The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marc Dacier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Corrado Leita, Ken Mermoud, Marc Dacier
    ScriptGen: an automated script generation tool for honeyd. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:203-214 [Conf]
  2. Marc Dacier
    A Petri Net Representation of the Take-Grant Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:99-108 [Conf]
  3. Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
    Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:1-15 [Conf]
  4. Marc Dacier, Yves Deswarte
    Privilege Graph: an Extension to the Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:319-334 [Conf]
  5. Marc Dacier, O. Sami Saydjari
    Special Seminar: Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    FTCS, 1999, pp:238- [Conf]
  6. Klaus Julisch, Marc Dacier
    Mining intrusion detection alarms for actionable knowledge. [Citation Graph (0, 0)][DBLP]
    KDD, 2002, pp:366-375 [Conf]
  7. Magnus Almgren, Hervé Debar, Marc Dacier
    A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  8. Marc Dacier, Fabien Pouget, Hervé Debar
    Honeypots: Practical Means to Validate Malicious Fault Assumptions. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:383-388 [Conf]
  9. Yves Cosendai, Marc Dacier, Paolo Scotton
    Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  10. Corrado Leita, Marc Dacier, Frédéric Massicotte
    Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:185-205 [Conf]
  11. Andreas Wespi, Marc Dacier, Hervé Debar
    Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf]
  12. P. T. Chen, C. S. Laih, Fabien Pouget, Marc Dacier
    Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:120-134 [Conf]
  13. Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
    The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:89-104 [Conf]
  14. Marc Dacier, Yves Deswarte, Mohamed Kaâniche
    Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:177-186 [Conf]
  15. Marc Dacier, Kathleen Jackson
    Intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:23-24, pp:2433-2434 [Journal]
  16. Hervé Debar, Marc Dacier, Andreas Wespi
    Towards a taxonomy of intrusion-detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:805-822 [Journal]
  17. Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi
    Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  18. E. Ramirez-Silva, Marc Dacier
    Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:198-211 [Conf]
  19. Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb
    Lessons Learned from the deployment of a high-interaction honeypot [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  20. Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette
    Empirical analysis and statistical modeling of attack processes based on honeypots [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  21. 08102 Working Group -- Intrusion and Fraud Detection for Web Services. [Citation Graph (, )][DBLP]


  22. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]


  23. The Quest for Multi-headed Worms. [Citation Graph (, )][DBLP]


  24. Lessons learned from the deployment of a high-interaction honeypot. [Citation Graph (, )][DBLP]


  25. SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. [Citation Graph (, )][DBLP]


  26. Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology. [Citation Graph (, )][DBLP]


  27. The WOMBAT Attack Attribution Method: Some Results. [Citation Graph (, )][DBLP]


  28. Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. [Citation Graph (, )][DBLP]


  29. Automating the Analysis of Honeypot Data (Extended Abstract). [Citation Graph (, )][DBLP]


  30. An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]


  31. SGNET: Implementation insights. [Citation Graph (, )][DBLP]


  32. Honeypot Traces Forensics: The Observation Viewpoint Matters. [Citation Graph (, )][DBLP]


  33. Technical perspective - They do click, don't they? [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002