Mathieu Couture

According to our database1, Mathieu Couture authored at least 17 papers between 2004 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Navigating and visualizing the malware intelligence space.
IEEE Netw., 2012

A Testing Model for Dynamic Malware Analysis Systems.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
Spanners of additively weighted point sets.
J. Discrete Algorithms, 2011

On a family of strong geometric spanners that admit local routing strategies.
Comput. Geom., 2011

Location-Oblivious Distributed Unit Disk Graph Coloring.
Algorithmica, 2011

Exploring network-based malware classification.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2009
Spanners of Complete k-Partite Geometric Graphs.
SIAM J. Comput., 2009

Algorithms for optimal outlier removal.
J. Discrete Algorithms, 2009

Geometric spanners with small chromatic number.
Comput. Geom., 2009

Traffic Behaviour Characterization Using NetMate.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Incremental Construction of k-Dominating Sets in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

2007
Model-Driven, Network-Context Sensitive Intrusion Detection.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

2006
Incremental Construction of <i>k</i>-Dominating Sets in Wireless Sensor Networks.
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006

Automatic Evaluation of Intrusion Detection Systems.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases.
Proceedings of the Third Annual Conference on Privacy, 2005

2004
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
Proceedings of the Second Annual Conference on Privacy, 2004


  Loading...