Enhancing Collaboration Between Security Analysts in Security Operations Centers. | 0 | 0.34 | 2018 |
VEGAS: Visualizing, exploring and grouping alerts. | 1 | 0.40 | 2016 |
Detecting Process-Aware Attacks in Sequential Control Systems. | 0 | 0.34 | 2016 |
Generation and assessment of correlation rules to detect complex attack scenarios | 0 | 0.34 | 2015 |
Assessment of an Automatic Correlation Rules Generator. | 0 | 0.34 | 2015 |
CORGI: combination, organization and reconstruction through graphical interactions | 1 | 0.41 | 2014 |
ELVIS: Extensible Log VISualization | 4 | 0.44 | 2013 |
Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type « Fast Paxos ». | 0 | 0.34 | 2012 |
Detecting Illegal System Calls Using a Data-Oriented Detection Model. | 2 | 0.39 | 2011 |
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems | 1 | 0.38 | 2009 |
Anomaly Detection With Diagnosis In Diversified Systems Using Information Flow Graphs | 6 | 0.57 | 2008 |
A dependable intrusion detection architecture based on agreement services | 2 | 0.42 | 2006 |
COTS diversity based intrusion detection and application to web servers | 27 | 1.35 | 2005 |