Skip to Main content Skip to Navigation


...
hal-01619234v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. STARLORD: Linked Security Data Exploration in a 3D Graph
VizSec - IEEE Symposium on Visualization for Cyber Security, Oct 2017, Phoenix, United States. pp.1 - 4, ⟨10.1109/VIZSEC.2017.8062203⟩
...
hal-02950489v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.238-258, ⟨10.1007/978-3-030-52683-2_12⟩
...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova, Italy. pp.1-9, ⟨10.1109/EuroSPW51379.2020.00083⟩
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00926075v1  Conference papers
Ludovic Mé. Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI)
11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Jun 2013, Rennes, France
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
...
hal-02381411v1  Journal articles
Claude KirchnerLudovic Mé. Défis de la recherche scientifique en cyber-sécurité
Annales des Mines - Enjeux Numériques, Conseil général de l'Économie, ministère de l'Économie et des Finances, 2019, pp.1-15
...
hal-01993308v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersecurity
Inria, pp.172, 2019, Inria white book