Search the dblp DataBase
Hervé Debar :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yohann Thomas , Hervé Debar , Benjamin Morin Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:382-389 [Conf ] Elvis Tombini , Hervé Debar , Ludovic Mé , Mireille Ducassé A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:428-437 [Conf ] Jouni Viinikka , Hervé Debar , Ludovic Mé , Renaud Séguier Time series modeling for IDS alert management. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:102-113 [Conf ] Hervé Debar , Yohann Thomas , Nora Boulahia-Cuppens , Frédéric Cuppens Using Contextual Security Policies for Threat Response. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:109-128 [Conf ] Hervé Debar , Marc Dacier , Mehdi Nassehi , Andreas Wespi Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:1-15 [Conf ] Hervé Debar , Jouni Viinikka Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. [Citation Graph (0, 0)][DBLP ] FOSAD, 2005, pp:207-236 [Conf ] Benjamin Morin , Hervé Debar Conceptual Analysis of Intrusion Alarms. [Citation Graph (0, 0)][DBLP ] ICIAP, 2005, pp:91-98 [Conf ] Magnus Almgren , Hervé Debar , Marc Dacier A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Marc Dacier , Fabien Pouget , Hervé Debar Honeypots: Practical Means to Validate Malicious Fault Assumptions. [Citation Graph (0, 0)][DBLP ] PRDC, 2004, pp:383-388 [Conf ] Benjamin Morin , Hervé Debar Correlation of Intrusion Symptoms: An Application of Chronicles. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:94-112 [Conf ] Benjamin Morin , Ludovic Mé , Hervé Debar , Mireille Ducassé M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:115-127 [Conf ] Hervé Debar , Benjamin Morin Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:177-198 [Conf ] Hervé Debar , Andreas Wespi Aggregation and Correlation of Intrusion-Detection Alerts. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:85-103 [Conf ] Jouni Viinikka , Hervé Debar Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:166-187 [Conf ] Andreas Wespi , Hervé Debar Building an Intrusion-Detection System to Detect Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Andreas Wespi , Marc Dacier , Hervé Debar Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf ] Frédéric Cuppens , Hervé Debar , Elisa Bertino Foreword. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:242-244 [Journal ] N. Asokan , Hervé Debar , Michael Steiner , Michael Waidner Authenticating public terminals. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal ] Hervé Debar , Marc Dacier , Andreas Wespi Towards a taxonomy of intrusion-detection systems. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:805-822 [Journal ] Andreas Wespi , Hervé Debar , Marc Dacier , Mehdi Nassehi Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal ] Hervé Debar , Benjamin Morin , Frédéric Cuppens , Fabien Autrel , Ludovic Mé , Bernard Vivinis , Salem Benferhat , Mireille Ducassé , Rodolphe Ortalo Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP ] Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal ] Hervé Debar , Yohann Thomas , Frédéric Cuppens , Nora Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:3, pp:195-210 [Journal ] Formalization of Viruses and Malware Through Process Algebras. [Citation Graph (, )][DBLP ] 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP ] 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP ] A Service Dependency Modeling Framework for Policy-Based Response Enforcement. [Citation Graph (, )][DBLP ] A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP ] Service Dependencies in Information Systems Security. [Citation Graph (, )][DBLP ] Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. [Citation Graph (, )][DBLP ] Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP ] An extended RBAC profile of XACML. [Citation Graph (, )][DBLP ] Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP ] Analysis of Computer Infection Risk Factors Based on Customer Network Usage. [Citation Graph (, )][DBLP ] An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP ] XeNA: an access negotiation framework using XACML. [Citation Graph (, )][DBLP ] Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions [Citation Graph (, )][DBLP ] Formalization of malware through process calculi [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.333secs