Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Eric Totel"'
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783031069741
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c2b5c99f42e838bec52f64797737cc79
https://doi.org/10.1007/978-3-031-06975-8_4
https://doi.org/10.1007/978-3-031-06975-8_4
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030688868
CRiSIS
CRiSIS
In a large monitored information system, analysts are confronted with a huge number of heterogeneous events or alerts produced by audit mechanisms or Intrusion Detection Systems. Even though they can use SIEM software to collect and analyse these eve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3da34ef2399e7e3f335182dfc9ac3ee2
https://doi.org/10.1007/978-3-030-68887-5_10
https://doi.org/10.1007/978-3-030-68887-5_10
Publikováno v:
WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops
WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova, Italy. pp.1-9, ⟨10.1109/EuroSPW51379.2020.00083⟩
EuroS&P Workshops
WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova, Italy. pp.1-9, ⟨10.1109/EuroSPW51379.2020.00083⟩
EuroS&P Workshops
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity (10.1109/EuroSPW51379.2020.00076) : The International Workshop on Traffic Measurements for Cybersecurity (WTMC 2020) planned its 5th edition in Genova, Italy, on June
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fc6d4d1e5de13cf92b0bf7c782123fcc
https://hal.inria.fr/hal-02950490
https://hal.inria.fr/hal-02950490
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment
DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.238-258, ⟨10.1007/978-3-030-52683-2_12⟩
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030526825
DIMVA
DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.238-258, ⟨10.1007/978-3-030-52683-2_12⟩
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030526825
DIMVA
International audience; Detecting attacks against information systems is hard because of the highly distributed, heterogeneous and evolving nature of these systems, as well as because the threat landscape is constantly evolving. Being able to timely
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e559e1d6bf98a42f646af5c842c8d0a7
https://hal.inria.fr/hal-02950489/document
https://hal.inria.fr/hal-02950489/document
Publikováno v:
SEC 2019-34th IFIP International Conference on ICT Systems Security and Privacy Protection
SEC 2019-34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
ICT Systems Security and Privacy Protection ISBN: 9783030223113
SEC
IFIP Advances in Information and Communication Technology
SEC 2019-34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
ICT Systems Security and Privacy Protection ISBN: 9783030223113
SEC
IFIP Advances in Information and Communication Technology
Part 1: Intrusion Detection; International audience; Although security issues are now addressed during the development process of distributed applications, an attack may still affect the provided services or allow access to confidential data. To dete
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3bdf08fa89b135c5940bc4c2590bc1ed
https://hal.inria.fr/hal-02409487/document
https://hal.inria.fr/hal-02409487/document
Publikováno v:
EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy
EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩
EuroS&P
EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩
EuroS&P
In order to supervise the security of a large infrastructure, the administrator deploys multiple sensors and intrusion detection systems on several critical places in the system. It is easier to explain and detect attacks if more events are logged. S
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::746036e4c4817d38296131143c802762
https://imt-atlantique.hal.science/hal-02363431
https://imt-atlantique.hal.science/hal-02363431
Publikováno v:
SRDS 2018-37th IEEE International Symposium on Reliable Distributed Systems
SRDS 2018-37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩
SRDS
SRDS 2018-37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩
SRDS
International audience; In distributed systems and in particular in industrial SCADA environments, alert correlation systems are necessary to identify complex multi-step attacks within the huge amount of alerts and events. In this paper we describe a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ba057658c1f91b53f29a8a5f899b60e2
https://hal.inria.fr/hal-01949183/file/Hal-SRDS-2018.pdf
https://hal.inria.fr/hal-01949183/file/Hal-SRDS-2018.pdf
Publikováno v:
2017 13th International Conference on Network and Service Management (CNSM)
2017 13th International Conference on Network and Service Management (CNSM), Nov 2017, Tokyo, Japan. pp.1-5, ⟨10.23919/cnsm.2017.8256010⟩
CNSM
2017 13th International Conference on Network and Service Management (CNSM), Nov 2017, Tokyo, Japan. pp.1-5, ⟨10.23919/cnsm.2017.8256010⟩
CNSM
International audience; For management and security purposes, cloud providers should know the connectivity graph between virtual machines. Since traditional methods used in physical networks produce incomplete results and are hardly usable in the Clo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a42193cc7ccce48ea44b3f9ac22b9b3b
https://hal.inria.fr/hal-01593346
https://hal.inria.fr/hal-01593346
Publikováno v:
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Oct 2017, Cambridge, United States. ⟨10.1109/nca.2017.8171337⟩
NCA
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Oct 2017, Cambridge, United States. ⟨10.1109/nca.2017.8171337⟩
NCA
International audience; Cloud providers have an incomplete view of their hosted virtual infrastructures managed by a Cloud Management System (CMS) and a Software Defined Network (SDN) controller. For various security reasons (e.g. isolation verificat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5070786c17dd739740d4f397d6efcb5
https://hal.inria.fr/hal-01612988/document
https://hal.inria.fr/hal-01612988/document
Autor:
Romaric Ludinard, Eric Alata, Mohamed Kaâniche, Frédéric Tronel, Yann Bachy, Vincent Nicomette, Eric Totel, Rim Akrout
Publikováno v:
International journal of secure software engineering
International journal of secure software engineering, IGI Global, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
International journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
International journal of secure software engineering, IGI Global, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
International journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system (IDS) for applications implemented with the Ruby on Rails framework. The goal of this intrusion detection system is to detect attacks