Ludovic Mé
Orcid: 0009-0002-1103-2430
According to our database1,
Ludovic Mé
authored at least 53 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022
2020
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
2017
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.
J. Comput. Virol., 2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
2009
Stud. Inform. Univ., 2009
Inf. Fusion, 2009
Inf. Fusion, 2009
Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Proceedings P2P 2009, 2009
2008
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Model for Trust within Information Technology Management.
Proceedings of the ICEIS 2008, 2008
Proceedings of the Resilient Networks and Services, 2008
2007
Intrusion detection and virology: an analysis of differences, similarities and complementariness.
J. Comput. Virol., 2007
Proceedings of the Q2SWinet'07, 2007
Proceedings of the Trust Management, 2007
2006
Proceedings of the Stabilization, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
2004
Tech. Sci. Informatiques, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Fundam. Informaticae, 2003
Proceedings of the Mobile and Wireless Communications Networks, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computer Security, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Détection des intrusions dans les systèmes d'information : la nécessaire prise en compte des caractéristiques du système surveillé.
, 2003
2002
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches.
Proceedings of the Wireless Information Systems, 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
2001
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
1998
1993
Proceedings of the 12th International Conference on Computer Safety, 1993