Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

92 résultats
Image document

Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics

Malek Belhaouane , Joaquin Garcia-Alfaro , Hervé Debar
SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩
Communication dans un congrès hal-01332331v1

A service dependency model for cost-sensitive intrusion response

Nizar Kheir , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Hervé Debar
ESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩
Communication dans un congrès istex hal-01164601v1

One year of SSL internet measurement

Olivier Levillain , Arnaud Ebalard , Benjamin Morin , Hervé Debar
ACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20
Communication dans un congrès hal-00768258v1

Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation

Yosra Ben Mustapha , Hervé Debar , Grégoire Jacob
International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N
Article dans une revue hal-00738459v1

Limitation of honeypot/honeynet databases to enhance alert correlation

Yosra Ben Mustapha , Hervé Debar , Grégoire Jacob
MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩
Communication dans un congrès hal-00747133v1

Self-defending clouds : myth and realities

Marc Lacoste , Aurelien Wailly , Hervé Debar
C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France
Communication dans un congrès hal-01464909v1
Image document

TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS

Olivier Levillain , Baptiste Gourdin , Hervé Debar
10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩
Communication dans un congrès hal-01154820v1

Security and privacy in communication networks

Joaquin Garcia‐alfaro , Shujun Li , Radha Poovendran , Hervé Debar , Moti Yung
Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩
Ouvrages hal-03628450v1
Image document

IoT devices recognition through network traffic analysis

Mustafizur Rahman Shahid , Gregory Blanc , Zonghua Zhang , Hervé Debar
BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩
Communication dans un congrès hal-01994156v1
Image document

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar , Yohann Thomas , Frédéric Cuppens , Nora Cuppens-Boulahia
Journal in Computer Virology (JCV), 2007, 3 (3), pp.195-210
Article dans une revue hal-00439845v1
Image document

XeNA: an access negotiation framework using XACML

Diala Abi Haidar , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Hervé Debar
Annals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩
Article dans une revue hal-00448945v1
Image document

Combining technical and financial impacts for countermeasure selection

Gustavo Daniel Gonzalez Granadillo , Christophe Ponchel , Gregory Blanc , Hervé Debar
AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩
Communication dans un congrès hal-01257903v1

Dynamic risk management response system to handle cyber threats

Gustavo Daniel Gonzalez Granadillo , Samuel Dubus , Alexander Motzek , Joaquin Garcia-Alfaro , Ender Yesid Alvarez Lopez , et al.
Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩
Article dans une revue hal-01745780v1

Towards multi-layer autonomic isolation of cloud computing and networking resources

Aurelien Wailly , Marc Lacoste , Hervé Debar
CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland
Communication dans un congrès hal-01300936v1

Challenges for advanced security monitoring : the MASSIF project

Roland Rieke , Elsa Prieto , Rodrigo Diaz , Hervé Debar , Andrew Hutchison
TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩
Communication dans un congrès hal-00747573v1

An adaptive mitigation framework for handling suspicious network flows via MPLS policies

Nabil Hachem , Joaquin Garcia-Alfaro , Hervé Debar
NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩
Communication dans un congrès istex hal-01269681v1

Policy enforcement point model

Yosra Ben Mustapha , Hervé Debar , Gregory Blanc
SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩
Communication dans un congrès hal-01263380v1
Image document

Towards autonomic DDoS mitigation using Software Defined Networking

Rishikesh Sahay , Gregory Blanc , Zonghua Zhang , Hervé Debar
SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩
Communication dans un congrès hal-01257899v1
Image document

Hybrid Risk Assessment Model Based on Bayesian Networks

François-Xavier Aguessy , Olivier Bettan , Gregory Blanc , Vania Conan , Hervé Debar
11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩
Communication dans un congrès hal-01393744v1

ArOMA: an SDN based autonomic DDoS mitigation framework

Rishikesh Sahay , Gregory Blanc , Zonghua Zhang , Hervé Debar
Computers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩
Article dans une revue hal-01648031v1

Détection d'intrusions : corrélation d'alertes

Hervé Debar , Benjamin Morin , Frédéric Cuppens , Fabien Autrel , Ludovic Mé , et al.
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p
Article dans une revue hal-00356418v1
Image document

Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)

Alexandre Dey , Benjamin Costé , Éric Totel , Adrien Bécue , Elkin Aguas , et al.
CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021
Proceedings/Recueil des communications hal-03535661v1

Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index

Gustavo Daniel Gonzalez Granadillo , Joaquin Garcia-Alfaro , Ender Yesid Alvarez Lopez , Mohammed El Barbori , Hervé Debar
Computers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩
Article dans une revue hal-01255033v1

One Year of Internet SSL measurement

Olivier Levillain , Arnaud Ébalard , Benjamin Morin , Hervé Debar
ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20
Communication dans un congrès hal-00770473v1

RetroVisor : nested virtualization for multi IaaS VM availability

Aurelien Wailly , Marc Lacoste , Hervé Debar
ComPAS 2013 : Conférence en Parallélisme, Architecture et Système, Jan 2013, Grenoble, France. 2013
Poster de conférence hal-01287046v1

A survey on game-theoretic approaches for intrusion detection and response optimization

Christophe Kiennert , Ismail Ziad , Hervé Debar , Jean Leneutre
ACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩
Article dans une revue hal-02009646v1

Time series modeling for IDS alert management

Jouni Viinikka , Hervé Debar , Ludovic Mé , Renaud Seguier
ACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113
Communication dans un congrès hal-00143467v1
Image document

Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net

Yosra Ben Mustapha , Hervé Debar
International Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩
Article dans une revue hal-00858941v1
Image document

Automated classification of C&C connections through malware URL clustering

Nizar Kheir , Gregory Blanc , Hervé Debar , Joaquin Garcia-Alfaro , Dingqi Yang
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Communication dans un congrès hal-01255089v1
Image document

Methodology of a network simulation in the context of an evaluation: application to an IDS

Pierre-Marie Bajan , Christophe Kiennert , Hervé Debar
ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩
Communication dans un congrès hal-02176684v1