Frédéric Majorczyk

Orcid: 0009-0008-9558-397X

According to our database1, Frédéric Majorczyk authored at least 26 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs.
J. Signal Process. Syst., 2022

Cross-domain alert correlation methodology for industrial control systems.
Comput. Secur., 2022

Imbalanced classification with tpg genetic programming: impact of problem imbalance and selection mechanisms.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022

2021
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

2018
Enhancing Collaboration Between Security Analysts in Security Operations Centers.
Proceedings of the Risks and Security of Internet and Systems, 2018

2016
Detecting Process-Aware Attacks in Sequential Control Systems.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

VEGAS: Visualizing, exploring and grouping alerts.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Assessment of an Automatic Correlation Rules Generator.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Generation and assessment of correlation rules to detect complex attack scenarios.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Towards Self Adaptable Security Monitoring in IaaS Clouds.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
CORGI: combination, organization and reconstruction through graphical interactions.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

Automatic generation of correlation rules to detect complex attack scenarios.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
ELVIS: Extensible Log VISualization.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

2012
Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type « Fast Paxos ».
Tech. Sci. Informatiques, 2012

Adaptive Strategies for Speeding Up Sequences of Consensus.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Detecting Illegal System Calls Using a Data-Oriented Detection Model.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
Simulating Routing Schemes on Large-Scale Topologies.
Proceedings of the 24th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2010

2009
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Détection d'intrusions comportementale par diversification de COTS : application au cas des serveurs web.
PhD thesis, 2008

Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
A Dependable Intrusion Detection Architecture Based on Agreement Services.
Proceedings of the Stabilization, 2006

2005
COTS Diversity Based Intrusion Detection and Application to Web Servers.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005


  Loading...