• 1428 Citations
  • 17 h-Index
19982018
If you made any changes in Pure these will be visible here soon.

Research Output 1998 2018

  • 1428 Citations
  • 17 h-Index
  • 30 Conference contribution
  • 14 Article
  • 3 Chapter
  • 2 Editorial
Filter
Conference contribution
2016
9 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet service providers
Denial of Service
Visualization
Attack
Traffic
2014
6 Citations (Scopus)

Malicious BGP hijacks: Appearances can be deceiving

Vervier, P. A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy-Keller, G., Biersack, E. & Dacier, M., 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 884-889 6 p. 6883431

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Feedback
2012
14 Citations (Scopus)

The MEERKATS cloud security architecture

Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Yang, J., Benameur, A., Dacier, M., Elder, M., Kienzle, D. & Stavrou, A., 2012, Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012. p. 446-450 5 p. 6258191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fluxes
Monitoring
2011
23 Citations (Scopus)

A strategic analysis of spam botnets operations

Thonnard, O. & Dacier, M., 2011, ACM International Conference Proceeding Series. p. 162-171 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Decision theory
Data fusion
Botnet

On the resilience of the dependability framework to the intrusion of new security threats

Dacier, M., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6875 LNCS. p. 238-250 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6875 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dependability
Resilience
Taxonomies
Worm
Taxonomy
3 Citations (Scopus)

The MINESTRONE architecture combining static and dynamic analysis techniques for software security

Keromytis, A. D., Stolfo, S. J., Yang, J., Stavrou, A., Ghosh, A., Engler, D., Dacier, M., Elder, M. & Kienzle, D., 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 53-56 4 p. 6092763

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Fault tolerance
Dynamic analysis
Computer hardware
Servers
2010
24 Citations (Scopus)

An analysis of rogue AV campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. D. & Dacier, M., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6307 LNCS. p. 442-463 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6307 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystem
Software Security
Ecosystems
Longitudinal Analysis
Economics
2 Citations (Scopus)

Gone rogue: An analysis of rogue security software campaigns

Cova, M., Leita, C., Thonnard, O., Keromytis, A. & Dacier, M., 2010, EC2ND 2009 - European Conference on Computer Network Defense. p. 1-3 3 p. 5494349

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer viruses
Life cycle
Profitability
Internet
Malware
2009
9 Citations (Scopus)

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making

Thonnard, O., Mees, W. & Dacier, M., 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 11-21 11 p. 1599277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Decision making
Monitoring
Fuzzy inference
Internet
2 Citations (Scopus)

Behavioral analysis of zombie armies

Thonnard, O., Mees, W. & Dacier, M., 2009, Cryptology and Information Security Series. Vol. 3. p. 191-210 20 p. (Cryptology and Information Security Series; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
National security
Web services
Spatial distribution
Data mining
5 Citations (Scopus)

Honeypot traces forensics: The observation viewpoint matters

Pham, V. H. & Dacier, M., 2009, NSS 2009 - Network and System Security. p. 365-372 8 p. 5319287

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet
17 Citations (Scopus)

The WOMBAT attack attribution method: Some results

Dacier, M., Pham, V. H. & Thonnard, O., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5905 LNCS. p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5905 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Honeypot
Analytical Methods
Trace
Roots
2008
9 Citations (Scopus)

Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology

Thonnard, O. & Dacier, M., 2008, Proceedings - IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008. p. 154-163 10 p. 4733933

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Internet
16 Citations (Scopus)

A framework for attack patterns' discovery in honeynet data

Thonnard, O. & Dacier, M., 2008, DFRWS 2008 Annual Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time series analysis
Time series
Internet
Botnet
2 Citations (Scopus)

Automating the analysis of honeypot data

Thonnard, O., Viinikka, J., Leita, C. & Dacier, M., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5230 LNCS. p. 406-407 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5230 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Honeypot
Network security
Monitoring
Temporal Correlation
Network Security
29 Citations (Scopus)

SGNET: A worldwide deployable framework to support the analysis of malware threat models

Leita, C. & Dacier, M., 2008, Proceedings - 7th European Dependable Computing Conference, EDCC-7. p. 99-109 11 p. 4555995

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Farms
Acoustic waves
Malware
9 Citations (Scopus)

SGNET: Implementation insights

Leita, C. & Dacier, M., 2008, NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services. p. 1075-1078 4 p. 4575282

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Malware
24 Citations (Scopus)

The Leurre.com Project: Collecting internet threats information using a worldwide distributed honeynet

Leita, C., Pham, V. H., Thonnard, O., Ramirez-Silva, E., Pouget, F., Kirda, E. & Dacier, M., 2008, Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. p. 40-57 18 p. 4627314

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Data mining
Sensors
1 Citation (Scopus)

The quest for multi-headed worms

Pham, V. H., Dacier, M., Urvoy-Keller, G. & En-Najjary, T., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5137 LNCS. p. 247-266 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5137 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Worm
Attack
Time series
Trace
Honeypot
2007
8 Citations (Scopus)

Extracting inter-arrival time based behaviour from honeypot traffic using cliques

Almotairi, S., Clark, A., Dacier, M., Leita, C., Mohay, G., Pham, V. H., Thonnard, O. & Zimmermann, J., 2007, Proceedings of the 5th Australian Digital Forensics Conference. p. 79-87 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
2006
26 Citations (Scopus)

Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots

Leita, C., Dacier, M. & Massicotte, F., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4219 LNCS. p. 185-205 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Honeypot
Diptera
Attack
Interaction
Threefolds
49 Citations (Scopus)

Lessons learned from the deployment of a high-interaction honeypot

Alata, E., Nicomette, V., Kaâniche, M., Dacier, M. & Herrb, M., 2006, Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. p. 39-44 6 p. 4020829

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
2005
11 Citations (Scopus)

Comparative survey of local honeypot sensors to assist network forensics

Chen, P. T., Laih, C. S., Pouget, F. & Dacier, M., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. Vol. 2005. p. 120-132 13 p. 1592526

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Digital forensics
93 Citations (Scopus)

ScriptGen: An automated script generation tool for honeyd

Leita, C., Mermoud, K. & Dacier, M., 2005, Proceedings - Annual Computer Security Applications Conference, ACSAC. Vol. 2005. p. 203-214 12 p. 1565248

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tuning
Internet
Network protocols

Should we share honeypot information for security management?

Wu, F., Dacier, M., Debar, H. & Chen, Y. M., 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. Vol. 2005. p. 778 1 p. 1440853

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
8 Citations (Scopus)

The use of packet inter-arrival times for investigating unsolicited internet traffic

Zimmermann, J., Clark, A., Mohay, G., Pouget, F. & Dacier, M., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. Vol. 2005. p. 89-104 16 p. 1592524

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Radiation
Monitoring
Digital forensics
2004
27 Citations (Scopus)

Honeypots: Practical means to validate malicious fault assumptions

Dacier, M., Pouget, F. & Debar, H., 2004, Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing. p. 383-388 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
2002
184 Citations (Scopus)

Mining intrusion detection alarms for actionable knowledge

Julisch, K. & Dacier, M., 2002, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Hand, D., Keim, D. & Ng, R. (eds.). p. 366-375 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Industry
Experiments
2000
85 Citations (Scopus)

Intrusion detection using variable-length audit trail patterns

Wespi, A., Dacier, M. & Debar, H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1907. p. 110-129 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1907).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Audit
Intrusion detection
Intrusion Detection
Testbeds
Table
1998
14 Citations (Scopus)

Fixed vs. Variable-length patterns for detecting suspicious process behavior

Debar, H., Dacier, M., Nassehi, M. & Wespi, A., 1998, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1485. p. 1-15 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1485).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Intrusion Detection
Testbeds
Testbed
Model