2024
How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Demo: Highlighting the Limits of Federated Learning in Intrusion Detection.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies.
Proceedings of the NOMS 2023, 2023
SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
2022
The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey.
IEEE Trans. Netw. Serv. Manag., 2022
Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022
2018
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
2016
Multi-Criteria Recommender Approach for Supporting Intrusion Response System.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Context Aware Intrusion Response Based on Argumentation Logic.
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Metric for Security Activities Assisted by Argumentative Logic.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
ISER: A Platform for Security Interoperability of Multi-source Systems.
Proceedings of the Risks and Security of Internet and Systems, 2014
2012
Enabling Dynamic Security Policy in the Java Security Manager.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2009
An ontology-based approach to react to network attacks.
Int. J. Inf. Comput. Secur., 2009
Reaction Policy Model Based on Dynamic Organizations and Threat Context.
Proceedings of the Data and Applications Security XXIII, 2009
2007
Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006
CRIM: un module de corrélation d'alertes et de réaction aux attaques.
Ann. des Télécommunications, 2006
2005
Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2004
Détection d'intrusions : corrélation d'alertes.
Tech. Sci. Informatiques, 2004
Utilisation de la corrélation pondérée dans un processus de détection d'intrusions.
Ann. des Télécommunications, 2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
Enhanced Correlation in an Intrusion Detection Process.
Proceedings of the Computer Network Security, 2003
2002
Recognizing Malicious Intention in an Intrusion Detection Process.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002