Olivier Thonnard

Orcid: 0000-0003-2390-0346

According to our database1, Olivier Thonnard authored at least 45 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Poster: The Impact of the Client Environment on Residential IP Proxies Detection.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
BADPASS: Bots Taking ADvantage of Proxy as a Service.
Proceedings of the Information Security Practice and Experience, 2022

An industrial perspective on web scraping characteristics and open issues.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2020
VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics.
IEEE Trans. Vis. Comput. Graph., 2020

LDA Ensembles for Interactive Exploration and Categorization of Behaviors.
IEEE Trans. Vis. Comput. Graph., 2020

Botnet Sizes: When Maths Meet Myths.
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020

2019
Understanding User Behaviour through Action Sequences: From the Usual to the Unusual.
IEEE Trans. Vis. Comput. Graph., 2019

System Misuse Detection Via Informed Behavior Clustering and Modeling.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

2018
User Behavior Map: Visual Exploration for Cyber Security Session Data.
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018

Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Using Diverse Detectors for Detecting Malicious Web Scraping Activity.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis.
Proceedings of the 8th International EuroVis Workshop on Visual Analytics, 2017

2016
Spammers operations: a multifaceted strategic analysis.
Secur. Commun. Networks, 2016

Introduction to RSDA 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

An Application of Unsupervised Fraud Detection to Passenger Name Records.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks.
Proceedings of the Financial Cryptography and Data Security, 2015

That Ain't You: Blocking Spearphishing Through Behavioral Modelling.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations.
EURASIP J. Inf. Secur., 2014

That Ain't You: Detecting Spearphishing Emails Before They Are Sent.
CoRR, 2014

Visual Analysis of Sets of Heterogeneous Matrices Using Projection-Based Distance Functions and Semantic Zoom.
Comput. Graph. Forum, 2014

A Visual Analytics Field Experiment to Evaluate Alternative Visualizations for Cyber Security Applications.
Proceedings of the 5th International EuroVis Workshop on Visual Analytics, 2014

Scalable Graph Building from Text Data.
Proceedings of the 3rd International Workshop on Big Data, 2014

Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

Determining the k in k-means with MapReduce.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

Building k-nn graphs from large text data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
SpamTracer: How stealthy are spammers?
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

2012
Visual analytics for BGP monitoring and prefix hijacking identification.
IEEE Netw., 2012

Visual spam campaigns analysis using abstract graphs representation.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
A strategic analysis of spam botnets operations.
Proceedings of the 8th Annual Collaboration, 2011

2010
Assessing Cybercrime Through the Eyes of the WOMBAT.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Vers un regroupement multicritères comme outil d'aide à l'attribution d'attaque dans le cyber-espace. (A multi-criteria clustering approach to support attack attribution in cyberspace).
PhD thesis, 2010

On a multicriteria clustering approach for attack attribution.
SIGKDD Explor., 2010

An Analysis of Rogue AV Campaigns.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

The WOMBAT Attack Attribution Method: Some Results.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
A framework for attack patterns' discovery in honeynet data.
Digit. Investig., 2008

Automating the Analysis of Honeypot Data (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008


  Loading...