Skip to Main content Skip to Navigation

lirmm-00430642v1  Book sections
Verma NischalFrançois TroussetPascal PonceletFlorent Masseglia. Intrusion Detections in Collaborative Organizations by Preserving Privacy
Fabrice Guillet and Gilbert Ritschard and Djamel Abdelkader Zighed and Henri Briand. Advances in Knowledge Discovery and Management, 292, Springer, pp.235-247, 2010, Studies in Computational Intelligence, 978-3-642-00579-4. ⟨10.1007/978-3-642-00580-0_14⟩
hal-03145963v1  Conference papers
Alban SifferAlexandre TermierPierre-Alain FouqueChristine Largouët. Netspot: a simple Intrusion Detection System with statistical learning
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Dec 2020, Guangzhou, China. ⟨10.1109/TrustCom50675.2020.00122⟩
hal-03085554v1  Conference papers
Amir Teshome WonjigaLouis RillingChristine Morin. SLA Definition for Network Intrusion Detection Systems in IaaS Clouds
SAC 2021 - 36th ACM/SIGAPP Symposium on Applied Computing, Mar 2021, Virtual Event, Republic of Korea., South Korea. pp.1-10, ⟨10.1145/3412841.3441885⟩
hal-00995674v1  Conference papers
Damien RiquetGilles GrimaudMichaël Hauspie. Un langage pour la configuration de DISCUS, une architecture distribuée de solutions de sécurité
ComPAS 2014 : conférence en parallélisme, architecture et systèmes, Apr 2014, Neuchâtel, Suisse
hal-00723739v1  Conference papers
Damien RiquetGilles GrimaudMichaël Hauspie. Large-scale coordinated attacks : Impact on the cloud security
The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012, Jul 2012, Palermo, Italy. pp.558
hal-01833587v1  Conference papers
Wei WangSylvain GombaultThomas Guyet. Towards fast detecting intrusions: using key attributes of network traffic
ICIMP 2008 - Third International Conference on Internet Monitoring and Protection, Jun 2008, Bucharest, Romania. pp.86-91, ⟨10.1109/ICIMP.2008.13⟩
hal-01833588v1  Conference papers
Wei WangSylvain Gombault. Efficient Detection of DDoS Attacks with Important Attributes
CRISIS 2008 - Third International Conference on Risks and Security on Internet and Systems, Oct 2008, Tozeur, Tunisia. pp.61-67, ⟨10.1109/CRISIS.2008.4757464⟩
hal-00425315v1  Journal articles
Jacques SaraydaryanFatiha BenaliStéphane Ubéda. Comprehensive Security Framework for Global Threats Analysis
International Journal of Computer Science, World Academy of Science, Engineering and Technology, 2009, 2, pp.15
tel-02007847v1  Theses
Steve Muller. Risk monitoring with intrusion detection for industrial control systems
Cryptography and Security [cs.CR]. Ecole nationale supérieure Mines-Télécom Atlantique, 2018. English. ⟨NNT : 2018IMTA0082⟩
hal-01636299v1  Conference papers
Anaël BeaugnonPierre ChifflierFrancis Bach. ILAB: An Interactive Labelling Strategy for Intrusion Detection
RAID 2017: Research in Attacks, Intrusions and Defenses, Sep 2017, Atlanta, United States
lirmm-00798705v1  Book sections
Goverdhan SinghFlorent MassegliaCéline FiotAlice MarascuPascal Poncelet. Mining Common Outliers for Intrusion Detection
Fabrice Guillet; Gilbert Ritschard; Djamel Abdelkader Zighed; Henri Briand. Advances in Knowledge Discovery and Management, 292, Springer, pp.217-234, 2010, Studies in Computational Intelligence, 978-3-642-00579-4. ⟨10.1007/978-3-642-00580-0_13⟩
hal-01340460v1  Poster communications
Anna GiannakouLouis RillingChristine MorinJean-Louis Pazat. Self Adaptation for Security Monitoring in IaaS clouds
EIT Digital symposium on the future of cloud computing, Oct 2015, Rennes, France. 2015
tel-02872028v1  Theses
Damien Crémilleux. Visualization for information system security monitoring
Cryptography and Security [cs.CR]. CentraleSupélec, 2019. English. ⟨NNT : 2019CSUP0013⟩
hal-01354974v1  Conference papers
Amir Teshome WonjigaLouis RillingChristine Morin. Including Security Monitoring in Cloud SLA
SEC2 2016 - Second workshop on Security in Clouds, Jul 2016, Lorient, France
lirmm-00430646v1  Conference papers
François TroussetPascal PonceletFlorent Masseglia. SAX: A Privacy Preserving General Purpose Method applied to Detection of Intrusions
ACM First International Workshop on Privacy and Anonymity for Very Large Datasets, join with CIKM 09, Nov 2009, Hong Kong, China. pp.17-24
tel-02418978v1  Habilitation à diriger des recherches
Stéphane Mocanu. Cyberdéfense des infrastructures critiques
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014
hal-01894500v1  Conference papers
Routa MoussailebBenjamin BougetAurélien PalisseHélène Le BouderNora Cuppens-Boulahia et al.  Ransomware's Early Mitigation Mechanisms
ARES 2018 - 13th International Conference on Availability, Reliability and Security, Aug 2018, Hambourg, Germany. ⟨10.1145/3230833.3234691⟩
hal-01653650v2  Journal articles
Pierre-François Marteau. Sequence Covering for Efficient Host-Based Intrusion Detection
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩
hal-02294610v1  Conference papers
Moulay ElaabidKhaled KarrayJean-Luc DangerSylvain Guilley. Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
hal-01068374v1  Directions of work or proceedings
Michel AbdallaRoberto de Prisco. Security and Cryptography for Networks - SCN 2014
Michel Abdalla; Roberto De Prisco. Security and Cryptography for Networks - SCN 2014, Sep 2014, Amalfi, Italy. 8642, Springer, pp.609, 2014, Lecture Notes in Computer Science, 978-3-319-10878-0. ⟨10.1007/978-3-319-10879-7⟩
tel-01653831v2  Theses
Anna Giannakou. Self-adaptable Security Monitoring for IaaS Cloud Environments
Cryptography and Security [cs.CR]. INSA de Rennes, 2017. English. ⟨NNT : 2017ISAR0021⟩
hal-01403774v1  Conference papers
Louis RillingChristine Morin. INDIC : Supervision de sécurité à la carte pour les utilisateurs de cloud IaaS
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des systèmes d'information (RESSI 2016), LAAS-CNRS, INSA Toulouse, May 2016, Toulouse, France
hal-01091385v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩