2015.7266480}, doi = {10.1109/NTMS.2015.7266480}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/GranadilloGDPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KheirBDGY15, author = {Nizar Kheir and Gregory Blanc and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dingqi Yang}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Automated Classification of C{\&}C Connections Through Malware {URL} Clustering}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {252--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_17}, doi = {10.1007/978-3-319-18467-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KheirBDGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelhaouaneGD15, author = {Malek Belhaouane and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {53--64}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005544100530064}, doi = {10.5220/0005544100530064}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelhaouaneGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GranadilloGD15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {538--555}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_29}, doi = {10.1007/978-3-319-28865-9\_29}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GranadilloGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GranadilloBDJ14, author = {Gustavo {Gonzalez Granadillo} and Malek Belhaouane and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob}, title = {RORI-based countermeasure selection using the OrBAC formalism}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {1}, pages = {63--79}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0207-8}, doi = {10.1007/S10207-013-0207-8}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GranadilloBDJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/PukkawannaBGKD14, author = {Sirikarn Pukkawanna and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Youki Kadobayashi and Herv{\'{e}} Debar}, title = {Classification of {SSL} Servers based on their {SSL} Handshake for Automated Security Assessment}, booktitle = {Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland, September 11, 2014}, pages = {30--39}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BADGERS.2014.10}, doi = {10.1109/BADGERS.2014.10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/badgers/PukkawannaBGKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MustaphaDB14, author = {Yosra Ben Mustapha and Herv{\'{e}} Debar and Gregory Blanc}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Policy Enforcement Point Model}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {278--286}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_20}, doi = {10.1007/978-3-319-23829-6\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/MustaphaDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/GranadilloPBD14, author = {Gustavo {Gonzalez Granadillo} and Christophe Ponchel and Gregory Blanc and Herv{\'{e}} Debar}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and G{\"{u}}rkan G{\"{u}}r}, title = {Combining Technical and Financial Impacts for Countermeasure Selection}, booktitle = {Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, {AIDP} 2014, Marrakesh, Morocco, June 2014}, series = {{EPTCS}}, volume = {165}, pages = {1--14}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.165.1}, doi = {10.4204/EPTCS.165.1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/GranadilloPBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/LevillainDM13, author = {Olivier Levillain and Herv{\'{e}} Debar and Benjamin Morin}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {Parsifal: Writing efficient and robust binary parsers, quickly}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766344}, doi = {10.1109/CRISIS.2013.6766344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/LevillainDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccit/DassoukiDSH13, author = {Khaled Dassouki and Herv{\'{e}} Debar and Ha{\"{\i}}dar Safa and Abbas Hijazi}, title = {A {TCP} delay-based mechanism for detecting congestion in the Internet}, booktitle = {Third International Conference on Communications and Information Technology, {ICCIT} 2013, Beirut, Lebanon, June 19-21, 2013}, pages = {141--145}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCITechnology.2013.6579538}, doi = {10.1109/ICCITECHNOLOGY.2013.6579538}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccit/DassoukiDSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HachemGD13, author = {Nabil Hachem and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {An Adaptive Mitigation Framework for Handling Suspicious Network Flows via {MPLS} Policies}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {297--312}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_20}, doi = {10.1007/978-3-642-41488-6\_20}, timestamp = {Sun, 02 Jun 2019 21:12:28 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HachemGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/MustaphaD13, author = {Yosra Ben Mustapha and Herv{\'{e}} Debar}, editor = {Sabu M. Thampi and Pradeep K. Atrey and Chun{-}I Fan and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net}, booktitle = {Security in Computing and Communications - International Symposium, {SSCC} 2013, Mysore, India, August 22-24, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {377}, pages = {313--321}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40576-1\_31}, doi = {10.1007/978-3-642-40576-1\_31}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sscc/MustaphaD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WazanBDG13, author = {Ahmad Samer Wazan and Gregory Blanc and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Attribute-Based Mining Process for the Organization-Based Access Control Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {421--430}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.53}, doi = {10.1109/TRUSTCOM.2013.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WazanBDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GranadilloMHD12, author = {Gustavo {Gonzalez Granadillo} and Yosra Ben Mustapha and Nabil Hachem and Herv{\'{e}} Debar}, title = {An ontology-driven approach to model {SIEM} information and operations using the {SWRL} formalism}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {104--123}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048412}, doi = {10.1504/IJESDF.2012.048412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GranadilloMHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LevillainEMD12, author = {Olivier Levillain and Arnaud {\'{E}}balard and Benjamin Morin and Herv{\'{e}} Debar}, editor = {Robert H'obbes' Zakon}, title = {One year of {SSL} internet measurement}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {11--20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420953}, doi = {10.1145/2420950.2420953}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/BernardDB12, author = {Catherine Bernard and Herv{\'{e}} Debar and Salim Benayoune}, title = {Cross-domain vulnerabilities over social networks}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {8--13}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412370}, doi = {10.1109/CASON.2012.6412370}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cason/BernardDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/WaillyLD12, author = {Aur{\'{e}}lien Wailly and Marc Lacoste and Herv{\'{e}} Debar}, editor = {Dejan S. Milojicic and Dongyan Xu and Vanish Talwar}, title = {{VESPA:} multi-layered self-protection for cloud resources}, booktitle = {9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012}, pages = {155--160}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2371536.2371564}, doi = {10.1145/2371536.2371564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/WaillyLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/HachemDG12, author = {Nabil Hachem and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{HADEGA:} {A} novel MPLS-based mitigation solution to handle network attacks}, booktitle = {31st {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2012, Austin, TX, USA, December 1-3, 2012}, pages = {171--180}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PCCC.2012.6407750}, doi = {10.1109/PCCC.2012.6407750}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/HachemDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12, author = {Gustavo {Gonzalez Granadillo} and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob and Chrystel Gaber and Mohammed Achemlal}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Individual Countermeasure Selection Based on the Return On Response Investment Index}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_14}, doi = {10.1007/978-3-642-33704-8\_14}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12, author = {Yosra Ben Mustapha and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {203--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_18}, doi = {10.1007/978-3-642-33704-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RiekePDDH12, author = {Roland Rieke and Elsa Prieto and Rodrigo Diaz and Herv{\'{e}} Debar and Andrew Hutchison}, editor = {Simone Fischer{-}H{\"{u}}bner and Sokratis K. Katsikas and Gerald Quirchmayr}, title = {Challenges for Advanced Security Monitoring - The {MASSIF} Project}, booktitle = {Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7449}, pages = {222--223}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32287-7\_23}, doi = {10.1007/978-3-642-32287-7\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/RiekePDDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/CarleDDK12, author = {Georg Carle and Herv{\'{e}} Debar and Falko Dressler and Hartmut K{\"{o}}nig}, title = {Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)}, journal = {Dagstuhl Reports}, volume = {2}, number = {2}, pages = {1--20}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.2.1}, doi = {10.4230/DAGREP.2.2.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/CarleDDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GranadilloMHD11, author = {Gustavo {Gonzalez Granadillo} and Yosra Ben Mustapha and Nabil Hachem and Herv{\'{e}} Debar}, editor = {Christos K. Georgiadis and Hamid Jahankhani and Elias Pimenidis and Rabih Bashroush and Ameer Al{-}Nemrat}, title = {An Ontology-Based Model for {SIEM} Environments}, booktitle = {Global Security, Safety and Sustainability {\&} e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {99}, pages = {148--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_21}, doi = {10.1007/978-3-642-33448-1\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/GranadilloMHD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JacobFD10, author = {Gr{\'{e}}goire Jacob and Eric Filiol and Herv{\'{e}} Debar}, title = {Formalization of Viruses and Malware Through Process Algebras}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {597--602}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.59}, doi = {10.1109/ARES.2010.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JacobFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {A Service Dependency Model for Cost-Sensitive Intrusion Response}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {626--642}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_38}, doi = {10.1007/978-3-642-15497-3\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DebarKCC10, author = {Herv{\'{e}} Debar and Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Service Dependencies in Information Systems Security}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_1}, doi = {10.1007/978-3-642-14706-7\_1}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/monami/SchooFSMMDMZ10, author = {Peter Schoo and Volker Fusenig and Victor Souza and M{\'{a}}rcio Melo and Paul Murray and Herv{\'{e}} Debar and Houssem Medhioub and Djamal Zeghlache}, editor = {Kostas Pentikousis and Ram{\'{o}}n Ag{\"{u}}ero Calvo and Marta Garc{\'{\i}}a{-}Arranz and Symeon Papavassiliou}, title = {Challenges for Cloud Networking Security}, booktitle = {Mobile Networks and Management - Second International {ICST} Conference, {MONAMI} 2010, Santander, Spain, September 22-24, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {68}, pages = {298--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21444-8\_26}, doi = {10.1007/978-3-642-21444-8\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/monami/SchooFSMMDMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {148--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_14}, doi = {10.1007/978-3-642-15257-3\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/HaidarCCD09, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, title = {XeNA: an access negotiation framework using {XACML}}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {64}, number = {1-2}, pages = {155--169}, year = {2009}, url = {https://doi.org/10.1007/s12243-008-0050-5}, doi = {10.1007/S12243-008-0050-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/HaidarCCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Cuppens-Boulahia09, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Herv{\'{e}} Debar}, title = {An ontology-based approach to react to network attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {280--305}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031041}, doi = {10.1504/IJICS.2009.031041}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/MorinMDD09, author = {Benjamin Morin and Ludovic M{\'{e}} and Herv{\'{e}} Debar and Mireille Ducass{\'{e}}}, title = {A logic-based model to support alert correlation in intrusion detection}, journal = {Inf. Fusion}, volume = {10}, number = {4}, pages = {285--299}, year = {2009}, url = {https://doi.org/10.1016/j.inffus.2009.01.005}, doi = {10.1016/J.INFFUS.2009.01.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/MorinMDD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/ViinikkaDMLT09, author = {Jouni Viinikka and Herv{\'{e}} Debar and Ludovic M{\'{e}} and Anssi Lehikoinen and Mika P. Tarvainen}, title = {Processing intrusion detection alert aggregates with time series modeling}, journal = {Inf. Fusion}, volume = {10}, number = {4}, pages = {312--324}, year = {2009}, url = {https://doi.org/10.1016/j.inffus.2009.01.003}, doi = {10.1016/J.INFFUS.2009.01.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/ViinikkaDMLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JacobFD09, author = {Gr{\'{e}}goire Jacob and Eric Filiol and Herv{\'{e}} Debar}, title = {Functional polymorphic engines: formalisation, implementation and use cases}, journal = {J. Comput. Virol.}, volume = {5}, number = {3}, pages = {247--261}, year = {2009}, url = {https://doi.org/10.1007/s11416-008-0095-z}, doi = {10.1007/S11416-008-0095-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JacobFD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KheirDCCV09, author = {Nizar Kheir and Herv{\'{e}} Debar and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jouni Viinikka}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {A Service Dependency Modeling Framework for Policy-Based Response Enforcement}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {176--195}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_11}, doi = {10.1007/978-3-642-02918-9\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KheirDCCV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JacobDF09, author = {Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar and Eric Filiol}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {81--100}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_5}, doi = {10.1007/978-3-642-04342-0\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JacobDF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0902-0322, author = {Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar and Eric Filiol}, title = {Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions}, journal = {CoRR}, volume = {abs/0902.0322}, year = {2009}, url = {http://arxiv.org/abs/0902.0322}, eprinttype = {arXiv}, eprint = {0902.0322}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0902-0322.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0902-0469, author = {Gr{\'{e}}goire Jacob and Eric Filiol and Herv{\'{e}} Debar}, title = {Formalization of malware through process calculi}, journal = {CoRR}, volume = {abs/0902.0469}, year = {2009}, url = {http://arxiv.org/abs/0902.0469}, eprinttype = {arXiv}, eprint = {0902.0469}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0902-0469.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JacobFD08, author = {Gr{\'{e}}goire Jacob and Eric Filiol and Herv{\'{e}} Debar}, title = {Malware as interaction machines: a new framework for behavior modelling}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {235--250}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0085-1}, doi = {10.1007/S11416-008-0085-1}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JacobFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JacobDF08, author = {Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar and Eric Filiol}, title = {Behavioral detection of malware: from a survey towards an established taxonomy}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {251--266}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0086-0}, doi = {10.1007/S11416-008-0086-0}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JacobDF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Cuppens-BoulahiaCVVGD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jorge E. L{\'{o}}pez de Vergara and Enrique V{\'{a}}zquez and Javier Guerra and Herv{\'{e}} Debar}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {An ontology-based approach to react to network attacks}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {27--35}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757461}, doi = {10.1109/CRISIS.2008.4757461}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/Cuppens-BoulahiaCVVGD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Diala Abi Haidar and Herv{\'{e}} Debar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Negotiation of Prohibition: An Approach Based on Policy Rewriting}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {173--187}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_12}, doi = {10.1007/978-0-387-09699-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/CarlinetMDG08, author = {Yannick Carlinet and Ludovic M{\'{e}} and Herv{\'{e}} Debar and Yvon Gourhant}, editor = {Andr{\'{e}} Cotton and Oana Dini and Antonio Fernandez G{\'{o}}mez{-}Skarmeta and Mihaela Ion and Manuela Popescu and Masaru Takesue}, title = {Analysis of Computer Infection Risk Factors Based on Customer Network Usage}, booktitle = {Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2008, August 25-31, 2008, Cap Esterel, France}, pages = {317--325}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SECURWARE.2008.30}, doi = {10.1109/SECURWARE.2008.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/CarlinetMDG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08, author = {Marc Dacier and Herv{\'{e}} Debar and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {8102 Working Group -- Attack Taxonomy}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1495}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/KemmererBFKHWJDHZH08, author = {Richard A. Kemmerer and Roland B{\"{u}}schkes and Ali Fessi and Hartmut K{\"{o}}nig and Peter Herrmann and Stephen D. Wolthusen and Marko Jahnke and Herv{\'{e}} Debar and Ralph Holz and Tanja Zseby and Dirk Haage}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Outcome Working Group -- Situational Awareness}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1494}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/KemmererBFKHWJDHZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CuppensDBG07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar and Danielle Boulanger and Alban Gabillon}, title = {Introduction Selection of articles from the {SAR-SSI} 2006}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {62}, number = {11-12}, pages = {1327}, year = {2007}, url = {https://doi.org/10.1007/BF03253321}, doi = {10.1007/BF03253321}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CuppensDBG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DebarTCC07, author = {Herv{\'{e}} Debar and Yohann Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Enabling automated threat response through the use of a dynamic security policy}, journal = {J. Comput. Virol.}, volume = {3}, number = {3}, pages = {195--210}, year = {2007}, url = {https://doi.org/10.1007/s11416-007-0039-z}, doi = {10.1007/S11416-007-0039-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DebarTCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaidarCCD07, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ning Zhang and Ajith Abraham}, title = {Resource Classification Based Negotiation in Web Services}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {313--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.54}, doi = {10.1109/IAS.2007.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaidarCCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4765, author = {Herv{\'{e}} Debar and David A. Curry and Benjamin S. Feinstein}, title = {The Intrusion Detection Message Exchange Format {(IDMEF)}}, journal = {{RFC}}, volume = {4765}, pages = {1--157}, year = {2007}, url = {https://doi.org/10.17487/RFC4765}, doi = {10.17487/RFC4765}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CuppensDB06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar and Elisa Bertino}, title = {Foreword}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {3-4}, pages = {242--244}, year = {2006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CuppensDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/DebarT06, author = {Herv{\'{e}} Debar and Elvis Tombini}, title = {WebAnalyzer: accurate detection of {HTTP} attack traces in web server logs}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {5-6}, pages = {682--704}, year = {2006}, url = {https://doi.org/10.1007/BF03219929}, doi = {10.1007/BF03219929}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/DebarT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DebarV06, author = {Herv{\'{e}} Debar and Jouni Viinikka}, title = {Security information management as an outsourced service}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {417--435}, year = {2006}, url = {https://doi.org/10.1108/09685220610707430}, doi = {10.1108/09685220610707430}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DebarV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ThomasDM06, author = {Yohann Thomas and Herv{\'{e}} Debar and Benjamin Morin}, title = {Improving Security Management through Passive Network Observation}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {382--389}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.74}, doi = {10.1109/ARES.2006.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ThomasDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ViinikkaDMS06, author = {Jouni Viinikka and Herv{\'{e}} Debar and Ludovic M{\'{e}} and Renaud S{\'{e}}guier}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Time series modeling for {IDS} alert management}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {102--113}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128835}, doi = {10.1145/1128817.1128835}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ViinikkaDMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DebarTBC06, author = {Herv{\'{e}} Debar and Yohann Thomas and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Contextual Security Policies for Threat Response}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {109--128}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_7}, doi = {10.1007/11790754\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DebarTBC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/HaidarCCD06, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {An extended {RBAC} profile of {XACML}}, booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {13--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180367.1180372}, doi = {10.1145/1180367.1180372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/HaidarCCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/DebarV05, author = {Herv{\'{e}} Debar and Jouni Viinikka}, editor = {Alessandro Aldini and Roberto Gorrieri and Fabio Martinelli}, title = {Intrusion Detection: Introduction to Intrusion Detection and Security Information Management}, booktitle = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {3655}, pages = {207--236}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554578\_7}, doi = {10.1007/11554578\_7}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/DebarV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/MorinD05, author = {Benjamin Morin and Herv{\'{e}} Debar}, editor = {Fabio Roli and Sergio Vitulano}, title = {Conceptual Analysis of Intrusion Alarms}, booktitle = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference, Cagliari, Italy, September 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3617}, pages = {91--98}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11553595\_11}, doi = {10.1007/11553595\_11}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/iciap/MorinD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/DebarMCAMVBDO04, author = {Herv{\'{e}} Debar and Benjamin Morin and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Ludovic M{\'{e}} and Bernard Vivinis and Salem Benferhat and Mireille Ducass{\'{e}} and Rodolphe Ortalo}, title = {D{\'{e}}tection d'intrusions : corr{\'{e}}lation d'alertes}, journal = {Tech. Sci. Informatiques}, volume = {23}, number = {3}, pages = {359--390}, year = {2004}, url = {https://doi.org/10.3166/tsi.23.359-390}, doi = {10.3166/TSI.23.359-390}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/DebarMCAMVBDO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TombiniDMD04, author = {Elvis Tombini and Herv{\'{e}} Debar and Ludovic M{\'{e}} and Mireille Ducass{\'{e}}}, title = {A Serial Combination of Anomaly and Misuse IDSes Applied to {HTTP} Traffic}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {428--437}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.4}, doi = {10.1109/CSAC.2004.4}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TombiniDMD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/DacierPD04, author = {Marc Dacier and Fabien Pouget and Herv{\'{e}} Debar}, title = {Honeypots: Practical Means to Validate Malicious Fault Assumptions}, booktitle = {10th {IEEE} Pacific Rim International Symposium on Dependable Computing {(PRDC} 2004), 3-5 March 2004, Papeete, Tahiti}, pages = {383--388}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PRDC.2004.1276594}, doi = {10.1109/PRDC.2004.1276594}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/DacierPD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ViinikkaD04, author = {Jouni Viinikka and Herv{\'{e}} Debar}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Monitoring {IDS} Background Noise Using {EWMA} Control Charts and Alert Information}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {166--187}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_9}, doi = {10.1007/978-3-540-30143-1\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ViinikkaD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorinD03, author = {Benjamin Morin and Herv{\'{e}} Debar}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Correlation of Intrusion Symptoms: An Application of Chronicles}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {94--112}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_6}, doi = {10.1007/978-3-540-45248-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MorinD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorinMDD02, author = {Benjamin Morin and Ludovic M{\'{e}} and Herv{\'{e}} Debar and Mireille Ducass{\'{e}}}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {{M2D2:} {A} Formal Data Model for {IDS} Alert Correlation}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {115--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_7}, doi = {10.1007/3-540-36084-0\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MorinMDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DebarM02, author = {Herv{\'{e}} Debar and Benjamin Morin}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {177--198}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_10}, doi = {10.1007/3-540-36084-0\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DebarM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DebarW01, author = {Herv{\'{e}} Debar and Andreas Wespi}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Aggregation and Correlation of Intrusion-Detection Alerts}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {85--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_6}, doi = {10.1007/3-540-45474-8\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/DebarW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/DebarDW00, author = {Herv{\'{e}} Debar and Marc Dacier and Andreas Wespi}, title = {A revised taxonomy for intrusion-detection systems}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {55}, number = {7-8}, pages = {361--378}, year = {2000}, url = {https://doi.org/10.1007/BF02994844}, doi = {10.1007/BF02994844}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/DebarDW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WespiDDN00, author = {Andreas Wespi and Herv{\'{e}} Debar and Marc Dacier and Mehdi Nassehi}, title = {Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior}, journal = {J. Comput. Secur.}, volume = {8}, number = {2/3}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-82-305}, doi = {10.3233/JCS-2000-82-305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WespiDDN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AlmgrenDD00, author = {Magnus Almgren and Herv{\'{e}} Debar and Marc Dacier}, title = {A Lightweight Tool for Detecting Web Server Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/a-lightweight-tool-for-detecting-web-server-attacks/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AlmgrenDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WespiDD00, author = {Andreas Wespi and Marc Dacier and Herv{\'{e}} Debar}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Intrusion Detection Using Variable-Length Audit Trail Patterns}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {110--129}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_8}, doi = {10.1007/3-540-39945-3\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/WespiDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2000, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3}, doi = {10.1007/3-540-39945-3}, isbn = {3-540-41085-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DebarDW99, author = {Herv{\'{e}} Debar and Marc Dacier and Andreas Wespi}, title = {Towards a taxonomy of intrusion-detection systems}, journal = {Comput. Networks}, volume = {31}, number = {8}, pages = {805--822}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(98)00017-6}, doi = {10.1016/S1389-1286(98)00017-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DebarDW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AsokanDSW99, author = {N. Asokan and Herv{\'{e}} Debar and Michael Steiner and Michael Waidner}, title = {Authenticating public terminals}, journal = {Comput. Networks}, volume = {31}, number = {8}, pages = {861--870}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(98)00020-6}, doi = {10.1016/S1389-1286(98)00020-6}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AsokanDSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WespiD99, author = {Andreas Wespi and Herv{\'{e}} Debar}, title = {Building an Intrusion-Detection System to Detect Suspicious Process Behavior}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Wespi.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WespiD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DebarDNW98, author = {Herv{\'{e}} Debar and Marc Dacier and Mehdi Nassehi and Andreas Wespi}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {1--15}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055852}, doi = {10.1007/BFB0055852}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DebarDNW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DebarBS92, author = {Herv{\'{e}} Debar and Monique Becker and Didier Siboni}, title = {A neural network component for an intrusion detection system}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {240--250}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213257}, doi = {10.1109/RISP.1992.213257}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/DebarBS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.