Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Frédéric Majorczyk"'
Autor:
Nicolas Sourbier, Karol Desnos, Thomas Guyet, Frédéric Majorczyk, Olivier Gesny, Maxime Pelcat
Publikováno v:
Journal of Signal Processing Systems
Journal of Signal Processing Systems, 2022, ⟨10.1007/s11265-021-01728-1⟩
Journal of Signal Processing Systems, 2022, Design and Architectures for Signal and Image Processing 2021, 94 (7), pp.753-770. ⟨10.1007/s11265-021-01728-1⟩
Journal of Signal Processing Systems, 2022, ⟨10.1007/s11265-021-01728-1⟩
Journal of Signal Processing Systems, 2022, Design and Architectures for Signal and Image Processing 2021, 94 (7), pp.753-770. ⟨10.1007/s11265-021-01728-1⟩
International audience; The fast improvement of Machine-Learning (ML) methods gives rise to new attacks in Information System (IS). Simultaneously, ML also creates new opportunities for network intrusion detection. Early network intrusion detection i
Autor:
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Éric Totel
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031311079
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af2116b1e43e972fbb20809abe2a100b
https://doi.org/10.1007/978-3-031-31108-6_2
https://doi.org/10.1007/978-3-031-31108-6_2
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783031175091
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5dde1ea235311574c4cc6bc7fa8def3
https://doi.org/10.1007/978-3-031-17510-7_1
https://doi.org/10.1007/978-3-031-17510-7_1
Publikováno v:
Computers and Security
Computers and Security, 2022, 118 (July), pp.102723. ⟨10.1016/j.cose.2022.102723⟩
Computers and Security, 2022, 118 (July), pp.102723. ⟨10.1016/j.cose.2022.102723⟩
International audience; In this paper we develop an alert correlation framework specifically tailored for Industrial Control Systems (ICSs). Alert correlation is a set of techniques used to process alerts raised by various intrusion detection systems
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
Publikováno v:
HAL
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Aug 2018, Varsovie, Poland. pp.1-8
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Aug 2018, Varsovie, Poland. pp.1-8
International audience; Sophisticated process-aware attacks targeting industrial control systems require adequate detection measures taking into account the physical process. This paper proposes an approach relying on automatically mined process spec
Publikováno v:
CRISIS 2018-13th International Conference on Risks and Security of Internet and Systems
CRISIS 2018-13th International Conference on Risks and Security of Internet and Systems, Oct 2018, Arcachon, France. pp.1-6, ⟨10.1007/978-3-030-12143-3_12⟩
Lecture Notes in Computer Science ISBN: 9783030121426
CRiSIS
CRISIS 2018-13th International Conference on Risks and Security of Internet and Systems, Oct 2018, Arcachon, France. pp.1-6, ⟨10.1007/978-3-030-12143-3_12⟩
Lecture Notes in Computer Science ISBN: 9783030121426
CRiSIS
International audience; Security Operations Centers (SOCs) collect data related to the information systems they protect and process it to detect suspicious activities. In this paper we explain how a SOC is organized, we highlight the current limitati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c3f627ae75144b9aefc83fb2f7510df5
https://inria.hal.science/hal-01992346/file/paperSOC.pdf
https://inria.hal.science/hal-01992346/file/paperSOC.pdf
Publikováno v:
21st Nordic Conference on Secure IT Systems (NordSec 2016)
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016)
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016)
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
International audience; Industrial control systems (ICS) can be subject to highly sophisticated attacks which may lead the process towards critical states. Due to the particular context of ICS, protection mechanisms are not always practical, nor suff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5a81763e5b3d2e184d70afa731945b9
https://hal.inria.fr/hal-01361081
https://hal.inria.fr/hal-01361081
Publikováno v:
Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP
IEEE/IFIP International Workshop on Analytics for Network and Service Management
IEEE/IFIP International Workshop on Analytics for Network and Service Management, Apr 2016, Istanbul, Turkey. pp.1097-1100, ⟨10.1109/NOMS.2016.7502968⟩
NOMS
IEEE/IFIP International Workshop on Analytics for Network and Service Management
IEEE/IFIP International Workshop on Analytics for Network and Service Management, Apr 2016, Istanbul, Turkey. pp.1097-1100, ⟨10.1109/NOMS.2016.7502968⟩
NOMS
International audience; The large quantities of alerts generated by intrusion detection systems (IDS) make very difficult to distinguish on a network real threats from noise. To help solving this problem, we propose VEGAS, an alerts visualization and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::67fcb3fb41a3a29d566cacf7db38c330
https://hal.archives-ouvertes.fr/hal-01416464/document
https://hal.archives-ouvertes.fr/hal-01416464/document
Publikováno v:
Journal of Information Assurance and Security
Journal of Information Assurance and Security, 2015, 10 (3), pp.11
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
IAS
2014 International Conference on Information Assurance and Security (IAS 2014)
2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩
Journal of Information Assurance and Security, 2015, 10 (3), pp.11
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
IAS
2014 International Conference on Information Assurance and Security (IAS 2014)
2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩
International audience; Current SIEM (Security Information and Event Management) provide very simple alert correlation languages that express at best the recognition of a sequence of alerts. That’s why our team developed a correlation tool called G
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::479e4bc5a012e0ddb25d89eeea5bc32d
https://inria.hal.science/hal-01241807
https://inria.hal.science/hal-01241807
Publikováno v:
VizSec
VizSec, Nov 2014, Paris, France. ⟨10.1145/2671491.2671494⟩
VizSEC
VizSec, Nov 2014, Paris, France. ⟨10.1145/2671491.2671494⟩
VizSEC
International audience; In this article, we present CORGI, a security-oriented log visualization tool that allows security experts to visually explore and link numerous types of log files through relevant representations and global filtering. The ana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b3192a122953f519ad8015e9efdc5429
https://inria.hal.science/hal-01096331
https://inria.hal.science/hal-01096331