Eric Totel

Orcid: 0009-0009-2774-007X

According to our database1, Eric Totel authored at least 34 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022

2021
Realistic simulation of users for IT systems in cyber ranges.
CoRR, 2021

2020
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Heterogeneous Security Events Prioritization Using Auto-encoders.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

2017
STARLORD: Linked security data exploration in a 3D graph.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Hypercollecting semantics and its application to static analysis of information flow.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

Connectivity graph reconstruction for networking cloud infrastructures.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Connectivity extraction in cloud infrastructures.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection.
Proceedings of the 12th European Dependable Computing Conference, 2016

2015
Assessment of an Automatic Correlation Rules Generator.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Generation and assessment of correlation rules to detect complex attack scenarios.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications.
Int. J. Secur. Softw. Eng., 2014

Automatic generation of correlation rules to detect complex attack scenarios.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Program Transformation for Non-interference Verification on Programs with Pointers.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Detecting attacks against data in web applications.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Techniques de détection d'erreur appliquées à la détection d'intrusion.
, 2012

2011
Detecting Illegal System Calls Using a Data-Oriented Detection Model.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

Preventing data leakage in service orchestration.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2009
Application Data Consistency Checking for Anomaly Based Intrusion Detection.
Proceedings of the Stabilization, 2009

Automatic Software Instrumentation for the Detection of Non-control-data Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Building an Application Data Behavior Model for Intrusion Detection.
Proceedings of the Data and Applications Security XXIII, 2009

SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data.
Proceedings of the CRiSIS 2009, 2009

2008
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
A Dependable Intrusion Detection Architecture Based on Agreement Services.
Proceedings of the Stabilization, 2006

2005
COTS Diversity Based Intrusion Detection and Application to Web Servers.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

2004
A Language Driven IDS for Event and Alert Correlation.
Proceedings of the Security and Protection in Information Processing Systems, 2004

1998
Supporting Multiple Levels of Criticality.
Proceedings of the Digest of Papers: FTCS-28, 1998


  Loading...