Frédéric Massicotte

According to our database1, Frédéric Massicotte authored at least 17 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2017
Revisiting Static Analysis of Android Malware.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

2012
Navigating and visualizing the malware intelligence space.
IEEE Netw., 2012

On the Verification and Validation of Signature-Based, Network Intrusion Detection Systems.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

A Testing Model for Dynamic Malware Analysis Systems.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
An analysis of signature overlaps in Intrusion Detection Systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Specification-Based Testing of Intrusion Detection Engines Using Logical Expression Testing Criteria.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Traffic Behaviour Characterization Using NetMate.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Packet Space Analysis of Intrusion Detection Signatures.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Using Contextual Information for IDS Alarm Classification (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Toward Automatic Generation of Intrusion Detection Verification Rules.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Model-Driven, Network-Context Sensitive Intrusion Detection.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

2006
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Automatic Evaluation of Intrusion Detection Systems.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases.
Proceedings of the Third Annual Conference on Privacy, 2005

2004
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
Proceedings of the Second Annual Conference on Privacy, 2004


  Loading...