Dynamic risk management response system to handle cyber threats
Gonzalez-Granadillo, G., Dubus, S., Motzek, A., Garcia-Alfaro, J., Alvarez, E., Merialdo, M., Papillon, S., Debar, H.
Published in Future generation computer systems (01.06.2018)
Published in Future generation computer systems (01.06.2018)
Get full text
Journal Article
A polytope-based approach to measure the impact of events against critical infrastructures
Gonzalez-Granadillo, G., Garcia-Alfaro, J., Debar, H.
Published in Journal of computer and system sciences (01.02.2017)
Published in Journal of computer and system sciences (01.02.2017)
Get full text
Journal Article
Towards a taxonomy of intrusion-detection systems
Debar, Hervé, Dacier, Marc, Wespi, Andreas
Published in Computer networks (Amsterdam, Netherlands : 1999) (23.04.1999)
Published in Computer networks (Amsterdam, Netherlands : 1999) (23.04.1999)
Get full text
Journal Article
Evaluation of P4P Based on Real Traffic Measurement
Carlinet, Y, Mé, L, Gourhant, Y, Debar, H
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
A neural network component for an intrusion detection system
Debar, H., Becker, M., Siboni, D.
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Get full text
Conference Proceeding
Journal Article
A serial combination of anomaly and misuse IDSes applied to HTTP traffic
Tombini, E., Debar, H., Me, L., Ducasse, M.
Published in 20th Annual Computer Security Applications Conference (2004)
Published in 20th Annual Computer Security Applications Conference (2004)
Get full text
Conference Proceeding
Authenticating public terminals
Asokan, N, Debar, Hervé, Steiner, Michael, Waidner, Michael
Published in Computer networks (Amsterdam, Netherlands : 1999) (23.04.1999)
Published in Computer networks (Amsterdam, Netherlands : 1999) (23.04.1999)
Get full text
Journal Article
Botnets: Lifecycle and Taxonomy
Hachem, N., Ben Mustapha, Yosra, Granadillo, G. G., Debar, H.
Published in 2011 Conference on Network and Information Systems Security (01.05.2011)
Published in 2011 Conference on Network and Information Systems Security (01.05.2011)
Get full text
Conference Proceeding
Cross-domain vulnerabilities over social networks
Bernard, C., Debar, H., Benayoune, S.
Published in 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) (01.11.2012)
Published in 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) (01.11.2012)
Get full text
Conference Proceeding
HADEGA: A novel MPLS-based mitigation solution to handle network attacks
Hachem, N., Debar, H., Garcia-Alfaro, J.
Published in 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC) (01.12.2012)
Published in 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC) (01.12.2012)
Get full text
Conference Proceeding
Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources
Wailly, A., Lacoste, M., Debar, H.
Published in 2011 Conference on Network and Information Systems Security (01.05.2011)
Published in 2011 Conference on Network and Information Systems Security (01.05.2011)
Get full text
Conference Proceeding
Combination approach to select optimal countermeasures based on the RORI index
Granadillo, G. G., Jacob, G., Debar, H., Coppolino, L.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Cost Evaluation for Intrusion Response Using Dependency Graphs
Kheir, N., Debar, H., Cuppens-Boulahia, N., Cuppens, F., Viinikka, J.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
Carlinet, Y., Me, L., Debar, H., Gourhant, Y.
Published in 2008 Second International Conference on Emerging Security Information, Systems and Technologies (01.08.2008)
Published in 2008 Second International Conference on Emerging Security Information, Systems and Technologies (01.08.2008)
Get full text
Conference Proceeding
An ontology-based approach to react to network attacks
Cuppens-Boulahia, N., Cuppens, F., Lopez de Vergara, J.E., Vazquez, E., Guerra, J., Debar, H.
Published in 2008 Third International Conference on Risks and Security of Internet and Systems (01.10.2008)
Published in 2008 Third International Conference on Risks and Security of Internet and Systems (01.10.2008)
Get full text
Conference Proceeding
An application of a recurrent network to an intrusion detection system
Debar, H., Dorizzi, B.
Published in [Proceedings 1992] IJCNN International Joint Conference on Neural Networks (1992)
Published in [Proceedings 1992] IJCNN International Joint Conference on Neural Networks (1992)
Get full text
Conference Proceeding