Skip to Main content Skip to Navigation


...
inria-00472287v3  Conference papers
Daniel Le MétayerManuel MaarekEduardo MazzaMarie-Laure PotetStéphane Frénot et al.  Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study
ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩
hal-00268410v1  Conference papers
J.-M. BorelloLudovic MéEric Filiol. Techniques d'obscurcissement de code pour virus métamorphes
Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France
...
hal-02381411v1  Journal articles
Claude KirchnerLudovic Mé. Défis de la recherche scientifique en cyber-sécurité
Annales des Mines - Enjeux Numériques, Conseil général de l'Économie, ministère de l'Économie et des Finances, 2019, pp.1-15
...
hal-01619234v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. STARLORD: Linked Security Data Exploration in a 3D Graph
VizSec - IEEE Symposium on Visualization for Cyber Security, Oct 2017, Phoenix, United States. pp.1 - 4, ⟨10.1109/VIZSEC.2017.8062203⟩
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
...
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
hal-00356403v1  Conference papers
Elvis TombiniHervé DebarLudovic MéMireille Ducassé. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p
hal-00356418v1  Journal articles
Hervé DebarBenjamin MorinFrédéric CuppensFabien AutrelLudovic Mé et al.  Détection d'intrusions : corrélation d'alertes
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2004, 23, 32 p
hal-00926075v1  Conference papers
Ludovic Mé. Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI)
11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Jun 2013, Rennes, France
hal-00909400v1  Conference papers
Stéphane GellerValérie Viet Triem TongLudovic Mé. BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies
SECUREWARE - 7th International Conference on Emerging Security Information, Systems and Technologies - 2013, 2013, Barcelona, Spain
hal-00269302v1  Conference papers
Michel HurfinJean-Pierre Le NarzulFrédéric MajorczykLudovic MéAyda Saidane et al.  A dependable intrusion detection architecture based on agreement services
Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems, Nov 2006, France. 17 p
...
hal-02414281v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersécurité
Inria, pp.18, 2019, Inria white book
...
hal-01993308v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersecurity
Inria, pp.172, 2019, Inria white book
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-02950489v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
DIMVA 2020 - 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.1-20