Ludovic Mé

Orcid: 0009-0002-1103-2430

According to our database1, Ludovic Mé authored at least 52 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022

2020
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2017
STARLORD: Linked security data exploration in a 3D graph.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

2013
Secure States versus Secure Executions - From Access Control to Flow Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Intrusion detection in distributed systems, an approach based on taint marking.
Proceedings of IEEE International Conference on Communications, 2013

2012
User Data on Androïd Smartphone Must be Protected.
ERCIM News, 2012

2011
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows.
Proceedings of the Information Systems Security - 7th International Conference, 2011

From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

2010
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.
J. Comput. Virol., 2010

Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

2009
Detecting and Excluding Misbehaving Nodes in a P2P Network.
Stud. Inform. Univ., 2009

Processing intrusion detection alert aggregates with time series modeling.
Inf. Fusion, 2009

A logic-based model to support alert correlation in intrusion detection.
Inf. Fusion, 2009

Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009

Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

An Efficient Distributed PKI for Structured P2P Networks.
Proceedings of the Proceedings P2P 2009, 2009

2008
Code obfuscation techniques for metamorphic viruses.
J. Comput. Virol., 2008

A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

Analysis of Computer Infection Risk Factors Based on Customer Network Usage.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Autonomic trust reasoning enables misbehavior detection in OLSR.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A sybilproof distributed identity management for P2P networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Model for Trust within Information Technology Management.
Proceedings of the ICEIS 2008, 2008

A Distributed Certification System for Structured P2P Networks.
Proceedings of the Resilient Networks and Services, 2008

2007
Intrusion detection and virology: an analysis of differences, similarities and complementariness.
J. Comput. Virol., 2007

Integrating trust reasonings into node behavior in olsr.
Proceedings of the Q2SWinet'07, 2007

Analysis of the implicit trust within the OLSR protocol.
Proceedings of the Trust Management, 2007

2006
A Dependable Intrusion Detection Architecture Based on Agreement Services.
Proceedings of the Stabilization, 2006

Time series modeling for IDS alert management.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
COTS Diversity Based Intrusion Detection and Application to Web Servers.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

2004
Un système de détection d'intrusions distribué pour réseaux ad hoc.
Tech. Sci. Informatiques, 2004

Détection d'intrusions : corrélation d'alertes.
Tech. Sci. Informatiques, 2004

A Language Driven IDS for Event and Alert Correlation.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A fully distributed IDS for MANET.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols.
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004

A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Fast Multipattern Search Algorithms for Intrusion Detection.
Fundam. Informaticae, 2003

Certification and Authentication Services for Securing MANET Routing Protocols.
Proceedings of the Mobile and Wireless Communications Networks, 2003

A Modular Architecture for Distributed IDS in MANET.
Proceedings of the Computational Science and Its Applications, 2003

An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.
Proceedings of the Computer Security, 2003

Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Détection des intrusions dans les systèmes d'information : la nécessaire prise en compte des caractéristiques du système surveillé.
, 2003

2002
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches.
Proceedings of the Wireless Information Systems, 2002

Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

M2D2: A Formal Data Model for IDS Alert Correlation.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

2001
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

1998
Le commerce électronique: Un état de I'art.
Ann. des Télécommunications, 1998

1993
Security Audit Trail Analysis Using Genetic Algorithms.
Proceedings of the 12th International Conference on Computer Safety, 1993


  Loading...