Sofiane Lagraa

Orcid: 0000-0003-3185-9152

According to our database1, Sofiane Lagraa authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024

2022
Mobile Application Behaviour Anomaly Detection based on API Calls.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs.
Pattern Recognit., 2021

Event-Driven Interest Detection for Task-Oriented Mobile Apps.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

What database do you choose for heterogeneous security log events analysis?
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Process mining-based approach for investigating malicious login events.
Proceedings of the NOMS 2020, 2020

ROS-FM: Fast Monitoring for the Robotic Operating System(ROS).
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Deep mining port scans from darknet.
Int. J. Netw. Manag., 2019

ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Auto Semi-supervised Outlier Detection for Malicious Authentication Events.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Auto-Encoding Robot State Against Sensor Spoofing Attacks.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

ROSploit: Cybersecurity Tool for ROS.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019

Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019

Graph-based malicious login events investigation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Une nouvelle approche pour la détection d'anomalies dans les flux de graphes hétérogènes.
Proceedings of the Extraction et Gestion des connaissances, 2019

2018
Detecting malicious authentication events trustfully.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), 2017

Knowledge discovery of port scans from darknet.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

BotGM: Unsupervised graph mining to detect botnets in traffic flows.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
An efficient exact algorithm for triangle listing in large graphs.
Data Min. Knowl. Discov., 2016

2015
Comparison Issues in Large Graphs: State of the Art and Future Directions.
CoRR, 2015

2014
New MP-SoC profiling tools based on data mining techniques. (Nouveaux outils de profilage de MP-SoC basés sur des techniques de fouille de données).
PhD thesis, 2014

A distance measure for large graphs based on prime graphs.
Pattern Recognit., 2014

Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Data mining MPSoC simulation traces to identify concurrent memory access patterns.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
Alliance-based clustering scheme for group key management in mobile ad hoc networks.
J. Supercomput., 2012

Automatic congestion detection in MPSoC programs using data mining on simulation traces.
Proceedings of the 23rd IEEE International Symposium on Rapid System Prototyping, 2012

2011
Web Service Matchmaking by Subgraph Matching.
Proceedings of the Web Information Systems and Technologies - 7th International Conference, 2011

A Graph Decomposition Approach to Web Service Matchmaking.
Proceedings of the WEBIST 2011, 2011

Matchmaking OWL-S processes: an approach based on path signatures.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011


  Loading...