The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hervé Debar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yohann Thomas, Hervé Debar, Benjamin Morin
    Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:382-389 [Conf]
  2. Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé
    A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:428-437 [Conf]
  3. Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier
    Time series modeling for IDS alert management. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:102-113 [Conf]
  4. Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens
    Using Contextual Security Policies for Threat Response. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:109-128 [Conf]
  5. Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
    Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:1-15 [Conf]
  6. Hervé Debar, Jouni Viinikka
    Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:207-236 [Conf]
  7. Benjamin Morin, Hervé Debar
    Conceptual Analysis of Intrusion Alarms. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:91-98 [Conf]
  8. Magnus Almgren, Hervé Debar, Marc Dacier
    A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  9. Marc Dacier, Fabien Pouget, Hervé Debar
    Honeypots: Practical Means to Validate Malicious Fault Assumptions. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:383-388 [Conf]
  10. Benjamin Morin, Hervé Debar
    Correlation of Intrusion Symptoms: An Application of Chronicles. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:94-112 [Conf]
  11. Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé
    M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:115-127 [Conf]
  12. Hervé Debar, Benjamin Morin
    Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:177-198 [Conf]
  13. Hervé Debar, Andreas Wespi
    Aggregation and Correlation of Intrusion-Detection Alerts. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:85-103 [Conf]
  14. Jouni Viinikka, Hervé Debar
    Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:166-187 [Conf]
  15. Andreas Wespi, Hervé Debar
    Building an Intrusion-Detection System to Detect Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  16. Andreas Wespi, Marc Dacier, Hervé Debar
    Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf]
  17. Frédéric Cuppens, Hervé Debar, Elisa Bertino
    Foreword. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:242-244 [Journal]
  18. N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner
    Authenticating public terminals. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal]
  19. Hervé Debar, Marc Dacier, Andreas Wespi
    Towards a taxonomy of intrusion-detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:805-822 [Journal]
  20. Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi
    Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  21. Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo
    Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal]
  22. Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
    Enabling automated threat response through the use of a dynamic security policy. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:3, pp:195-210 [Journal]

  23. Formalization of Viruses and Malware Through Process Algebras. [Citation Graph (, )][DBLP]


  24. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]


  25. 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP]


  26. A Service Dependency Modeling Framework for Policy-Based Response Enforcement. [Citation Graph (, )][DBLP]


  27. A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP]


  28. Service Dependencies in Information Systems Security. [Citation Graph (, )][DBLP]


  29. Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. [Citation Graph (, )][DBLP]


  30. Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP]


  31. An extended RBAC profile of XACML. [Citation Graph (, )][DBLP]


  32. Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP]


  33. Analysis of Computer Infection Risk Factors Based on Customer Network Usage. [Citation Graph (, )][DBLP]


  34. An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP]


  35. XeNA: an access negotiation framework using XACML. [Citation Graph (, )][DBLP]


  36. Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions [Citation Graph (, )][DBLP]


  37. Formalization of malware through process calculi [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.333secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002