2009 |
34 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
XeNA: an access negotiation framework using XACML.
Annales des Télécommunications 64(1-2): 155-169 (2009) |
33 | EE | Grégoire Jacob,
Hervé Debar,
Eric Filiol:
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
CoRR abs/0902.0322: (2009) |
32 | EE | Grégoire Jacob,
Eric Filiol,
Hervé Debar:
Formalization of malware through process calculi
CoRR abs/0902.0469: (2009) |
2008 |
31 | EE | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 |
30 | EE | Marc Dacier,
Hervé Debar,
Thorsten Holz,
Engin Kirda,
Jan Kohlrausch,
Christopher Kruegel,
Konrad Rieck,
James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy.
Network Attack Detection and Defense 2008 |
29 | EE | Nora Cuppens-Boulahia,
Frédéric Cuppens,
Diala Abi Haidar,
Hervé Debar:
Negotiation of Prohibition: An Approach Based on Policy Rewriting.
SEC 2008: 173-187 |
28 | EE | Yannick Carlinet,
Ludovic Mé,
Hervé Debar,
Yvon Gourhant:
Analysis of Computer Infection Risk Factors Based on Customer Network Usage.
SECURWARE 2008: 317-325 |
27 | EE | Grégoire Jacob,
Eric Filiol,
Hervé Debar:
Malware as interaction machines: a new framework for behavior modelling.
Journal in Computer Virology 4(3): 235-250 (2008) |
26 | EE | Grégoire Jacob,
Hervé Debar,
Eric Filiol:
Behavioral detection of malware: from a survey towards an established taxonomy.
Journal in Computer Virology 4(3): 251-266 (2008) |
2007 |
25 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
Resource Classification Based Negotiation in Web Services.
IAS 2007: 313-318 |
24 | EE | Hervé Debar,
Yohann Thomas,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy.
Journal in Computer Virology 3(3): 195-210 (2007) |
2006 |
23 | EE | Yohann Thomas,
Hervé Debar,
Benjamin Morin:
Improving Security Management through Passive Network Observation.
ARES 2006: 382-389 |
22 | EE | Jouni Viinikka,
Hervé Debar,
Ludovic Mé,
Renaud Séguier:
Time series modeling for IDS alert management.
ASIACCS 2006: 102-113 |
21 | EE | Hervé Debar,
Yohann Thomas,
Nora Boulahia-Cuppens,
Frédéric Cuppens:
Using Contextual Security Policies for Threat Response.
DIMVA 2006: 109-128 |
20 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
An extended RBAC profile of XACML.
SWS 2006: 13-22 |
19 | | Frédéric Cuppens,
Hervé Debar,
Elisa Bertino:
Foreword.
Annales des Télécommunications 61(3-4): 242-244 (2006) |
2005 |
18 | EE | Hervé Debar,
Jouni Viinikka:
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management.
FOSAD 2005: 207-236 |
17 | EE | Benjamin Morin,
Hervé Debar:
Conceptual Analysis of Intrusion Alarms.
ICIAP 2005: 91-98 |
2004 |
16 | EE | Elvis Tombini,
Hervé Debar,
Ludovic Mé,
Mireille Ducassé:
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic.
ACSAC 2004: 428-437 |
15 | EE | Marc Dacier,
Fabien Pouget,
Hervé Debar:
Honeypots: Practical Means to Validate Malicious Fault Assumptions.
PRDC 2004: 383-388 |
14 | EE | Jouni Viinikka,
Hervé Debar:
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information.
RAID 2004: 166-187 |
13 | | Hervé Debar,
Benjamin Morin,
Frédéric Cuppens,
Fabien Autrel,
Ludovic Mé,
Bernard Vivinis,
Salem Benferhat,
Mireille Ducassé,
Rodolphe Ortalo:
Détection d'intrusions : corrélation d'alertes.
Technique et Science Informatiques 23(3): 359-390 (2004) |
2003 |
12 | EE | Benjamin Morin,
Hervé Debar:
Correlation of Intrusion Symptoms: An Application of Chronicles.
RAID 2003: 94-112 |
2002 |
11 | EE | Benjamin Morin,
Ludovic Mé,
Hervé Debar,
Mireille Ducassé:
M2D2: A Formal Data Model for IDS Alert Correlation.
RAID 2002: 115-127 |
10 | EE | Hervé Debar,
Benjamin Morin:
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.
RAID 2002: 177-198 |
2001 |
9 | EE | Hervé Debar,
Andreas Wespi:
Aggregation and Correlation of Intrusion-Detection Alerts.
Recent Advances in Intrusion Detection 2001: 85-103 |
2000 |
8 | | Hervé Debar,
Ludovic Mé,
Shyhtsun Felix Wu:
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings
Springer 2000 |
7 | EE | Magnus Almgren,
Hervé Debar,
Marc Dacier:
A Lightweight Tool for Detecting Web Server Attacks.
NDSS 2000 |
6 | EE | Andreas Wespi,
Marc Dacier,
Hervé Debar:
Intrusion Detection Using Variable-Length Audit Trail Patterns.
Recent Advances in Intrusion Detection 2000: 110-129 |
5 | | Andreas Wespi,
Hervé Debar,
Marc Dacier,
Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
Journal of Computer Security 8(2/3): (2000) |
1999 |
4 | EE | Andreas Wespi,
Hervé Debar:
Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Recent Advances in Intrusion Detection 1999 |
3 | EE | Hervé Debar,
Marc Dacier,
Andreas Wespi:
Towards a taxonomy of intrusion-detection systems.
Computer Networks 31(8): 805-822 (1999) |
2 | EE | N. Asokan,
Hervé Debar,
Michael Steiner,
Michael Waidner:
Authenticating public terminals.
Computer Networks 31(8): 861-870 (1999) |
1998 |
1 | EE | Hervé Debar,
Marc Dacier,
Mehdi Nassehi,
Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
ESORICS 1998: 1-15 |