Marc Dacier Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

31 Hsinchun Chen, Marc Dacier, Marie-Francine Moens, Gerhard Paass, Christopher C. Yang: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009 ACM 2009
30EEOlivier Thonnard, Wim Mees, Marc Dacier: Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 11-21
29EEMarc Dacier: Technical perspective - They do click, don't they? Commun. ACM 52(9): 98 (2009)
28EEVan-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary: The Quest for Multi-headed Worms. DIMVA 2008: 247-266
27EECorrado Leita, Marc Dacier: SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. EDCC 2008: 99-109
26EEOlivier Thonnard, Marc Dacier: Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology. ICDM Workshops 2008: 154-163
25EECorrado Leita, Marc Dacier: SGNET: Implementation insights. NOMS 2008: 1075-1078
24EEMarc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger: 08102 Working Group -- Intrusion and Fraud Detection for Web Services. Network Attack Detection and Defense 2008
23EEMarc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008
22EEOlivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier: Automating the Analysis of Honeypot Data (Extended Abstract). RAID 2008: 406-407
21EEE. Ramirez-Silva, Marc Dacier: Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. ASIAN 2007: 198-211
20EEEric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb: Lessons Learned from the deployment of a high-interaction honeypot CoRR abs/0704.0858: (2007)
19EEMohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette: Empirical analysis and statistical modeling of attack processes based on honeypots CoRR abs/0704.0861: (2007)
18EEEric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb: Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46
17EECorrado Leita, Marc Dacier, Frédéric Massicotte: Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. RAID 2006: 185-205
16EECorrado Leita, Ken Mermoud, Marc Dacier: ScriptGen: an automated script generation tool for honeyd. ACSAC 2005: 203-214
15EEPei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier: Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. SADFE 2005: 120-134
14EEJacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier: The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. SADFE 2005: 89-104
13EEMarc Dacier, Fabien Pouget, Hervé Debar: Honeypots: Practical Means to Validate Malicious Fault Assumptions. PRDC 2004: 383-388
12EEKlaus Julisch, Marc Dacier: Mining intrusion detection alarms for actionable knowledge. KDD 2002: 366-375
11EEMagnus Almgren, Hervé Debar, Marc Dacier: A Lightweight Tool for Detecting Web Server Attacks. NDSS 2000
10EEAndreas Wespi, Marc Dacier, Hervé Debar: Intrusion Detection Using Variable-Length Audit Trail Patterns. Recent Advances in Intrusion Detection 2000: 110-129
9 Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi: Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. Journal of Computer Security 8(2/3): (2000)
8EEMarc Dacier, O. Sami Saydjari: Special Seminar: Intrusion Detection. FTCS 1999: 238
7EEYves Cosendai, Marc Dacier, Paolo Scotton: Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. Recent Advances in Intrusion Detection 1999
6EEMarc Dacier, Kathleen Jackson: Intrusion detection. Computer Networks 31(23-24): 2433-2434 (1999)
5EEHervé Debar, Marc Dacier, Andreas Wespi: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8): 805-822 (1999)
4EEHervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi: Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. ESORICS 1998: 1-15
3 Marc Dacier, Yves Deswarte, Mohamed Kaâniche: Models and tools for quantitative assessment of operational security. SEC 1996: 177-186
2EEMarc Dacier, Yves Deswarte: Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334
1 Marc Dacier: A Petri Net Representation of the Take-Grant Model. CSFW 1993: 99-108

Coauthor Index

1Eric Alata [18] [19] [20]
2Magnus Almgren [11]
3Hsinchun Chen [31]
4Pei-Te Chen [15]
5Andrew Clark [14]
6Yves Cosendai [7]
7Hervé Debar [4] [5] [9] [10] [11] [13] [23]
8Yves Deswarte [2] [3] [19]
9Taoufik En-Najjary [28]
10Ulrich Flegel [24]
11Matthieu Herrb [18] [20]
12Ralph Holz [24]
13Thorsten Holz [23]
14Kathleen Jackson [6]
15Klaus Julisch [12]
16Mohamed Kaâniche [3] [18] [19] [20]
17Engin Kirda [23]
18Jan Kohlrausch [23]
19Christopher Krügel (Christopher Kruegel) [23]
20Chi-Sung Laih [15]
21Corrado Leita [16] [17] [22] [25] [27]
22Norbert Luttenberger [24]
23Frédéric Massicotte [17]
24Wim Mees [30]
25Ken Mermoud [16]
26Marie-Francine Moens [31]
27George M. Mohay [14]
28Mehdi Nassehi [4] [9]
29Vincent Nicomette [18] [19] [20]
30Gerhard Paass (Gerhard Paaß) [31]
31Van-Hau Pham [28]
32Fabien Pouget [13] [14] [15]
33E. Ramirez-Silva [21]
34Konrad Rieck [23]
35O. Sami Saydjari [8]
36Paolo Scotton [7]
37James P. G. Sterbenz [23]
38Olivier Thonnard [22] [26] [30]
39Guillaume Urvoy-Keller [28]
40Jouni Viinikka [22]
41Andreas Wespi [4] [5] [9] [10]
42Christopher C. Yang [31]
43Jacob Zimmermann [14]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)