Alexandre Dey
According to our database1,
Alexandre Dey authored at least 11 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Simulating Online Behaviours and Threat Patterns for Training against Influence Operations.
Proceedings of the 32nd Computer & Electronics Security Application Rendezvous (C&ESAR 2025) co-located with the 10th European Cyber Week (ECW 2025), 2025
Pouvez-Vous Détecter le Piège? Détection de Pots de Miel Face à l'Évolution des Tactiques d'Évasion(Can You Spot the Trap? Honeypot Detection in the Face of Evolving Evasion Tactics).
Proceedings of the 32nd Computer & Electronics Security Application Rendezvous (C&ESAR 2025) co-located with the 10th European Cyber Week (ECW 2025), 2025
SocialForge: simulating the social internet to provide realistic training against influence operations.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 6: Industry Track), 2025
2022
Datascience in support of cybersecurity operations : Adaptable, robust and explainable anomaly detection for security analysts. (Science de la donnée en appui des opérations de cybersécurité : Détection d'anomalies adaptable, robuste et explicable pour les analystes de sécurité).
PhD thesis, 2022
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2021
2020
Adversarial vs behavioural-based defensive AI with joint, continual and active learning: automated evaluation of robustness to deception, poisoning and concept drift.
CoRR, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2018
J. Comput. Virol. Hacking Tech., 2018
Protection of an information system by artificial intelligence: a three-phase approach based on behaviour analysis to detect a hostile scenario.
CoRR, 2018
Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018