Sylvain P. Leblanc

Orcid: 0000-0001-7882-1229

According to our database1, Sylvain P. Leblanc authored at least 13 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework.
IEEE Intell. Syst., 2018

Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Is eval () Evil : A study of JavaScript in PDF malware.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
A Constraint-based intrusion detection system.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

2016
Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

2015
Frequency-based anomaly detection for the automotive CAN bus.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

Lessons from the Strategic Corporal: Implications of Cyber Incident Response.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

2013
Using clone detection to find malware in acrobat files.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

2011
Compromise through USB-based Hardware Trojan Horse device.
Future Gener. Comput. Syst., 2011

An overview of cyber attack and computer network operations simulation.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Taxonomy of cyber attacks and simulation of their effects.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

2009
Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Hardware Trojan Horse Device Based on Unintended USB Channels.
Proceedings of the Third International Conference on Network and System Security, 2009


  Loading...