Search the dblp DataBase
Benjamin Morin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yohann Thomas , Hervé Debar , Benjamin Morin Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:382-389 [Conf ] Benjamin Morin , Hervé Debar Conceptual Analysis of Intrusion Alarms. [Citation Graph (0, 0)][DBLP ] ICIAP, 2005, pp:91-98 [Conf ] Benjamin Morin , Hervé Debar Correlation of Intrusion Symptoms: An Application of Chronicles. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:94-112 [Conf ] Benjamin Morin , Ludovic Mé , Hervé Debar , Mireille Ducassé M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:115-127 [Conf ] Hervé Debar , Benjamin Morin Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:177-198 [Conf ] Zakia Marrakchi , Ludovic Mé , Bernard Vivinis , Benjamin Morin Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:130-144 [Conf ] Sébastien Canard , Fabrice Clerc , Benjamin Morin A Secure Universal Loyalty Card. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:13-22 [Conf ] Hervé Debar , Benjamin Morin , Frédéric Cuppens , Fabien Autrel , Ludovic Mé , Bernard Vivinis , Salem Benferhat , Mireille Ducassé , Rodolphe Ortalo Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP ] Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal ] Benjamin Morin , Ludovic Mé Intrusion detection and virology: an analysis of differences, similarities and complementariness. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:1, pp:39-49 [Journal ] Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. [Citation Graph (, )][DBLP ] ACPI: Design Principles and Concerns. [Citation Graph (, )][DBLP ] Policy-based intrusion detection in Web applications by monitoring Java information flows. [Citation Graph (, )][DBLP ] Search in 0.019secs, Finished in 0.020secs