2009 | ||
---|---|---|
34 | EE | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: XeNA: an access negotiation framework using XACML. Annales des Télécommunications 64(1-2): 155-169 (2009) |
33 | EE | Grégoire Jacob, Hervé Debar, Eric Filiol: Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions CoRR abs/0902.0322: (2009) |
32 | EE | Grégoire Jacob, Eric Filiol, Hervé Debar: Formalization of malware through process calculi CoRR abs/0902.0469: (2009) |
2008 | ||
31 | EE | Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 |
30 | EE | Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 |
29 | EE | Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar: Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187 |
28 | EE | Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant: Analysis of Computer Infection Risk Factors Based on Customer Network Usage. SECURWARE 2008: 317-325 |
27 | EE | Grégoire Jacob, Eric Filiol, Hervé Debar: Malware as interaction machines: a new framework for behavior modelling. Journal in Computer Virology 4(3): 235-250 (2008) |
26 | EE | Grégoire Jacob, Hervé Debar, Eric Filiol: Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology 4(3): 251-266 (2008) |
2007 | ||
25 | EE | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318 |
24 | EE | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3(3): 195-210 (2007) |
2006 | ||
23 | EE | Yohann Thomas, Hervé Debar, Benjamin Morin: Improving Security Management through Passive Network Observation. ARES 2006: 382-389 |
22 | EE | Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier: Time series modeling for IDS alert management. ASIACCS 2006: 102-113 |
21 | EE | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens: Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128 |
20 | EE | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: An extended RBAC profile of XACML. SWS 2006: 13-22 |
19 | Frédéric Cuppens, Hervé Debar, Elisa Bertino: Foreword. Annales des Télécommunications 61(3-4): 242-244 (2006) | |
2005 | ||
18 | EE | Hervé Debar, Jouni Viinikka: Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. FOSAD 2005: 207-236 |
17 | EE | Benjamin Morin, Hervé Debar: Conceptual Analysis of Intrusion Alarms. ICIAP 2005: 91-98 |
2004 | ||
16 | EE | Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé: A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. ACSAC 2004: 428-437 |
15 | EE | Marc Dacier, Fabien Pouget, Hervé Debar: Honeypots: Practical Means to Validate Malicious Fault Assumptions. PRDC 2004: 383-388 |
14 | EE | Jouni Viinikka, Hervé Debar: Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. RAID 2004: 166-187 |
13 | Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo: Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques 23(3): 359-390 (2004) | |
2003 | ||
12 | EE | Benjamin Morin, Hervé Debar: Correlation of Intrusion Symptoms: An Application of Chronicles. RAID 2003: 94-112 |
2002 | ||
11 | EE | Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé: M2D2: A Formal Data Model for IDS Alert Correlation. RAID 2002: 115-127 |
10 | EE | Hervé Debar, Benjamin Morin: Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. RAID 2002: 177-198 |
2001 | ||
9 | EE | Hervé Debar, Andreas Wespi: Aggregation and Correlation of Intrusion-Detection Alerts. Recent Advances in Intrusion Detection 2001: 85-103 |
2000 | ||
8 | Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings Springer 2000 | |
7 | EE | Magnus Almgren, Hervé Debar, Marc Dacier: A Lightweight Tool for Detecting Web Server Attacks. NDSS 2000 |
6 | EE | Andreas Wespi, Marc Dacier, Hervé Debar: Intrusion Detection Using Variable-Length Audit Trail Patterns. Recent Advances in Intrusion Detection 2000: 110-129 |
5 | Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi: Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. Journal of Computer Security 8(2/3): (2000) | |
1999 | ||
4 | EE | Andreas Wespi, Hervé Debar: Building an Intrusion-Detection System to Detect Suspicious Process Behavior. Recent Advances in Intrusion Detection 1999 |
3 | EE | Hervé Debar, Marc Dacier, Andreas Wespi: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8): 805-822 (1999) |
2 | EE | N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999) |
1998 | ||
1 | EE | Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi: Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. ESORICS 1998: 1-15 |