Benjamin Morin

According to our database1, Benjamin Morin authored at least 22 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Quantifying the impact of consumer behavior on foodborne illness using a compartment model.
Comput. Ind. Eng., 2021

2017
Student-Driven Research at the Mathematical and Theoretical Biology Institute.
Am. Math. Mon., 2017

2016
SpecCert: Specifying and Verifying Hardware-Based Security Enforcement.
Proceedings of the FM 2016: Formal Methods, 2016

2013
Parsifal: Writing efficient and robust binary parsers, quickly.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Computational and Analytical Mathematical Techniques for Modeling Heterogeneity.
PhD thesis, 2012

One year of SSL internet measurement.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
What If You Can't Trust Your Network Card?
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

2010
On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

ACPI and SMI handlers: some limits to trusted computing.
J. Comput. Virol., 2010

2009
A logic-based model to support alert correlation in intrusion detection.
Inf. Fusion, 2009

Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009

ACPI: Design Principles and Concerns.
Proceedings of the Trusted Computing, 2009

2008
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Intrusion detection and virology: an analysis of differences, similarities and complementariness.
J. Comput. Virol., 2007

2006
A Secure Universal Loyalty Card.
Proceedings of the Security in Information Systems, 2006

Improving Security Management through Passive Network Observation.
Proceedings of the The First International Conference on Availability, 2006

2005
Conceptual Analysis of Intrusion Alarms.
Proceedings of the Image Analysis and Processing, 2005

2004
Détection d'intrusions : corrélation d'alertes.
Tech. Sci. Informatiques, 2004

2003
Correlation of Intrusion Symptoms: An Application of Chronicles.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

2002
M2D2: A Formal Data Model for IDS Alert Correlation.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

2000
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000


  Loading...