Author of the publication

Utilisation de la corrélation pondérée dans un processus de détection d'intrusions.

, , and . Ann. des Télécommunications, 59 (9-10): 1072-1091 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use., , , , , , , , , and . CPS-SPC@CCS, page 102-107. ACM, (2018)CRIM: un module de corrélation d'alertes et de réaction aux attaques., and . Ann. des Télécommunications, 61 (9-10): 1172-1192 (2006)An ontology-based approach to react to network attacks., , , and . Int. J. Inf. Comput. Secur., 3 (3/4): 280-305 (2009)Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties., , , , and . C&ESAR, volume 3329 of CEUR Workshop Proceedings, page 65-80. CEUR-WS.org, (2022)Recognizing Malicious Intention in an Intrusion Detection Process., , , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 806-817. IOS Press, (2002)Reaction Policy Model Based on Dynamic Organizations and Threat Context., , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 49-64. Springer, (2009)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , and . ITCC (1), page 500-505. IEEE Computer Society, (2005)Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation., , , , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 223-235. Springer, (2004)SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems., , , and . FPS (2), volume 14552 of Lecture Notes in Computer Science, page 82-92. Springer, (2023)Enhanced Correlation in an Intrusion Detection Process., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 157-170. Springer, (2003)