|
Search the dblp DataBase
Marc Dacier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Corrado Leita, Ken Mermoud, Marc Dacier
ScriptGen: an automated script generation tool for honeyd. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:203-214 [Conf]
- Marc Dacier
A Petri Net Representation of the Take-Grant Model. [Citation Graph (0, 0)][DBLP] CSFW, 1993, pp:99-108 [Conf]
- Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:1-15 [Conf]
- Marc Dacier, Yves Deswarte
Privilege Graph: an Extension to the Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP] ESORICS, 1994, pp:319-334 [Conf]
- Marc Dacier, O. Sami Saydjari
Special Seminar: Intrusion Detection. [Citation Graph (0, 0)][DBLP] FTCS, 1999, pp:238- [Conf]
- Klaus Julisch, Marc Dacier
Mining intrusion detection alarms for actionable knowledge. [Citation Graph (0, 0)][DBLP] KDD, 2002, pp:366-375 [Conf]
- Magnus Almgren, Hervé Debar, Marc Dacier
A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2000, pp:- [Conf]
- Marc Dacier, Fabien Pouget, Hervé Debar
Honeypots: Practical Means to Validate Malicious Fault Assumptions. [Citation Graph (0, 0)][DBLP] PRDC, 2004, pp:383-388 [Conf]
- Yves Cosendai, Marc Dacier, Paolo Scotton
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Corrado Leita, Marc Dacier, Frédéric Massicotte
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:185-205 [Conf]
- Andreas Wespi, Marc Dacier, Hervé Debar
Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf]
- P. T. Chen, C. S. Laih, Fabien Pouget, Marc Dacier
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:120-134 [Conf]
- Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:89-104 [Conf]
- Marc Dacier, Yves Deswarte, Mohamed Kaâniche
Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:177-186 [Conf]
- Marc Dacier, Kathleen Jackson
Intrusion detection. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:23-24, pp:2433-2434 [Journal]
- Hervé Debar, Marc Dacier, Andreas Wespi
Towards a taxonomy of intrusion-detection systems. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:8, pp:805-822 [Journal]
- Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
- E. Ramirez-Silva, Marc Dacier
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:198-211 [Conf]
- Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb
Lessons Learned from the deployment of a high-interaction honeypot [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette
Empirical analysis and statistical modeling of attack processes based on honeypots [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
08102 Working Group -- Intrusion and Fraud Detection for Web Services. [Citation Graph (, )][DBLP]
8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]
The Quest for Multi-headed Worms. [Citation Graph (, )][DBLP]
Lessons learned from the deployment of a high-interaction honeypot. [Citation Graph (, )][DBLP]
SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. [Citation Graph (, )][DBLP]
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology. [Citation Graph (, )][DBLP]
The WOMBAT Attack Attribution Method: Some Results. [Citation Graph (, )][DBLP]
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. [Citation Graph (, )][DBLP]
Automating the Analysis of Honeypot Data (Extended Abstract). [Citation Graph (, )][DBLP]
An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]
SGNET: Implementation insights. [Citation Graph (, )][DBLP]
Honeypot Traces Forensics: The Observation Viewpoint Matters. [Citation Graph (, )][DBLP]
Technical perspective - They do click, don't they? [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|