Zobrazeno 1 - 10
of 123
pro vyhledávání: '"Hervé, Debar"'
Because of the threat of advanced multi-step attacks, it is often difficult for security operators to completely cover all vulnerabilities when deploying remediations. Deploying sensors to monitor attacks exploiting residual vulnerabilities is not su
Externí odkaz:
http://arxiv.org/abs/1606.09042
Autor:
Alexander Motzek, Gustavo Gonzalez-Granadillo, Hervé Debar, Joaquin Garcia-Alfaro, Ralf Möller
Publikováno v:
EURASIP Journal on Information Security, Vol 2017, Iss 1, Pp 1-22 (2017)
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and requires assessments from different perpendicular viewpoints. However, current research focuses on reducing the impact of an attack irregardless of si
Externí odkaz:
https://doaj.org/article/0096d193cf6841c2b980a273a734666a
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 165, Iss Proc. AIDP 2014, Pp 1-14 (2014)
Research in information security has generally focused on providing a comprehensive interpretation of threats, vulnerabilities, and attacks, in particular to evaluate their danger and prioritize responses accordingly. Most of the current approaches p
Externí odkaz:
https://doaj.org/article/32e98a7e6eda40748801dd2cee88281f
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171420
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b173a30c611c5fea553fad61d25fe3be
https://doi.org/10.1007/978-3-031-17143-7_31
https://doi.org/10.1007/978-3-031-17143-7_31
Autor:
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar, Yannick Chevalier, Amine Medad, Baptiste Gregorutti, Edouard Genetay, Alexandre Peter Nguema, Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de de Souza Lima, Rémy Charayron, Thierry Lefèvre, Nathalie Bartoli, Joseph Morlier, Zakaria Chihani, Bruno Carron, Stephan Brunessaux, Léonard Caquot, Tristan Charrier, Badre El Bezzaz Semlali, Oudomsack Pierre Pasquero, Alexis Bazin, Pierre-Elisée Flory, Katarzyna Kapusta, Oana Stan, Vincent Thouvenot, Karel Hynek, Romain Ferrari, Aimen Boudguiga, Renaud Sirdey, Alice Héliou, Thomas Cejka, Daria La Rocca, Martin Zuber, George Vardoulias, Ioannis Papaioannou, Andreas Vekinis, Georgia Papadopoulou, Marc Vincent, Amal El Fallah-Seghrouchni, Vincent Corruble, Narayan Bernardin, Rami Kassab, Frédéric Barbaresco, Karim Tit, Teddy Furon, Mathias Rousset, Louis-Marie Traonouez, Pierre-Yves Lagrave, Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier, Aleksei Iancheruk, Ahmed Allali, Julien Rodriguez, Tejas Bhor, Ricardo Garcia, Jean-Eudes Guilhot-Gaudeffroy, Robert Plana
Publikováno v:
pp.1-152, 2021
HAL
HAL
6th European Cyber Week (6ème semaine européenne de la cybersécurité et de la cyberdéfense)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f7dfc118ffb956c27559ee25e9520267
https://hal.science/hal-03535661
https://hal.science/hal-03535661
Publikováno v:
PRDC
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩
International audience; The rapid development of the Internet of Things (IoT) has prompted a recent interest into realistic IoT network traffic generation. Security practitioners need IoT network traffic data to develop and assess network-based intru
Publikováno v:
2020 IEEE 28th International Conference on Network Protocols (ICNP)
ICNP 2020: IEEE 28th International Conference on Network Protocols
ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩
ICNP
ICNP 2020: IEEE 28th International Conference on Network Protocols
ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩
ICNP
International audience; Recent developments in orchestration and machine learning have made network automation more feasible, allowing the transition from error-prone and time-consuming manual manipulations to fast and refined automated responses in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2b09a19b0cb4836a189d2031ec405e60
https://hal.archives-ouvertes.fr/hal-03124039
https://hal.archives-ouvertes.fr/hal-03124039
Publikováno v:
ICISSP
Publikováno v:
ACM Computing Surveys
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.article 90-. ⟨10.1145/3232848⟩
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.article 90-. ⟨10.1145/3232848⟩
International audience; Intrusion Detection Systems (IDS) are key components for securing critical infrastructures, capable of detecting malicious activities on networks or hosts. However, the efficiency of an IDS depends primarily on both its config
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conferenc