Skip to Main content Skip to Navigation


...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
hal-01241807v1  Journal articles
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
...
hal-01949183v1  Conference papers
David LanoeMichel HurfinEric Totel. A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems
SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩
hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
...
hal-01619234v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. STARLORD: Linked Security Data Exploration in a 3D Graph
VizSec - IEEE Symposium on Visualization for Cyber Security, Oct 2017, Phoenix, United States. pp.1 - 4, ⟨10.1109/VIZSEC.2017.8062203⟩
...
hal-01612988v1  Conference papers
Pernelle MensahSamuel DubusWael KanounChristine MorinGuillaume Piolle et al.  Connectivity Graph Reconstruction for Networking Cloud Infrastructures
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Oct 2017, Cambridge, United States. ⟨10.1109/nca.2017.8171337⟩
hal-01334608v1  Conference papers
Eric TotelMouna HkimiMichel HurfinMourad LeslousYvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock
SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France
...
hal-02409487v1  Conference papers
David LanoeMichel HurfinEric TotelCarlos Maziero. An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications
SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
...
hal-02363431v1  Conference papers
Charles XosanavongsaEric TotelOlivier Bettan. Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events
EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩
...
hal-02950489v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
DIMVA 2020 - 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.1-20
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
...
hal-01091327v1  Conference papers
E GodefroyEric TotelM HurfinF MajorczykA Maaroufi. Automatiser la construction de règles de corrélation : prérequis et processus
C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Nov 2014, Rennes, France. pp.9
...
hal-00909293v1  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs
SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France
hal-00735996v1  Journal articles
Thomas DemongeotEric TotelValérie Viet Triem TongYves Le Traon. User Data Confidentiality in an Orchestration of Web Services
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2012, 7 (1), pp.32-40
...
hal-01091385v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩
...
hal-01593346v1  Conference papers
Pernelle MensahSamuel DubusWael KanounChristine MorinGuillaume Piolle et al.  Connectivity Extraction in Cloud Infrastructures
2017 13th International Conference on Network and Service Management (CNSM), Nov 2017, Tokyo, Japan. pp.1-5, ⟨10.23919/cnsm.2017.8256010⟩
...
hal-01334604v1  Conference papers
Mounir AssafJulien SignolesEric TotelFrédéric Tronel. The Cardinal Abstraction for Quantitative Information Flow
Workshop on Foundations of Computer Security 2016 (FCS 2016), Jun 2016, Lisbon, Portugal
...
hal-01618360v1  Conference papers
Mounir AssafDavid NaumannJulien SignolesEric TotelFrédéric Tronel. Hypercollecting Semantics and its Application to Static Analysis of Information Flow
POPL 2017 - ACM Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.874-887, ⟨10.1145/3009837.3009889⟩
...
hal-00814671v2  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Program Transformation for Non-interference Verification on Programs with Pointers
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.231-244, ⟨10.1007/978-3-642-39218-4_18⟩
...
hal-01083699v1  Conference papers
Erwan GodefroyEric TotelFrédéric MajorczykMichel Hurfin. Génération automatique de règles de corrélation pour la détection d'attaques complexes
9eme conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI), May 2014, Lyon, France. pp.10
...
tel-00763746v1  Habilitation à diriger des recherches
Eric Totel. Techniques de détection d'erreur appliquées à la détection d'intrusion
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2012