default search action
Hervé Debar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dumitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, Hervé Debar, Apostolis Zarras, George Spanoudakis:
RAMA: a risk assessment solution for healthcare organizations. Int. J. Inf. Sec. 23(3): 1821-1838 (2024) - [c74]Arthur Tran Van, Olivier Levillain, Hervé Debar:
Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations. ARES 2024: 16:1-16:10 - 2023
- [c73]Marwan Abbas-Escribano, Hervé Debar:
An Improved Honeypot Model for Attack Detection and Analysis. ARES 2023: 142:1-142:10 - [i11]Konstantinos Lampropoulos, Apostolis Zarras, Eftychia Lakka, Polyanthi Barmpaki, Kostas Drakonakis, Manos Athanatos, Hervé Debar, Andreas Alexopoulos, Aristeidis Sotiropoulos, George Tsakirakis, Nikos Dimakopoulos, Dimitris Tsolovos, Matthias Pocs, Michalis Smyrlis, Ioannis Basdekis, Georgios Spanoudakis, Ovidiu Mihaila, Bogdan Prelipcean, Eliot Salant, Sotiris Athanassopoulos, Petros Papachristou, Ioannis Ladakis, John Chang, Evangelos Floros, Konstantinos Smyrlis, Rouven Besters, Pietro Randine, Karianna Fjeld Lovaas, John Cooper, Iulia Ilie, Gabriel Danciu, Marwan Darwish Khabbaz:
White paper on cybersecurity in the healthcare sector. The HEIR solution. CoRR abs/2310.10139 (2023) - 2022
- [c72]Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar:
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks. ESORICS (3) 2022: 637-657 - 2021
- [c71]Mustafizur R. Shahid, Hervé Debar:
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description. ICMLA 2021: 1600-1607 - [e3]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2 [contents] - [e2]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2 [contents] - [i10]Mustafizur R. Shahid, Hervé Debar:
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description. CoRR abs/2111.08510 (2021) - 2020
- [j26]François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, Houda Jmila:
Solving security constraints for 5G slice embedding: A proof-of-concept. Comput. Secur. 89 (2020) - [c70]Hervé Debar, Razvan Beuran, Yasuo Tan:
A Quantitative Study of Vulnerabilities in the Internet of Medical Things. ICISSP 2020: 164-175 - [c69]Elkin Aguas, Anthony Lambert, Grégory Blanc, Hervé Debar:
Automated Saturation Mitigation Controlled by Deep Reinforcement Learning. ICNP 2020: 1-6 - [c68]Mustafizur R. Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar:
Generative Deep Learning for Internet of Things Network Traffic Generation. PRDC 2020: 70-79
2010 – 2019
- 2019
- [j25]Christophe Kiennert, Ziad Ismail, Hervé Debar, Jean Leneutre:
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. ACM Comput. Surv. 51(5): 90:1-90:31 (2019) - [c67]Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar:
Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS. ICISSP 2019: 378-388 - [c66]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. NCA 2019: 1-5 - [i9]Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. CoRR abs/1912.11831 (2019) - 2018
- [j24]Gustavo Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquín García, Ender Alvarez, Matteo Merialdo, Serge Papillon, Hervé Debar:
Dynamic risk management response system to handle cyber threats. Future Gener. Comput. Syst. 83: 535-552 (2018) - [c65]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
IoT Devices Recognition Through Network Traffic Analysis. IEEE BigData 2018: 5187-5192 - [c64]François Boutigny, Stéphane Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu:
Multi-Provider Secure Virtual Network Embedding. NTMS 2018: 1-5 - 2017
- [j23]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar:
ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 70: 482-499 (2017) - [j22]Alexander Motzek, Gustavo Gonzalez Granadillo, Hervé Debar, Joaquín García, Ralf Möller:
Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP J. Inf. Secur. 2017: 12 (2017) - [j21]Gustavo Gonzalez Granadillo, Joaquín García, Hervé Debar:
A polytope-based approach to measure the impact of events against critical infrastructures. J. Comput. Syst. Sci. 83(1): 3-21 (2017) - [c63]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar:
Adaptive Policy-driven Attack Mitigation in SDN. XDOMO@EuroSys 2017: 4:1-4:6 - [c62]Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar:
Choosing Models for Security Metrics Visualization. MMM-ACNS 2017: 75-87 - [i8]Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
An n-sided polygonal model to calculate the impact of cyber security events. CoRR abs/1711.06073 (2017) - 2016
- [c61]Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar:
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. ARES 2016: 137-146 - [c60]Mickaël Salaün, Marion Daubignard, Hervé Debar:
StemJail: Dynamic Role Compartmentalization. AsiaCCS 2016: 865-876 - [c59]Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. CRiSIS 2016: 87-102 - [c58]Jonathan Yung, Hervé Debar, Louis Granboulan:
Security Issues and Mitigation in Ethernet POWERLINK. CyberICPS@ESORICS 2016: 87-102 - [c57]François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar:
Hybrid Risk Assessment Model Based on Bayesian Networks. IWSEC 2016: 21-40 - [c56]Gustavo Gonzalez Granadillo, Ender Alvarez, Alexander Motzek, Matteo Merialdo, Joaquín García-Alfaro, Hervé Debar:
Towards an Automated and Dynamic Risk Management Response System. NordSec 2016: 37-53 - [c55]Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Grégory Blanc:
ML: DDoS Damage Control with MPLS. NordSec 2016: 101-116 - [c54]Gustavo Gonzalez Granadillo, Mohammed El-Barbori, Hervé Debar:
New Types of Alert Correlation for Security Information and Event Management Systems. NTMS 2016: 1-7 - [c53]Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro, Hervé Debar:
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. Trustcom/BigDataSE/ISPA 2016: 340-348 - [i7]François-Xavier Aguessy, Olivier Bettan, Grégory Blanc, Vania Conan, Hervé Debar:
Bayesian Attack Model for Dynamic Risk Assessment. CoRR abs/1606.09042 (2016) - 2015
- [j20]Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Ender Alvarez, Mohammed El-Barbori, Hervé Debar:
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Comput. Electr. Eng. 47: 13-34 (2015) - [c52]Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar:
On the Isofunctionality of Network Access Control Lists. ARES 2015: 168-173 - [c51]Olivier Levillain, Baptiste Gourdin, Hervé Debar:
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. AsiaCCS 2015: 225-236 - [c50]Gustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar:
Attack Volume Model: Geometrical Approach and Application. CRiSIS 2015: 242-257 - [c49]Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez Martin:
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). NTMS 2015: 1-6 - [c48]Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. SEC 2015: 252-266 - [c47]Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar:
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics. SECRYPT 2015: 53-64 - [c46]Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. SecureComm 2015: 538-555 - 2014
- [j19]Gustavo Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob:
RORI-based countermeasure selection using the OrBAC formalism. Int. J. Inf. Sec. 13(1): 63-79 (2014) - [c45]Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar:
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. BADGERS@ESORICS 2014: 30-39 - [c44]Yosra Ben Mustapha, Hervé Debar, Gregory Blanc:
Policy Enforcement Point Model. SecureComm (1) 2014: 278-286 - [c43]Gustavo Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar:
Combining Technical and Financial Impacts for Countermeasure Selection. AIDP 2014: 1-14 - 2013
- [c42]Olivier Levillain, Hervé Debar, Benjamin Morin:
Parsifal: Writing efficient and robust binary parsers, quickly. CRiSIS 2013: 1-6 - [c41]Khaled Dassouki, Hervé Debar, Haïdar Safa, Abbas Hijazi:
A TCP delay-based mechanism for detecting congestion in the Internet. ICCIT 2013: 141-145 - [c40]Nabil Hachem, Joaquín García-Alfaro, Hervé Debar:
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies. NordSec 2013: 297-312 - [c39]Yosra Ben Mustapha, Hervé Debar:
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. SSCC 2013: 313-321 - [c38]Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro:
Attribute-Based Mining Process for the Organization-Based Access Control Model. TrustCom/ISPA/IUCC 2013: 421-430 - 2012
- [j18]Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar:
An ontology-driven approach to model SIEM information and operations using the SWRL formalism. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 104-123 (2012) - [c37]Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar:
One year of SSL internet measurement. ACSAC 2012: 11-20 - [c36]Catherine Bernard, Hervé Debar, Salim Benayoune:
Cross-domain vulnerabilities over social networks. CASoN 2012: 8-13 - [c35]Aurélien Wailly, Marc Lacoste, Hervé Debar:
VESPA: multi-layered self-protection for cloud resources. ICAC 2012: 155-160 - [c34]Nabil Hachem, Hervé Debar, Joaquín García-Alfaro:
HADEGA: A novel MPLS-based mitigation solution to handle network attacks. IPCCC 2012: 171-180 - [c33]Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal:
Individual Countermeasure Selection Based on the Return On Response Investment Index. MMM-ACNS 2012: 156-170 - [c32]Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob:
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. MMM-ACNS 2012: 203-217 - [c31]Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison:
Challenges for Advanced Security Monitoring - The MASSIF Project. TrustBus 2012: 222-223 - [i6]Georg Carle, Hervé Debar, Falko Dressler, Hartmut König:
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). Dagstuhl Reports 2(2): 1-20 (2012) - 2011
- [c30]Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar:
An Ontology-Based Model for SIEM Environments. ICGS3/e-Democracy 2011: 148-155 - 2010
- [c29]Grégoire Jacob, Eric Filiol, Hervé Debar:
Formalization of Viruses and Malware Through Process Algebras. ARES 2010: 597-602 - [c28]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
A Service Dependency Model for Cost-Sensitive Intrusion Response. ESORICS 2010: 626-642 - [c27]Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens:
Service Dependencies in Information Systems Security. MMM-ACNS 2010: 1-20 - [c26]Peter Schoo, Volker Fusenig, Victor Souza, Márcio Melo, Paul Murray, Hervé Debar, Houssem Medhioub, Djamal Zeghlache:
Challenges for Cloud Networking Security. MONAMI 2010: 298-313 - [c25]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. SEC 2010: 148-160
2000 – 2009
- 2009
- [j17]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
XeNA: an access negotiation framework using XACML. Ann. des Télécommunications 64(1-2): 155-169 (2009) - [j16]Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Hervé Debar:
An ontology-based approach to react to network attacks. Int. J. Inf. Comput. Secur. 3(3/4): 280-305 (2009) - [j15]Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
A logic-based model to support alert correlation in intrusion detection. Inf. Fusion 10(4): 285-299 (2009) - [j14]Jouni Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika P. Tarvainen:
Processing intrusion detection alert aggregates with time series modeling. Inf. Fusion 10(4): 312-324 (2009) - [j13]Grégoire Jacob, Eric Filiol, Hervé Debar:
Functional polymorphic engines: formalisation, implementation and use cases. J. Comput. Virol. 5(3): 247-261 (2009) - [c24]Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka:
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. DIMVA 2009: 176-195 - [c23]Grégoire Jacob, Hervé Debar, Eric Filiol:
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. RAID 2009: 81-100 - [i5]Grégoire Jacob, Hervé Debar, Eric Filiol:
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions. CoRR abs/0902.0322 (2009) - [i4]Grégoire Jacob, Eric Filiol, Hervé Debar:
Formalization of malware through process calculi. CoRR abs/0902.0469 (2009) - 2008
- [j12]Grégoire Jacob, Eric Filiol, Hervé Debar:
Malware as interaction machines: a new framework for behavior modelling. J. Comput. Virol. 4(3): 235-250 (2008) - [j11]Grégoire Jacob, Hervé Debar, Eric Filiol:
Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4(3): 251-266 (2008) - [c22]Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar:
An ontology-based approach to react to network attacks. CRiSIS 2008: 27-35 - [c21]Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar:
Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187 - [c20]Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant:
Analysis of Computer Infection Risk Factors Based on Customer Network Usage. SECURWARE 2008: 317-325 - [i3]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 - [i2]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j10]Frédéric Cuppens, Hervé Debar, Danielle Boulanger, Alban Gabillon:
Introduction Selection of articles from the SAR-SSI 2006. Ann. des Télécommunications 62(11-12): 1327 (2007) - [j9]Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy. J. Comput. Virol. 3(3): 195-210 (2007) - [c19]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318 - [i1]Hervé Debar, David A. Curry, Benjamin S. Feinstein:
The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765: 1-157 (2007) - 2006
- [j8]Frédéric Cuppens, Hervé Debar, Elisa Bertino:
Foreword. Ann. des Télécommunications 61(3-4): 242-244 (2006) - [j7]Hervé Debar, Elvis Tombini:
WebAnalyzer: accurate detection of HTTP attack traces in web server logs. Ann. des Télécommunications 61(5-6): 682-704 (2006) - [j6]Hervé Debar, Jouni Viinikka:
Security information management as an outsourced service. Inf. Manag. Comput. Secur. 14(5): 417-435 (2006) - [c18]Yohann Thomas, Hervé Debar, Benjamin Morin:
Improving Security Management through Passive Network Observation. ARES 2006: 382-389 - [c17]Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier:
Time series modeling for IDS alert management. AsiaCCS 2006: 102-113 - [c16]Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens:
Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128 - [c15]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
An extended RBAC profile of XACML. SWS 2006: 13-22 - 2005
- [c14]Hervé Debar, Jouni Viinikka:
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. FOSAD 2005: 207-236 - [c13]Benjamin Morin, Hervé Debar:
Conceptual Analysis of Intrusion Alarms. ICIAP 2005: 91-98 - 2004
- [j5]Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo:
Détection d'intrusions : corrélation d'alertes. Tech. Sci. Informatiques 23(3): 359-390 (2004) - [c12]Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé:
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. ACSAC 2004: 428-437 - [c11]Marc Dacier, Fabien Pouget, Hervé Debar:
Honeypots: Practical Means to Validate Malicious Fault Assumptions. PRDC 2004: 383-388 - [c10]Jouni Viinikka, Hervé Debar:
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. RAID 2004: 166-187 - 2003
- [c9]Benjamin Morin, Hervé Debar:
Correlation of Intrusion Symptoms: An Application of Chronicles. RAID 2003: 94-112 - 2002
- [c8]Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
M2D2: A Formal Data Model for IDS Alert Correlation. RAID 2002: 115-127 - [c7]Hervé Debar, Benjamin Morin:
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. RAID 2002: 177-198 - 2001
- [c6]Hervé Debar, Andreas Wespi:
Aggregation and Correlation of Intrusion-Detection Alerts. Recent Advances in Intrusion Detection 2001: 85-103 - 2000
- [j4]Hervé Debar, Marc Dacier, Andreas Wespi:
A revised taxonomy for intrusion-detection systems. Ann. des Télécommunications 55(7-8): 361-378 (2000) - [j3]Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. J. Comput. Secur. 8(2/3) (2000) - [c5]Magnus Almgren, Hervé Debar, Marc Dacier:
A Lightweight Tool for Detecting Web Server Attacks. NDSS 2000 - [c4]Andreas Wespi, Marc Dacier, Hervé Debar:
Intrusion Detection Using Variable-Length Audit Trail Patterns. Recent Advances in Intrusion Detection 2000: 110-129 - [e1]Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu:
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings. Lecture Notes in Computer Science 1907, Springer 2000, ISBN 3-540-41085-6 [contents]
1990 – 1999
- 1999
- [j2]Hervé Debar, Marc Dacier, Andreas Wespi:
Towards a taxonomy of intrusion-detection systems. Comput. Networks 31(8): 805-822 (1999) - [j1]N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner:
Authenticating public terminals. Comput. Networks 31(8): 861-870 (1999) - [c3]Andreas Wespi, Hervé Debar:
Building an Intrusion-Detection System to Detect Suspicious Process Behavior. Recent Advances in Intrusion Detection 1999 - 1998
- [c2]Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. ESORICS 1998: 1-15 - 1992
- [c1]Hervé Debar, Monique Becker, Didier Siboni:
A neural network component for an intrusion detection system. S&P 1992: 240-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint