dblp.uni-trier.dewww.uni-trier.de

Hervé Debar

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
34EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: XeNA: an access negotiation framework using XACML. Annales des Télécommunications 64(1-2): 155-169 (2009)
33EEGrégoire Jacob, Hervé Debar, Eric Filiol: Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions CoRR abs/0902.0322: (2009)
32EEGrégoire Jacob, Eric Filiol, Hervé Debar: Formalization of malware through process calculi CoRR abs/0902.0469: (2009)
2008
31EERichard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
30EEMarc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008
29EENora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar: Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187
28EEYannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant: Analysis of Computer Infection Risk Factors Based on Customer Network Usage. SECURWARE 2008: 317-325
27EEGrégoire Jacob, Eric Filiol, Hervé Debar: Malware as interaction machines: a new framework for behavior modelling. Journal in Computer Virology 4(3): 235-250 (2008)
26EEGrégoire Jacob, Hervé Debar, Eric Filiol: Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology 4(3): 251-266 (2008)
2007
25EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318
24EEHervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3(3): 195-210 (2007)
2006
23EEYohann Thomas, Hervé Debar, Benjamin Morin: Improving Security Management through Passive Network Observation. ARES 2006: 382-389
22EEJouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier: Time series modeling for IDS alert management. ASIACCS 2006: 102-113
21EEHervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens: Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128
20EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: An extended RBAC profile of XACML. SWS 2006: 13-22
19 Frédéric Cuppens, Hervé Debar, Elisa Bertino: Foreword. Annales des Télécommunications 61(3-4): 242-244 (2006)
2005
18EEHervé Debar, Jouni Viinikka: Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. FOSAD 2005: 207-236
17EEBenjamin Morin, Hervé Debar: Conceptual Analysis of Intrusion Alarms. ICIAP 2005: 91-98
2004
16EEElvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé: A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. ACSAC 2004: 428-437
15EEMarc Dacier, Fabien Pouget, Hervé Debar: Honeypots: Practical Means to Validate Malicious Fault Assumptions. PRDC 2004: 383-388
14EEJouni Viinikka, Hervé Debar: Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. RAID 2004: 166-187
13 Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo: Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques 23(3): 359-390 (2004)
2003
12EEBenjamin Morin, Hervé Debar: Correlation of Intrusion Symptoms: An Application of Chronicles. RAID 2003: 94-112
2002
11EEBenjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé: M2D2: A Formal Data Model for IDS Alert Correlation. RAID 2002: 115-127
10EEHervé Debar, Benjamin Morin: Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. RAID 2002: 177-198
2001
9EEHervé Debar, Andreas Wespi: Aggregation and Correlation of Intrusion-Detection Alerts. Recent Advances in Intrusion Detection 2001: 85-103
2000
8 Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings Springer 2000
7EEMagnus Almgren, Hervé Debar, Marc Dacier: A Lightweight Tool for Detecting Web Server Attacks. NDSS 2000
6EEAndreas Wespi, Marc Dacier, Hervé Debar: Intrusion Detection Using Variable-Length Audit Trail Patterns. Recent Advances in Intrusion Detection 2000: 110-129
5 Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi: Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. Journal of Computer Security 8(2/3): (2000)
1999
4EEAndreas Wespi, Hervé Debar: Building an Intrusion-Detection System to Detect Suspicious Process Behavior. Recent Advances in Intrusion Detection 1999
3EEHervé Debar, Marc Dacier, Andreas Wespi: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8): 805-822 (1999)
2EEN. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999)
1998
1EEHervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi: Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. ESORICS 1998: 1-15

Coauthor Index

1Magnus Almgren [7]
2N. Asokan [2]
3Fabien Autrel [13]
4Salem Benferhat [13]
5Elisa Bertino [19]
6Roland Büschkes [31]
7Yannick Carlinet [28]
8Frédéric Cuppens [13] [19] [20] [21] [24] [25] [29] [34]
9Nora Cuppens-Boulahia (Nora Boulahia-Cuppens) [20] [21] [24] [25] [29] [34]
10Marc Dacier [1] [3] [5] [6] [7] [15] [30]
11Mireille Ducassé [11] [13] [16]
12Ali Fessi [31]
13Eric Filiol [26] [27] [32] [33]
14Yvon Gourhant [28]
15Dirk Haage [31]
16Diala Abi Haidar [20] [25] [29] [34]
17Peter Herrmann [31]
18Ralph Holz [31]
19Thorsten Holz [30]
20Grégoire Jacob [26] [27] [32] [33]
21Marko Jahnke [31]
22Richard A. Kemmerer [31]
23Engin Kirda [30]
24Jan Kohlrausch [30]
25Hartmut König [31]
26Christopher Krügel (Christopher Kruegel) [30]
27Ludovic Mé [8] [11] [13] [16] [22] [28]
28Benjamin Morin [10] [11] [12] [13] [17] [23]
29Mehdi Nassehi [1] [5]
30Rodolphe Ortalo [13]
31Fabien Pouget [15]
32Konrad Rieck [30]
33Renaud Séguier [22]
34Michael Steiner [2]
35James P. G. Sterbenz [30]
36Yohann Thomas [21] [23] [24]
37Elvis Tombini [16]
38Jouni Viinikka [14] [18] [22]
39Bernard Vivinis [13]
40Michael Waidner [2]
41Andreas Wespi [1] [3] [4] [5] [6] [9]
42Stephen D. Wolthusen [31]
43Shyhtsun Felix Wu [8]
44Tanja Zseby [31]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)