Hervé Debar
Orcid: 0000-0002-1344-4167
According to our database1,
Hervé Debar
authored at least 108 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., June, 2024
Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
2020
Comput. Secur., 2020
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization.
ACM Comput. Surv., 2019
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Future Gener. Comput. Syst., 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
A polytope-based approach to measure the impact of events against critical infrastructures.
J. Comput. Syst. Sci., 2017
Selection of Pareto-efficient response plans based on financial and operational assessments.
EURASIP J. Inf. Secur., 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017
2016
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
New Types of Alert Correlation for Security Information and Event Management Systems.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index.
Comput. Electr. Eng., 2015
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2015
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs).
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
An ontology-driven approach to model SIEM information and operations using the SWRL formalism.
Int. J. Electron. Secur. Digit. Forensics, 2012
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the Computer Network Security, 2012
Individual Countermeasure Selection Based on the Return On Response Investment Index.
Proceedings of the Computer Network Security, 2012
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Proceedings of the 9th International Conference on Autonomic Computing, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Mobile Networks and Management - Second International ICST Conference, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the ARES 2010, 2010
2009
J. Comput. Virol., 2009
Inf. Fusion, 2009
Inf. Fusion, 2009
Int. J. Inf. Comput. Secur., 2009
CoRR, 2009
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
2008
J. Comput. Virol., 2008
J. Comput. Virol., 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the CRiSIS '08, 2008
2007
J. Comput. Virol., 2007
Ann. des Télécommunications, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Inf. Manag. Comput. Secur., 2006
Ann. des Télécommunications, 2006
Foreword.
Ann. des Télécommunications, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Image Analysis and Processing, 2005
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management.
Proceedings of the Foundations of Security Analysis and Design III, 2005
2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
2000
J. Comput. Secur., 2000
Ann. des Télécommunications, 2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992