Jules Pagna Disso

According to our database1, Jules Pagna Disso authored at least 21 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Similarity hash based scoring of portable executable files for efficient malware detection in IoT.
Future Gener. Comput. Syst., 2020

2019
A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined Network.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

2018
An Approach to Detecting Distributed Denial of Service Attacks in Software Defined Networks.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

The World of Malware: An Overview.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Cyber Threat Intelligence from Honeypot Data Using Elasticsearch.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
DoS Attack Impact Assessment on Software Defined Networks.
Proceedings of the Wireless and Satellite Systems, 2017

Evaluation of AV systems against modern malware.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Cyber-Attack Modeling Analysis Techniques: An Overview.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
A survey of cyber security management in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2015

Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2013
A Next-Generation Approach to Combating Botnets.
Computer, 2013

Performance modelling and analysis of the delay aware routing metric in Cognitive Radio Ad Hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Towards a SCADA Forensics Architecture.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Towards an enterprise self-healing system against botnets attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

CARDINAL-E: AIS Extensions to CARDINAL for Decentralised Self-Organisation for Network Security.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

A Quantitative Measure of the Security Risk Level of Enterprise Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Plausible Solution to SCADA Security Honeypot Systems.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2011
Performance Evaluation Study of Intrusion Detection Systems.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

2010
A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment.
PhD thesis, 2010


  Loading...