default search action
Eric Totel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel:
DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach. NetSoft 2024: 369-374 - 2023
- [c32]Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel:
A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. CRiSIS 2023: 185-199 - [c31]Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. RAID 2023: 135-150 - 2022
- [c30]Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. CRiSIS 2022: 18-33 - [c29]Alexandre Dey, Eric Totel, Benjamin Costé:
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring. SEC 2022: 53-69 - 2021
- [i2]Alexandre Dey, Benjamin Coste, Eric Totel, Adrien Bécue:
Realistic simulation of users for IT systems in cyber ranges. CoRR abs/2111.11785 (2021) - 2020
- [c28]Alexandre Dey, Eric Totel, Sylvain Navers:
Heterogeneous Security Events Prioritization Using Auto-encoders. CRiSIS 2020: 164-180 - [c27]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. DIMVA 2020: 238-258 - [c26]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. EuroS&P Workshops 2020: 565-573
2010 – 2019
- 2019
- [c25]Charles Xosanavongsa, Eric Totel, Olivier Bettan:
Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events. EuroS&P 2019: 340-355 - [c24]David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero:
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. SEC 2019: 49-63 - 2018
- [c23]David Lanoë, Michel Hurfin, Eric Totel:
A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems. SRDS 2018: 31-40 - 2017
- [c22]Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel:
Connectivity extraction in cloud infrastructures. CNSM 2017: 1-5 - [c21]Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel:
Connectivity graph reconstruction for networking cloud infrastructures. NCA 2017: 81-89 - [c20]Mounir Assaf, David A. Naumann, Julien Signoles, Eric Totel, Frédéric Tronel:
Hypercollecting semantics and its application to static analysis of information flow. POPL 2017: 874-887 - [c19]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
STARLORD: Linked security data exploration in a 3D graph. VizSEC 2017: 1-4 - 2016
- [c18]Eric Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche:
Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection. EDCC 2016: 53-64 - [i1]Mounir Assaf, David A. Naumann, Julien Signoles, Eric Totel, Frédéric Tronel:
Hypercollecting Semantics and its Application to Static Analysis of Information Flow. CoRR abs/1608.01654 (2016) - 2015
- [c17]Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Generation and assessment of correlation rules to detect complex attack scenarios. CNS 2015: 707-708 - [c16]Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Assessment of an Automatic Correlation Rules Generator. ICISS 2015: 207-224 - 2014
- [j1]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [c15]Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Automatic generation of correlation rules to detect complex attack scenarios. IAS 2014: 23-28 - 2013
- [c14]Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel:
Program Transformation for Non-interference Verification on Programs with Pointers. SEC 2013: 231-244 - 2012
- [b1]Eric Totel:
Techniques de détection d'erreur appliquées à la détection d'intrusion. University of Rennes 1, France, 2012 - [c13]Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - 2011
- [c12]Thomas Demongeot, Eric Totel, Yves Le Traon:
Preventing data leakage in service orchestration. IAS 2011: 122-127 - [c11]Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong:
From SSIR to CIDre: A New Security Research Group in Rennes, France. SysSec@DIMVA 2011: 86-89 - [c10]Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel:
Detecting Illegal System Calls Using a Data-Oriented Detection Model. SEC 2011: 305-316
2000 – 2009
- 2009
- [c9]Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel:
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data. CRiSIS 2009: 51-58 - [c8]Olivier Sarrouy, Eric Totel, Bernard Jouga:
Building an Application Data Behavior Model for Intrusion Detection. DBSec 2009: 299-306 - [c7]Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel:
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. RAID 2009: 348-349 - [c6]Olivier Sarrouy, Eric Totel, Bernard Jouga:
Application Data Consistency Checking for Anomaly Based Intrusion Detection. SSS 2009: 726-740 - 2008
- [c5]Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane:
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. SEC 2008: 301-315 - 2006
- [c4]Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saïdane, Eric Totel, Frédéric Tronel:
A Dependable Intrusion Detection Architecture Based on Agreement Services. SSS 2006: 378-394 - 2005
- [c3]Eric Totel, Frédéric Majorczyk, Ludovic Mé:
COTS Diversity Based Intrusion Detection and Application to Web Servers. RAID 2005: 43-62 - 2004
- [c2]Eric Totel, Bernard Vivinis, Ludovic Mé:
A Language Driven IDS for Event and Alert Correlation. SEC 2004: 209-224
1990 – 1999
- 1998
- [c1]Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell:
Supporting Multiple Levels of Criticality. FTCS 1998: 70-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-19 19:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint