Marc Dacier
Orcid: 0000-0003-3206-2030Affiliations:
- King Abdullah University of Science and Technology (KAUST), Saudi Arabia
- Qatar Computing Research Institute (former)
According to our database1,
Marc Dacier
authored at least 65 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
2020
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020
2018
ACM Comput. Surv., 2018
2017
IEEE Secur. Priv., 2017
2016
Secur. Commun. Networks, 2016
Dagstuhl Reports, 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
IEEE Secur. Priv., 2014
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2012
Dagstuhl Reports, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
2011
Future Gener. Comput. Syst., 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the 8th Annual Collaboration, 2011
On the Resilience of the Dependability Framework to the Intrusion of New Security Threats.
Proceedings of the Dependable and Historic Computing, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
2008
Int. J. Crit. Infrastructures, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models.
Proceedings of the Seventh European Dependable Computing Conference, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
2007
CoRR, 2007
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces.
Proceedings of the Advances in Computer Science, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the Sixth European Dependable Computing Conference, 2006
2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004
2002
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002
2000
J. Comput. Secur., 2000
Ann. des Télécommunications, 2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the Digest of Papers: FTCS-29, 1999
1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996
1994
Vers une évaluation quantitative de la sécurité informatique. (Towards a quantitative evaluation of computer security).
PhD thesis, 1994
Proceedings of the Computer Security, 1994
1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993