The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Benjamin Morin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yohann Thomas, Hervé Debar, Benjamin Morin
    Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:382-389 [Conf]
  2. Benjamin Morin, Hervé Debar
    Conceptual Analysis of Intrusion Alarms. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:91-98 [Conf]
  3. Benjamin Morin, Hervé Debar
    Correlation of Intrusion Symptoms: An Application of Chronicles. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:94-112 [Conf]
  4. Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé
    M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:115-127 [Conf]
  5. Hervé Debar, Benjamin Morin
    Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:177-198 [Conf]
  6. Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin
    Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:130-144 [Conf]
  7. Sébastien Canard, Fabrice Clerc, Benjamin Morin
    A Secure Universal Loyalty Card. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:13-22 [Conf]
  8. Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo
    Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal]
  9. Benjamin Morin, Ludovic Mé
    Intrusion detection and virology: an analysis of differences, similarities and complementariness. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:1, pp:39-49 [Journal]

  10. Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. [Citation Graph (, )][DBLP]


  11. ACPI: Design Principles and Concerns. [Citation Graph (, )][DBLP]


  12. Policy-based intrusion detection in Web applications by monitoring Java information flows. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002