Marc Dacier

Orcid: 0000-0003-3206-2030

Affiliations:
  • King Abdullah University of Science and Technology (KAUST), Saudi Arabia
  • Qatar Computing Research Institute (former)


According to our database1, Marc Dacier authored at least 65 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
WPAD: Waiting Patiently for an Announced Disaster.
ACM Comput. Surv., 2023

Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Poster: The Impact of the Client Environment on Residential IP Proxies Detection.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Attacks on tomorrow's virtual world.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
BADPASS: Bots Taking ADvantage of Proxy as a Service.
Proceedings of the Information Security Practice and Experience, 2022

An industrial perspective on web scraping characteristics and open issues.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

ImMuNE: Improved Multilateration in Noisy Environments.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

2021
Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
Botnet Sizes: When Maths Meet Myths.
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020

2018
A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018

2017
Security Challenges and Opportunities of Software-Defined Networking.
IEEE Secur. Priv., 2017

2016
Spammers operations: a multifaceted strategic analysis.
Secur. Commun. Networks, 2016

Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

Visualization of actionable knowledge to mitigate DRDoS attacks.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

2015
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services.
Proceedings of the 24th USENIX Security Symposium, 2015

Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Insights on the Security and Dependability of Industrial Control Systems.
IEEE Secur. Priv., 2014

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014

Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

2012
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502).
Dagstuhl Reports, 2012

The MEERKATS Cloud Security Architecture.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Honeypot trace forensics: The observation viewpoint matters.
Future Gener. Comput. Syst., 2011

The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

A strategic analysis of spam botnets operations.
Proceedings of the 8th Annual Collaboration, 2011

On the Resilience of the Dependability Framework to the Intrusion of New Security Threats.
Proceedings of the Dependable and Historic Computing, 2011

2010
Assessing Cybercrime Through the Eyes of the WOMBAT.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

On a multicriteria clustering approach for attack attribution.
SIGKDD Explor., 2010

An Analysis of Rogue AV Campaigns.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Technical perspective - They do click, don't they?
Commun. ACM, 2009

Honeypot Traces Forensics: The Observation Viewpoint Matters.
Proceedings of the Third International Conference on Network and System Security, 2009

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

The WOMBAT Attack Attribution Method: Some Results.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
Understanding threats: a prerequisite to enhance survivability of computing systems.
Int. J. Crit. Infrastructures, 2008

A framework for attack patterns' discovery in honeynet data.
Digit. Investig., 2008

Automating the Analysis of Honeypot Data (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

SGNET: Implementation insights.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models.
Proceedings of the Seventh European Dependable Computing Conference, 2008

The Quest for Multi-headed Worms.
Proceedings of the Detection of Intrusions and Malware, 2008

08102 Working Group -- Intrusion and Fraud Detection for Web Services.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

8102 Working Group -- Attack Taxonomy.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces.
Proceedings of the Advances in Computer Science, 2007

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Lessons learned from the deployment of a high-interaction honeypot.
Proceedings of the Sixth European Dependable Computing Conference, 2006

2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Comparative Survey of Local Honeypot Sensors to Assist Network Forensics.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

ScriptGen: an automated script generation tool for honeyd.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Honeypots: Practical Means to Validate Malicious Fault Assumptions.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

2002
Mining intrusion detection alarms for actionable knowledge.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002

2000
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
J. Comput. Secur., 2000

A revised taxonomy for intrusion-detection systems.
Ann. des Télécommunications, 2000

Intrusion Detection Using Variable-Length Audit Trail Patterns.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

A Lightweight Tool for Detecting Web Server Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2000

1999
Towards a taxonomy of intrusion-detection systems.
Comput. Networks, 1999

Intrusion detection.
Comput. Networks, 1999

Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Special Seminar: Intrusion Detection.
Proceedings of the Digest of Papers: FTCS-29, 1999

1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996

1994
Vers une évaluation quantitative de la sécurité informatique. (Towards a quantitative evaluation of computer security).
PhD thesis, 1994

Privilege Graph: an Extension to the Typed Access Matrix Model.
Proceedings of the Computer Security, 1994

1993
A Petri Net Representation of the Take-Grant Model.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993


  Loading...