Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Alexandre Dey"'
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783031069741
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c2b5c99f42e838bec52f64797737cc79
https://doi.org/10.1007/978-3-031-06975-8_4
https://doi.org/10.1007/978-3-031-06975-8_4
Autor:
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar, Yannick Chevalier, Amine Medad, Baptiste Gregorutti, Edouard Genetay, Alexandre Peter Nguema, Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de de Souza Lima, Rémy Charayron, Thierry Lefèvre, Nathalie Bartoli, Joseph Morlier, Zakaria Chihani, Bruno Carron, Stephan Brunessaux, Léonard Caquot, Tristan Charrier, Badre El Bezzaz Semlali, Oudomsack Pierre Pasquero, Alexis Bazin, Pierre-Elisée Flory, Katarzyna Kapusta, Oana Stan, Vincent Thouvenot, Karel Hynek, Romain Ferrari, Aimen Boudguiga, Renaud Sirdey, Alice Héliou, Thomas Cejka, Daria La Rocca, Martin Zuber, George Vardoulias, Ioannis Papaioannou, Andreas Vekinis, Georgia Papadopoulou, Marc Vincent, Amal El Fallah-Seghrouchni, Vincent Corruble, Narayan Bernardin, Rami Kassab, Frédéric Barbaresco, Karim Tit, Teddy Furon, Mathias Rousset, Louis-Marie Traonouez, Pierre-Yves Lagrave, Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier, Aleksei Iancheruk, Ahmed Allali, Julien Rodriguez, Tejas Bhor, Ricardo Garcia, Jean-Eudes Guilhot-Gaudeffroy, Robert Plana
Publikováno v:
pp.1-152, 2021
HAL
HAL
6th European Cyber Week (6ème semaine européenne de la cybersécurité et de la cyberdéfense)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f7dfc118ffb956c27559ee25e9520267
https://hal.science/hal-03535661
https://hal.science/hal-03535661
Publikováno v:
CAID 2021 : applications de l’Intelligence Artificielle aux problématiques défense
CAID 2021 : applications de l’Intelligence Artificielle aux problématiques défense, Nov 2021, Rennes, France
HAL
CAID 2021 : applications de l’Intelligence Artificielle aux problématiques défense, Nov 2021, Rennes, France
HAL
Generating user activity is a key capability for both evaluating security monitoring tools as well as improving the credibility of attacker analysis platforms (e.g., honeynets). In this paper, to generate this activity, we instrument each machine by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5062001bd143b9440e3019b2cdd3f46a
https://hal.archives-ouvertes.fr/hal-03437031/document
https://hal.archives-ouvertes.fr/hal-03437031/document
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030688868
CRiSIS
CRiSIS
In a large monitored information system, analysts are confronted with a huge number of heterogeneous events or alerts produced by audit mechanisms or Intrusion Detection Systems. Even though they can use SIEM software to collect and analyse these eve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3da34ef2399e7e3f335182dfc9ac3ee2
https://doi.org/10.1007/978-3-030-68887-5_10
https://doi.org/10.1007/978-3-030-68887-5_10
Autor:
Alexandre Dey, Paul Irolla
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 14:245-249
The Drebin dataset (in: NDSS, 2014) is the most supplied academic dataset of Android malware. Therefore it is the most used dataset in research papers on Android malware detection. The research community is using it for evaluation and comparison of t
Publikováno v:
ICISSP