• 1240 Citations
  • 16 h-Index
19982018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2018

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2017

Preface

Dacier, M. & Bailey, M., 1 Jan 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10453 LNCS, p. V-VI

Research output: Contribution to journalEditorial

Security Challenges and Opportunities of Software-Defined Networking

Dacier, M., Konig, H., Cwalinski, R., Kargl, F. & DIetrich, S., 2017, In : IEEE Security and Privacy. 15, 2, p. 96-100 5 p., 7891523.

Research output: Contribution to journalArticle

24 Citations (Scopus)
2016

Spammers operations: A multifaceted strategic analysis

Thonnard, O., Vervier, P. A. & Dacier, M., 10 Mar 2016, In : Security and Communication Networks. 9, 4, p. 336-356 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2014

Insights on the security and dependability of industrial control systems

Kargl, F., Van Der Heijden, R. W., König, H., Valdes, A. & Dacier, M., 1 Nov 2014, In : IEEE Security and Privacy. 12, 6, p. 75-78 4 p., 7006412.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Malicious BGP hijacks: Appearances can be deceiving

Vervier, P. A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy-Keller, G., Biersack, E. & Dacier, M., 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 884-889 6 p. 6883431

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2012

Preface

Dacier, M., 6 Feb 2012, Computational Intelligence for Privacy and Security. Elizondo, D., Solanas, A. & Martinez-Balleste, A. (eds.). p. V (Studies in Computational Intelligence; vol. 394).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

The MEERKATS cloud security architecture

Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Yang, J., Benameur, A., Dacier, M., Elder, M., Kienzle, D. & Stavrou, A., 24 Sep 2012, p. 446-450. 5 p.

Research output: Contribution to conferencePaper

2011

A strategic analysis of spam botnets operations

Thonnard, O. & Dacier, M., 13 Oct 2011, Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011. p. 162-171 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Honeypot trace forensics: The observation viewpoint matters

Pham, V. H. & Dacier, M., 1 May 2011, In : Future Generation Computer Systems. 27, 5, p. 539-546 8 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

On the resilience of the dependability framework to the intrusion of new security threats

Dacier, M., 1 Dec 2011, Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday. p. 238-250 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6875 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The MINESTRONE architecture combining static and dynamic analysis techniques for software security

Keromytis, A. D., Stolfo, S. J., Yang, J., Stavrou, A., Ghosh, A., Engler, D., Dacier, M., Elder, M. & Kienzle, D., 23 Dec 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 53-56 4 p. 6092763. (Proceedings - 1st SysSec Workshop, SysSec 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2010

An analysis of rogue AV campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. D. & Dacier, M., 19 Nov 2010, Recent Advances in Intrusion Detection - 13th International Symposium, RAID 2010, Proceedings. p. 442-463 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6307 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Assessing cybercrime through the eyes of the WOMBAT

Dacier, M., Leita, C., Thonnard, O., Pham, V. H. & Kirda, E., 1 Dec 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 103-136 34 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Cyber SA: Situational awareness for cyber defense

Barford, P., Dacier, M., Dietterich, T. G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang, C. & Yen, J., 1 Dec 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 3-13 11 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

73 Citations (Scopus)
2009

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making

Thonnard, O., Mees, W. & Dacier, M., 23 Nov 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 11-21 11 p. 1599277. (Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Behavioral analysis of zombie armies

Thonnard, O., Mees, W. & Dacier, M., 2009, The Virtual Battlefield: Perspectives on Cyber Warfare. IOS Press, p. 191-210 20 p. (Cryptology and Information Security Series; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Gone rogue: An analysis of rogue security software campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. & Dacier, M., 1 Jan 2009, EC2ND 2009 - European Conference on Computer Network Defense. IEEE Computer Society, p. 1-3 3 p. 5494349. (EC2ND 2009 - European Conference on Computer Network Defense).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Honeypot traces forensics: The observation viewpoint matters

Pham, V. H. & Dacier, M., 1 Dec 2009, NSS 2009 - Network and System Security. p. 365-372 8 p. 5319287. (NSS 2009 - Network and System Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Technical perspective they do click, don't they?

Dacier, M., 1 Sep 2009, In : Communications of the ACM. 52, 9, 1 p.

Research output: Contribution to journalComment/debate

The WOMBAT attack attribution method: Some results

Dacier, M., Pham, V. H. & Thonnard, O., 14 Dec 2009, Information Systems Security - 5th International Conference, ICISS 2009, Proceedings. p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5905 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)
2008

Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology

Thonnard, O. & Dacier, M., 1 Dec 2008, Proceedings - IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008. p. 154-163 10 p. 4733933. (Proceedings - IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

A framework for attack patterns' discovery in honeynet data

Thonnard, O. & Dacier, M., 1 Jan 2008, p. S128-S139.

Research output: Contribution to conferencePaper

A framework for attack patterns' discovery in honeynet data

Thonnard, O. & Dacier, M., Sep 2008, In : Digital Investigation. 5, SUPPL., p. S128-S139

Research output: Contribution to journalArticle

42 Citations (Scopus)

Automating the analysis of honeypot data

Thonnard, O., Viinikka, J., Leita, C. & Dacier, M., 27 Nov 2008, Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings. p. 406-407 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5230 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

SGNET: A worldwide deployable framework to support the analysis of malware threat models

Leita, C. & Dacier, M., 17 Sep 2008, Proceedings - 7th European Dependable Computing Conference, EDCC-7. p. 99-109 11 p. 4555995. (Proceedings - 7th European Dependable Computing Conference, EDCC-7).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

SGNET: Implementation insights

Leita, C. & Dacier, M., 22 Sep 2008, NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services. p. 1075-1078 4 p. 4575282. (NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

The Leurre.com Project: Collecting internet threats information using a worldwide distributed honeynet

Leita, C., Pham, V. H., Thonnard, O., Ramirez-Silva, E., Pouget, F., Kirda, E. & Dacier, M., 6 Nov 2008, Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. p. 40-57 18 p. 4627314. (Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

The quest for multi-headed worms

Pham, V. H., Dacier, M., Urvoy-Keller, G. & En-Najjary, T., 27 Aug 2008, Detection of Intrusions and Malware, and Vulnerability Assessment - 5th International Conference, DIMVA 2008, Proceedings. p. 247-266 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5137 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Understanding threats: A prerequisite to enhance survivability of computing systems

Pouget, F., Dacier, M. & Pham, V. H., 14 Jan 2008, In : International Journal of Critical Infrastructures. 4, 1-2, p. 153-171 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2007
3 Citations (Scopus)

Extracting inter-arrival time based behaviour from honeypot traffic using cliques

Almotairi, S., Clark, A., Dacier, M., Leita, C., Mohay, G., Pham, V. H., Thonnard, O. & Zimmermann, J., 1 Dec 2007, Proceedings of the 5th Australian Digital Forensics Conference. p. 79-87 9 p. (Proceedings of the 5th Australian Digital Forensics Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2006

Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots

Leita, C., Dacier, M. & Massicotte, F., 1 Jan 2006, Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings. Springer Verlag, p. 185-205 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

Collection and Analysis of attack data based on Honeypots deployed on the Internet

Alata, E., Dacier, M., Deswarte, Y., Kaaâniche, M., Kortchinsky, K., Nicomette, V., Pham, V. H. & Pouget, F., 1 Dec 2006, Quality of Protection: Security Measurements and Metrics. Gollmann, D., Massacci, F. & Yautsiukhin, A. (eds.). p. 79-91 13 p. (Advances in Information Security; vol. 23).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Lessons learned from the deployment of a high-interaction honeypot

Alata, E., Nicomette, V., Kaâniche, M., Dacier, M. & Herrb, M., 1 Dec 2006, Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. p. 39-44 6 p. 4020829. (Proceedings - Sixth European Dependable Computing Conference, EDCC 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Citations (Scopus)
2005

Comparative survey of local honeypot sensors to assist network forensics

Chen, P. T., Laih, C. S., Pouget, F. & Dacier, M., 1 Dec 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 120-132 13 p. 1592526. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

ScriptGen: An automated script generation tool for honeyd

Leita, C., Mermoud, K. & Dacier, M., 1 Dec 2005, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. p. 203-214 12 p. 1565248. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

97 Citations (Scopus)

Should we share honeypot information for security management?

Wu, F., Dacier, M., Debar, H. & Chen, Y. M., 1 Dec 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. 1 p. 1440853. (2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The use of packet inter-arrival times for investigating unsolicited internet traffic

Zimmermann, J., Clark, A., Mohay, G., Pouget, F. & Dacier, M., 1 Dec 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 89-104 16 p. 1592524. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2004

Honeypots: Practical means to validate malicious fault assumptions

Dacier, M., Pouget, F. & Debar, H., 15 Jun 2004, Proceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing. p. 383-388 6 p. (Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)
2002

Mining intrusion detection alarms for actionable knowledge

Julisch, K. & Dacier, M., 1 Dec 2002, p. 366-375. 10 p.

Research output: Contribution to conferencePaper

2000

Fixed- vs. variable-length patterns for detecting suspicious process behavior

Wespi, A., Debar, H., Dacier, M. & Nassehi, M., 1 Jan 2000, In : Journal of Computer Security. 8, 2, p. 159-181 23 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Intrusion detection using variable-length audit trail patterns

Wespi, A., Dacier, M. & Debar, H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1907. p. 110-129 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1907).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

86 Citations (Scopus)

Revised taxonomy for intrusion-detection systems

Debar, H., Dacier, M. & Wespi, A., 1 Jul 2000, In : Annales des Telecommunications/Annals of Telecommunications. 55, 7, p. 361-378 18 p.

Research output: Contribution to journalArticle

149 Citations (Scopus)
1999

Towards a taxonomy of intrusion-detection systems

Debar, H., Dacier, M. & Wespi, A., 23 Apr 1999, In : Computer Networks. 31, 8, p. 805-822 18 p.

Research output: Contribution to journalArticle

376 Citations (Scopus)
1998

Fixed vs. Variable-length patterns for detecting suspicious process behavior

Debar, H., Dacier, M., Nassehi, M. & Wespi, A., 1998, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1485. p. 1-15 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1485).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)