• 1428 Citations
  • 17 h-Index
19982018
If you made any changes in Pure these will be visible here soon.

Research Output 1998 2018

  • 1428 Citations
  • 17 h-Index
  • 30 Conference contribution
  • 14 Article
  • 3 Chapter
  • 2 Editorial
2018
6 Citations (Scopus)

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle
Internet
Attack
Evaluation
2017

Preface

Dacier, M. & Bailey, M., 1 Jan 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10453 LNCS, p. V-VI

Research output: Contribution to journalEditorial

21 Citations (Scopus)

Security Challenges and Opportunities of Software-Defined Networking

Dacier, M., Konig, H., Cwalinski, R., Kargl, F. & DIetrich, S., 2017, In : IEEE Security and Privacy. 15, 2, p. 96-100 5 p., 7891523.

Research output: Contribution to journalArticle

networking
Computer monitors
flexibility
Technical presentations
software
2016
2 Citations (Scopus)

Spammers operations: A multifaceted strategic analysis

Thonnard, O., Vervier, P. A. & Dacier, M., 10 Mar 2016, In : Security and Communication Networks. 9, 4, p. 336-356 21 p.

Research output: Contribution to journalArticle

Visualization
Gateways (computer networks)
Decision theory
Data fusion
Ecosystems
9 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet service providers
Denial of Service
Visualization
Attack
Traffic
2014
10 Citations (Scopus)

Insights on the security and dependability of industrial control systems

Kargl, F., Van Der Heijden, R. W., König, H., Valdes, A. & Dacier, M., 1 Nov 2014, In : IEEE Security and Privacy. 12, 6, p. 75-78 4 p., 7006412.

Research output: Contribution to journalArticle

research focus
control system
Control systems
Technical presentations
6 Citations (Scopus)

Malicious BGP hijacks: Appearances can be deceiving

Vervier, P. A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy-Keller, G., Biersack, E. & Dacier, M., 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 884-889 6 p. 6883431

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Feedback
2012

Preface

Dacier, M., 2012, In : Studies in Computational Intelligence. 394

Research output: Contribution to journalArticle

14 Citations (Scopus)

The MEERKATS cloud security architecture

Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Yang, J., Benameur, A., Dacier, M., Elder, M., Kienzle, D. & Stavrou, A., 2012, Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012. p. 446-450 5 p. 6258191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fluxes
Monitoring
2011
23 Citations (Scopus)

A strategic analysis of spam botnets operations

Thonnard, O. & Dacier, M., 2011, ACM International Conference Proceeding Series. p. 162-171 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Decision theory
Data fusion
Botnet
21 Citations (Scopus)

Honeypot trace forensics: The observation viewpoint matters

Pham, V. H. & Dacier, M., May 2011, In : Future Generation Computer Systems. 27, 5, p. 539-546 8 p.

Research output: Contribution to journalArticle

Botnet

On the resilience of the dependability framework to the intrusion of new security threats

Dacier, M., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6875 LNCS. p. 238-250 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6875 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dependability
Resilience
Taxonomies
Worm
Taxonomy
3 Citations (Scopus)

The MINESTRONE architecture combining static and dynamic analysis techniques for software security

Keromytis, A. D., Stolfo, S. J., Yang, J., Stavrou, A., Ghosh, A., Engler, D., Dacier, M., Elder, M. & Kienzle, D., 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 53-56 4 p. 6092763

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Fault tolerance
Dynamic analysis
Computer hardware
Servers
2010
24 Citations (Scopus)

An analysis of rogue AV campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. D. & Dacier, M., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6307 LNCS. p. 442-463 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6307 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystem
Software Security
Ecosystems
Longitudinal Analysis
Economics
3 Citations (Scopus)

Assessing cybercrime through the eyes of the WOMBAT

Dacier, M., Leita, C., Thonnard, O., Pham, V. H. & Kirda, E., 2010, Advances in Information Security. Vol. 46. p. 103-136 34 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

73 Citations (Scopus)

Cyber SA: Situational awareness for cyber defense

Barford, P., Dacier, M., Dietterich, T. G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang, C. & Yen, J., 2010, Advances in Information Security. Vol. 46. p. 3-13 11 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Gone rogue: An analysis of rogue security software campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. & Dacier, M., 2010, EC2ND 2009 - European Conference on Computer Network Defense. p. 1-3 3 p. 5494349

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer viruses
Life cycle
Profitability
Internet
Malware
2009
9 Citations (Scopus)

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making

Thonnard, O., Mees, W. & Dacier, M., 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 11-21 11 p. 1599277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Decision making
Monitoring
Fuzzy inference
Internet
2 Citations (Scopus)

Behavioral analysis of zombie armies

Thonnard, O., Mees, W. & Dacier, M., 2009, Cryptology and Information Security Series. Vol. 3. p. 191-210 20 p. (Cryptology and Information Security Series; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
National security
Web services
Spatial distribution
Data mining
5 Citations (Scopus)

Honeypot traces forensics: The observation viewpoint matters

Pham, V. H. & Dacier, M., 2009, NSS 2009 - Network and System Security. p. 365-372 8 p. 5319287

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet

Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD): Preface

Chen, H., Dacier, M., Moens, M. F., Paass, G. & Yang, C. C., 2009, In : Unknown Journal.

Research output: Contribution to journalArticle

Technical perspective they do click, don't they?

Dacier, M., 1 Sep 2009, In : Communications of the ACM. 52, 9, p. 98 1 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

The WOMBAT attack attribution method: Some results

Dacier, M., Pham, V. H. & Thonnard, O., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5905 LNCS. p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5905 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Honeypot
Analytical Methods
Trace
Roots
2008
9 Citations (Scopus)

Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology

Thonnard, O. & Dacier, M., 2008, Proceedings - IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008. p. 154-163 10 p. 4733933

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Internet
41 Citations (Scopus)

A framework for attack patterns' discovery in honeynet data

Thonnard, O. & Dacier, M., Sep 2008, In : Digital Investigation. 5, SUPPL.

Research output: Contribution to journalArticle

Time series analysis
Cluster Analysis
Time series
Internet
Research Personnel
16 Citations (Scopus)

A framework for attack patterns' discovery in honeynet data

Thonnard, O. & Dacier, M., 2008, DFRWS 2008 Annual Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time series analysis
Time series
Internet
Botnet
2 Citations (Scopus)

Automating the analysis of honeypot data

Thonnard, O., Viinikka, J., Leita, C. & Dacier, M., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5230 LNCS. p. 406-407 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5230 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Honeypot
Network security
Monitoring
Temporal Correlation
Network Security
29 Citations (Scopus)

SGNET: A worldwide deployable framework to support the analysis of malware threat models

Leita, C. & Dacier, M., 2008, Proceedings - 7th European Dependable Computing Conference, EDCC-7. p. 99-109 11 p. 4555995

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Farms
Acoustic waves
Malware
9 Citations (Scopus)

SGNET: Implementation insights

Leita, C. & Dacier, M., 2008, NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services. p. 1075-1078 4 p. 4575282

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Malware
24 Citations (Scopus)

The Leurre.com Project: Collecting internet threats information using a worldwide distributed honeynet

Leita, C., Pham, V. H., Thonnard, O., Ramirez-Silva, E., Pouget, F., Kirda, E. & Dacier, M., 2008, Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. p. 40-57 18 p. 4627314

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Data mining
Sensors
1 Citation (Scopus)

The quest for multi-headed worms

Pham, V. H., Dacier, M., Urvoy-Keller, G. & En-Najjary, T., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5137 LNCS. p. 247-266 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5137 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Worm
Attack
Time series
Trace
Honeypot
1 Citation (Scopus)

Understanding threats: A prerequisite to enhance survivability of computing systems

Pouget, F., Dacier, M. & Pham, V. H., 2008, In : International Journal of Critical Infrastructures. 4, 1-2, p. 153-171 19 p.

Research output: Contribution to journalArticle

Survivability
Attack
Acoustic waves
Internet
Computing
2007
3 Citations (Scopus)
Internet
Empirical Study
Trace
Attack
Telescopes
8 Citations (Scopus)

Extracting inter-arrival time based behaviour from honeypot traffic using cliques

Almotairi, S., Clark, A., Dacier, M., Leita, C., Mohay, G., Pham, V. H., Thonnard, O. & Zimmermann, J., 2007, Proceedings of the 5th Australian Digital Forensics Conference. p. 79-87 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
2006
26 Citations (Scopus)

Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots

Leita, C., Dacier, M. & Massicotte, F., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4219 LNCS. p. 185-205 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Honeypot
Diptera
Attack
Interaction
Threefolds
5 Citations (Scopus)

Collection and Analysis of attack data based on Honeypots deployed on the Internet

Alata, E., Dacier, M., Deswarte, Y., Kaaâniche, M., Kortchinsky, K., Nicomette, V., Pham, V. H. & Pouget, F., 2006, Advances in Information Security. Vol. 23. p. 79-91 13 p. (Advances in Information Security; vol. 23).

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
49 Citations (Scopus)

Lessons learned from the deployment of a high-interaction honeypot

Alata, E., Nicomette, V., Kaâniche, M., Dacier, M. & Herrb, M., 2006, Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. p. 39-44 6 p. 4020829

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
2005
11 Citations (Scopus)

Comparative survey of local honeypot sensors to assist network forensics

Chen, P. T., Laih, C. S., Pouget, F. & Dacier, M., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. Vol. 2005. p. 120-132 13 p. 1592526

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Digital forensics
93 Citations (Scopus)

ScriptGen: An automated script generation tool for honeyd

Leita, C., Mermoud, K. & Dacier, M., 2005, Proceedings - Annual Computer Security Applications Conference, ACSAC. Vol. 2005. p. 203-214 12 p. 1565248

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tuning
Internet
Network protocols

Should we share honeypot information for security management?

Wu, F., Dacier, M., Debar, H. & Chen, Y. M., 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. Vol. 2005. p. 778 1 p. 1440853

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
8 Citations (Scopus)

The use of packet inter-arrival times for investigating unsolicited internet traffic

Zimmermann, J., Clark, A., Mohay, G., Pouget, F. & Dacier, M., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. Vol. 2005. p. 89-104 16 p. 1592524

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Radiation
Monitoring
Digital forensics
2004
27 Citations (Scopus)

Honeypots: Practical means to validate malicious fault assumptions

Dacier, M., Pouget, F. & Debar, H., 2004, Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing. p. 383-388 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
2002
184 Citations (Scopus)

Mining intrusion detection alarms for actionable knowledge

Julisch, K. & Dacier, M., 2002, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Hand, D., Keim, D. & Ng, R. (eds.). p. 366-375 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Industry
Experiments
2000
15 Citations (Scopus)

Fixed- vs. variable-length patterns for detecting suspicious process behavior

Wespi, A., Debar, H., Dacier, M. & Nassehi, M., 2000, In : Journal of Computer Security. 8, 2, p. 159-181 23 p.

Research output: Contribution to journalArticle

Intrusion detection
Testbeds
Experiments
85 Citations (Scopus)

Intrusion detection using variable-length audit trail patterns

Wespi, A., Dacier, M. & Debar, H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1907. p. 110-129 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1907).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Audit
Intrusion detection
Intrusion Detection
Testbeds
Table
147 Citations (Scopus)

Revised taxonomy for intrusion-detection systems

Debar, H., Dacier, M. & Wespi, A., Jul 2000, In : Annales des Telecommunications/Annals of Telecommunications. 55, 7, p. 361-378 18 p.

Research output: Contribution to journalArticle

Intrusion detection
Taxonomies
Information systems
Computer systems
Monitoring
1999
371 Citations (Scopus)

Towards a taxonomy of intrusion-detection systems

Debar, H., Dacier, M. & Wespi, A., 23 Apr 1999, In : Computer Networks. 31, 8, p. 805-822 18 p.

Research output: Contribution to journalArticle

Intrusion detection
Taxonomies
Information systems
Computer systems
Computer networks
1998
14 Citations (Scopus)

Fixed vs. Variable-length patterns for detecting suspicious process behavior

Debar, H., Dacier, M., Nassehi, M. & Wespi, A., 1998, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1485. p. 1-15 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1485).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Intrusion Detection
Testbeds
Testbed
Model