2008 |
26 | EE | Van-Hau Pham,
Marc Dacier,
Guillaume Urvoy-Keller,
Taoufik En-Najjary:
The Quest for Multi-headed Worms.
DIMVA 2008: 247-266 |
25 | EE | Olivier Thonnard,
Marc Dacier:
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology.
ICDM Workshops 2008: 154-163 |
24 | EE | Corrado Leita,
Marc Dacier:
SGNET: Implementation insights.
NOMS 2008: 1075-1078 |
23 | EE | Marc Dacier,
Ulrich Flegel,
Ralph Holz,
Norbert Luttenberger:
08102 Working Group -- Intrusion and Fraud Detection for Web Services.
Network Attack Detection and Defense 2008 |
22 | EE | Marc Dacier,
Hervé Debar,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Konrad Rieck,
James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy.
Network Attack Detection and Defense 2008 |
21 | EE | Olivier Thonnard,
Jouni Viinikka,
Corrado Leita,
Marc Dacier:
Automating the Analysis of Honeypot Data (Extended Abstract).
RAID 2008: 406-407 |
2007 |
20 | EE | E. Ramirez-Silva,
Marc Dacier:
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces.
ASIAN 2007: 198-211 |
19 | EE | Eric Alata,
Vincent Nicomette,
Mohamed Kaâniche,
Marc Dacier,
Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot
CoRR abs/0704.0858: (2007) |
18 | EE | Mohamed Kaâniche,
Yves Deswarte,
Eric Alata,
Marc Dacier,
Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR abs/0704.0861: (2007) |
2006 |
17 | EE | Corrado Leita,
Marc Dacier,
Frédéric Massicotte:
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.
RAID 2006: 185-205 |
2005 |
16 | EE | Corrado Leita,
Ken Mermoud,
Marc Dacier:
ScriptGen: an automated script generation tool for honeyd.
ACSAC 2005: 203-214 |
15 | EE | Pei-Te Chen,
Chi-Sung Laih,
Fabien Pouget,
Marc Dacier:
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics.
SADFE 2005: 120-134 |
14 | EE | Jacob Zimmermann,
Andrew Clark,
George M. Mohay,
Fabien Pouget,
Marc Dacier:
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
SADFE 2005: 89-104 |
2004 |
13 | EE | Marc Dacier,
Fabien Pouget,
Hervé Debar:
Honeypots: Practical Means to Validate Malicious Fault Assumptions.
PRDC 2004: 383-388 |
2002 |
12 | EE | Klaus Julisch,
Marc Dacier:
Mining intrusion detection alarms for actionable knowledge.
KDD 2002: 366-375 |
2000 |
11 | EE | Magnus Almgren,
Hervé Debar,
Marc Dacier:
A Lightweight Tool for Detecting Web Server Attacks.
NDSS 2000 |
10 | EE | Andreas Wespi,
Marc Dacier,
Hervé Debar:
Intrusion Detection Using Variable-Length Audit Trail Patterns.
Recent Advances in Intrusion Detection 2000: 110-129 |
9 | | Andreas Wespi,
Hervé Debar,
Marc Dacier,
Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
Journal of Computer Security 8(2/3): (2000) |
1999 |
8 | EE | Marc Dacier,
O. Sami Saydjari:
Special Seminar: Intrusion Detection.
FTCS 1999: 238 |
7 | EE | Yves Cosendai,
Marc Dacier,
Paolo Scotton:
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks.
Recent Advances in Intrusion Detection 1999 |
6 | EE | Marc Dacier,
Kathleen Jackson:
Intrusion detection.
Computer Networks 31(23-24): 2433-2434 (1999) |
5 | EE | Hervé Debar,
Marc Dacier,
Andreas Wespi:
Towards a taxonomy of intrusion-detection systems.
Computer Networks 31(8): 805-822 (1999) |
1998 |
4 | EE | Hervé Debar,
Marc Dacier,
Mehdi Nassehi,
Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
ESORICS 1998: 1-15 |
1996 |
3 | | Marc Dacier,
Yves Deswarte,
Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security.
SEC 1996: 177-186 |
1994 |
2 | EE | Marc Dacier,
Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model.
ESORICS 1994: 319-334 |
1993 |
1 | | Marc Dacier:
A Petri Net Representation of the Take-Grant Model.
CSFW 1993: 99-108 |