


default search action
Sylvain Gombault
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j5]Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon
, Sylvain Gombault, Jean-Marie Bonnin:
A training-resistant anomaly detection system. Comput. Secur. 76: 1-11 (2018) - 2017
- [j4]Steve Muller, Carlo Harpes, Yves Le Traon
, Sylvain Gombault, Jean-Marie Bonnin:
Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Comput. Secur. 64: 59-68 (2017) - 2016
- [c14]Steve Muller, Carlo Harpes, Yves Le Traon
, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann:
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. CRITIS 2016: 163-175 - 2015
- [j3]Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault:
Constructing important features from massive network traffic for lightweight intrusion detection. IET Inf. Secur. 9(6): 374-379 (2015) - [c13]Djibrilla Amadou Kountché
, Sylvain Gombault:
Specification-Based Intrusion Detection Using Sequence Alignment and Data Clustering. FNSS 2015: 31-46 - 2014
- [c12]Erwan Abgrall, Yves Le Traon, Sylvain Gombault, Martin Monperrus
:
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing. ICST Workshops 2014: 34-41 - 2012
- [i1]Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault:
XSS-FP: Browser Fingerprinting using HTML Parser Quirks. CoRR abs/1211.4812 (2012) - 2011
- [c11]Tejeddine Mouelhi, Yves Le Traon
, Erwan Abgrall, Benoit Baudry, Sylvain Gombault:
Tailored Shielding and Bypass Testing of Web Applications. ICST 2011: 210-219
2000 – 2009
- 2009
- [j2]Wei Wang, Xiangliang Zhang, Sylvain Gombault:
Constructing attribute weights from computer audit data for effective intrusion detection. J. Syst. Softw. 82(12): 1974-1981 (2009) - [c10]Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog:
Attribute Normalization in Network Intrusion Detection. ISPAN 2009: 448-453 - 2008
- [c9]Wei Wang, Sylvain Gombault:
Efficient detection of DDoS attacks with important attributes. CRiSIS 2008: 61-67 - 2007
- [c8]Wei Wang, Sylvain Gombault:
Distance Measures for Anomaly Intrusion Detection. Security and Management 2007: 17-23 - [c7]Salem Benferhat, Karima Sedki, Sylvain Gombault:
Towards Selecting Relevant Attributes using Decision Trees for Intrusion Detection. HPCNCS 2007: 224-230 - 2006
- [j1]Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García
, Sylvain Gombault, Thierry Sans:
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Ann. des Télécommunications 61(1-2): 197-217 (2006) - [c6]Yacine Bouzida, Frédéric Cuppens, Sylvain Gombault:
Detecting and Reacting against Distributed Denial of Service Attacks. ICC 2006: 2394-2400 - 2004
- [c5]Frédéric Cuppens, Sylvain Gombault, Thierry Sans:
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. CSFW 2004: 78-87 - [c4]Yacine Bouzida, Sylvain Gombault:
Eigenconnections to Intrusion Detection. SEC 2004: 241-258 - 2000
- [c3]Olivier Paul, Maryline Laurent
, Sylvain Gombault:
A Full Bandwidth ATM Firewall. ESORICS 2000: 206-221
1990 – 1999
- 1999
- [c2]Olivier Paul, Maryline Laurent
, Sylvain Gombault:
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. ACSAC 1999: 75-83 - 1994
- [c1]P. Rolin, Laurent Toutain, Sylvain Gombault:
Network Security Probe. CCS 1994: 229-240
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint