Fabien Autrel

Orcid: 0000-0002-8403-515X

According to our database1, Fabien Autrel authored at least 26 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

Demo: Highlighting the Limits of Federated Learning in Intrusion Detection.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies.
Proceedings of the NOMS 2023, 2023

SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

2022
The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey.
IEEE Trans. Netw. Serv. Manag., 2022

Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2018
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

2016
Multi-Criteria Recommender Approach for Supporting Intrusion Response System.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Context Aware Intrusion Response Based on Argumentation Logic.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Metric for Security Activities Assisted by Argumentative Logic.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

ISER: A Platform for Security Interoperability of Multi-source Systems.
Proceedings of the Risks and Security of Internet and Systems, 2014

2012
Enabling Dynamic Security Policy in the Java Security Manager.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2009
An ontology-based approach to react to network attacks.
Int. J. Inf. Comput. Secur., 2009

Reaction Policy Model Based on Dynamic Organizations and Threat Context.
Proceedings of the Data and Applications Security XXIII, 2009

2007
Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006

CRIM: un module de corrélation d'alertes et de réaction aux attaques.
Ann. des Télécommunications, 2006

2005
Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Détection d'intrusions : corrélation d'alertes.
Tech. Sci. Informatiques, 2004

Utilisation de la corrélation pondérée dans un processus de détection d'intrusions.
Ann. des Télécommunications, 2004

Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Enhanced Correlation in an Intrusion Detection Process.
Proceedings of the Computer Network Security, 2003

2002
Recognizing Malicious Intention in an Intrusion Detection Process.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002


  Loading...