Hervé Debar

According to our database1, Hervé Debar authored at least 97 papers between 1992 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Solving security constraints for 5G slice embedding: A proof-of-concept.
Comput. Secur., 2020

2019
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization.
ACM Comput. Surv., 2019

Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Dynamic risk management response system to handle cyber threats.
Future Gener. Comput. Syst., 2018

Multi-Provider Secure Virtual Network Embedding.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

IoT Devices Recognition Through Network Traffic Analysis.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
A polytope-based approach to measure the impact of events against critical infrastructures.
J. Comput. Syst. Sci., 2017

Selection of Pareto-efficient response plans based on financial and operational assessments.
EURASIP J. Information Security, 2017

ArOMA: An SDN based autonomic DDoS mitigation framework.
Comput. Secur., 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

2016
Bayesian Attack Model for Dynamic Risk Assessment.
CoRR, 2016

Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

New Types of Alert Correlation for Security Information and Event Management Systems.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards an Automated and Dynamic Risk Management Response System.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

ML: DDoS Damage Control with MPLS.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Hybrid Risk Assessment Model Based on Bayesian Networks.
Proceedings of the Advances in Information and Computer Security, 2016

Security Issues and Mitigation in Ethernet POWERLINK.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events.
Proceedings of the Risks and Security of Internet and Systems, 2016

StemJail: Dynamic Role Compartmentalization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index.
Comput. Electr. Eng., 2015

Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2015

Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics.
Proceedings of the SECRYPT 2015, 2015

Automated Classification of C&C Connections Through Malware URL Clustering.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs).
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Attack Volume Model: Geometrical Approach and Application.
Proceedings of the Risks and Security of Internet and Systems, 2015

TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS.
Proceedings of the 10th ACM Symposium on Information, 2015

On the Isofunctionality of Network Access Control Lists.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
RORI-based countermeasure selection using the OrBAC formalism.
Int. J. Inf. Sec., 2014

Combining Technical and Financial Impacts for Countermeasure Selection.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

Policy Enforcement Point Model.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Attribute-Based Mining Process for the Organization-Based Access Control Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Parsifal: Writing efficient and robust binary parsers, quickly.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
An ontology-driven approach to model SIEM information and operations using the SWRL formalism.
IJESDF, 2012

Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012

Challenges for Advanced Security Monitoring - The MASSIF Project.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation.
Proceedings of the Computer Network Security, 2012

Individual Countermeasure Selection Based on the Return On Response Investment Index.
Proceedings of the Computer Network Security, 2012

HADEGA: A novel MPLS-based mitigation solution to handle network attacks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

VESPA: multi-layered self-protection for cloud resources.
Proceedings of the 9th International Conference on Autonomic Computing, 2012

Cross-domain vulnerabilities over social networks.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

One year of SSL internet measurement.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
An Ontology-Based Model for SIEM Environments.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Challenges for Cloud Networking Security.
Proceedings of the Mobile Networks and Management - Second International ICST Conference, 2010

Service Dependencies in Information Systems Security.
Proceedings of the Computer Network Security, 2010

A Service Dependency Model for Cost-Sensitive Intrusion Response.
Proceedings of the Computer Security, 2010

Formalization of Viruses and Malware Through Process Algebras.
Proceedings of the ARES 2010, 2010

2009
Functional polymorphic engines: formalisation, implementation and use cases.
Journal in Computer Virology, 2009

Processing intrusion detection alert aggregates with time series modeling.
Inf. Fusion, 2009

A logic-based model to support alert correlation in intrusion detection.
Inf. Fusion, 2009

An ontology-based approach to react to network attacks.
IJICS, 2009

Formalization of malware through process calculi
CoRR, 2009

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
CoRR, 2009

XeNA: an access negotiation framework using XACML.
Annales des Télécommunications, 2009

Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Service Dependency Modeling Framework for Policy-Based Response Enforcement.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Malware as interaction machines: a new framework for behavior modelling.
Journal in Computer Virology, 2008

Behavioral detection of malware: from a survey towards an established taxonomy.
Journal in Computer Virology, 2008

Analysis of Computer Infection Risk Factors Based on Customer Network Usage.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Negotiation of Prohibition: An Approach Based on Policy Rewriting.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

8102 Working Group -- Attack Taxonomy.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

An ontology-based approach to react to network attacks.
Proceedings of the CRiSIS '08, 2008

2007
The Intrusion Detection Message Exchange Format (IDMEF).
RFC, March, 2007

Enabling automated threat response through the use of a dynamic security policy.
Journal in Computer Virology, 2007

Introduction Selection of articles from the SAR-SSI 2006.
Annales des Télécommunications, 2007

Resource Classification Based Negotiation in Web Services.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Security information management as an outsourced service.
Inf. Manag. Comput. Security, 2006

WebAnalyzer: accurate detection of HTTP attack traces in web server logs.
Annales des Télécommunications, 2006

Foreword.
Annales des Télécommunications, 2006

An extended RBAC profile of XACML.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Using Contextual Security Policies for Threat Response.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Time series modeling for IDS alert management.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Improving Security Management through Passive Network Observation.
Proceedings of the The First International Conference on Availability, 2006

2005
Conceptual Analysis of Intrusion Alarms.
Proceedings of the Image Analysis and Processing, 2005

Intrusion Detection: Introduction to Intrusion Detection and Security Information Management.
Proceedings of the Foundations of Security Analysis and Design III, 2005

2004
Détection d'intrusions : corrélation d'alertes.
Technique et Science Informatiques, 2004

Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Honeypots: Practical Means to Validate Malicious Fault Assumptions.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Correlation of Intrusion Symptoms: An Application of Chronicles.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

2002
M2D2: A Formal Data Model for IDS Alert Correlation.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

2001
Aggregation and Correlation of Intrusion-Detection Alerts.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

2000
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
Journal of Computer Security, 2000

A revised taxonomy for intrusion-detection systems.
Annales des Télécommunications, 2000

Intrusion Detection Using Variable-Length Audit Trail Patterns.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

A Lightweight Tool for Detecting Web Server Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2000

1999
Towards a taxonomy of intrusion-detection systems.
Comput. Networks, 1999

Authenticating public terminals.
Comput. Networks, 1999

Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

1992
A neural network component for an intrusion detection system.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992


  Loading...