Gérard Wagener

According to our database1, Gérard Wagener authored at least 19 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Taxonomy driven indicator scoring in MISP threat intelligence platforms.
CoRR, 2019

2018
Decaying Indicators of Compromise.
CoRR, 2018

AIL - The design and implementation of an Analysis Information Leak framework.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2012
Torinj : Automated Exploitation Malware Targeting Tor Users
CoRR, 2012

Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. (Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour).
PhD thesis, 2011

Heliza: talking dirty to the attackers.
J. Comput. Virol., 2011

Adaptive and self-configurable honeypots.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Digging into IP Flow Records with a Visual Kernel Method.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Monitoring of Spatial-Aggregated IP-Flow Records.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Self Adaptive High Interaction Honeypots Driven by Game Theory.
Proceedings of the Stabilization, 2009

Malware analysis with graph kernels and support vector machines.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

2008
Malware behaviour analysis.
J. Comput. Virol., 2008

An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...