The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ludovic Mé: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé
    A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:428-437 [Conf]
  2. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:364-373 [Conf]
  3. Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier
    Time series modeling for IDS alert management. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:102-113 [Conf]
  4. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:291-308 [Conf]
  5. Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba
    A Modular Architecture for Distributed IDS in MANET. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:91-113 [Conf]
  6. Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior
    Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. [Citation Graph (0, 0)][DBLP]
    WONS, 2004, pp:213-226 [Conf]
  7. Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael de Sousa
    A fully distributed IDS for MANET. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:331-338 [Conf]
  8. Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé
    M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:115-127 [Conf]
  9. Eric Totel, Frédéric Majorczyk, Ludovic Mé
    COTS Diversity Based Intrusion Detection and Application to Web Servers. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:43-62 [Conf]
  10. Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye
    A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:17-27 [Conf]
  11. Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin
    Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:130-144 [Conf]
  12. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:292-306 [Conf]
  13. C. Michel, Ludovic Mé
    ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:353-368 [Conf]
  14. Eric Totel, Bernard Vivinis, Ludovic Mé
    A Language Driven IDS for Event and Alert Correlation. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:209-224 [Conf]
  15. Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic Mé, Ricardo Staciarini Puttini
    Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2002, pp:1-12 [Conf]
  16. Josué Kuri, Gonzalo Navarro, Ludovic Mé
    Fast Multipattern Search Algorithms for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:56, n:1-2, pp:23-49 [Journal]
  17. Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo
    Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal]
  18. Jean-Marc Percher, Ricardo Staciarini Puttini, Ludovic Mé, Olivier Camp, Bernard Jouga, Patrick Albers
    Un système de détection d'intrusions distribué pour réseaux ad hoc. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:391-420 [Journal]
  19. Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saidane, Eric Totel, Frédéric Tronel
    A Dependable Intrusion Detection Architecture Based on Agreement Services. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:378-394 [Conf]
  20. Benjamin Morin, Ludovic Mé
    Intrusion detection and virology: an analysis of differences, similarities and complementariness. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:1, pp:39-49 [Journal]

  21. Model for Trust within Information Technology Management. [Citation Graph (, )][DBLP]


  22. A sybilproof distributed identity management for P2P networks. [Citation Graph (, )][DBLP]


  23. Integrating trust reasonings into node behavior in olsr. [Citation Graph (, )][DBLP]


  24. An Efficient Distributed PKI for Structured P2P Networks. [Citation Graph (, )][DBLP]


  25. Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. [Citation Graph (, )][DBLP]


  26. Autonomic trust reasoning enables misbehavior detection in OLSR. [Citation Graph (, )][DBLP]


  27. Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. [Citation Graph (, )][DBLP]


  28. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification. [Citation Graph (, )][DBLP]


  29. A Distributed Certification System for Structured P2P Networks. [Citation Graph (, )][DBLP]


  30. Analysis of Computer Infection Risk Factors Based on Customer Network Usage. [Citation Graph (, )][DBLP]


  31. Policy-based intrusion detection in Web applications by monitoring Java information flows. [Citation Graph (, )][DBLP]


Search in 0.153secs, Finished in 0.155secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002