Alexandre Dulaunoy

Orcid: 0000-0002-5437-4652

According to our database1, Alexandre Dulaunoy authored at least 19 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Active and Passive Collection of SSH key material for cyber threat intelligence.
CoRR, 2022

2019
Taxonomy driven indicator scoring in MISP threat intelligence platforms.
CoRR, 2019

2018
Decaying Indicators of Compromise.
CoRR, 2018

AIL - The design and implementation of an Analysis Information Leak framework.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2013
ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Torinj : Automated Exploitation Malware Targeting Tor Users
CoRR, 2012

Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Heliza: talking dirty to the attackers.
J. Comput. Virol., 2011

Adaptive and self-configurable honeypots.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Self Adaptive High Interaction Honeypots Driven by Game Theory.
Proceedings of the Stabilization, 2009

2008
Malware behaviour analysis.
J. Comput. Virol., 2008

An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2003
Enhance Opensst Protocol's Security with Smart Card.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003


  Loading...