M2D2: A formal data model for IDS alert correlation B Morin, L Mé, H Debar, M Ducassé Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 376 | 2002 |
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. P Albers, O Camp, JM Percher, B Jouga, L Me, RS Puttini Wireless Information Systems, 1-12, 2002 | 317 | 2002 |
Code obfuscation techniques for metamorphic viruses JM Borello, L Mé Journal in Computer Virology 4 (3), 211-220, 2008 | 227 | 2008 |
A serial combination of anomaly and misuse IDSes applied to HTTP traffic E Tombini, H Debar, L Mé, M Ducassé 20th annual computer security applications conference, 428-437, 2004 | 176 | 2004 |
Gassata, a genetic algorithm as an alternative tool for security audit trails analysis M Ludovic Proceedings of the First International Workshop on the Recent Advances in …, 1998 | 160 | 1998 |
Adele: an attack description language for knowledge-based intrusion detection C Michel, L Mé Trusted Information: The New Decade Challenge 16, 353-368, 2001 | 142 | 2001 |
A logic-based model to support alert correlation in intrusion detection B Morin, L Mé, H Debar, M Ducassé Information Fusion 10 (4), 285-299, 2009 | 130 | 2009 |
Processing intrusion detection alert aggregates with time series modeling J Viinikka, H Debar, L Mé, A Lehikoinen, M Tarvainen Information Fusion 10 (4), 312-324, 2009 | 123 | 2009 |
Time series modeling for IDS alert management J Viinikka, H Debar, L Mé, R Séguier Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 104 | 2006 |
A fully distributed IDS for MANET R Puttini, JM Percher, L Mé, R de Sousa Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004 | 100 | 2004 |
COTS diversity based intrusion detection and application to web servers E Totel, F Majorczyk, L Me Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 88 | 2006 |
A Bayesian Classification Model for Real‐Time Intrusion Detection RS Puttini, Z Marrakchi, L Mé AIP Conference Proceedings 659 (1), 150-162, 2003 | 79 | 2003 |
A language driven intrusion detection system for event and alert correlation E Totel, B Vivinis, L Mé Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004 | 56 | 2004 |
A modular architecture for distributed IDS in MANET RS Puttini, JM Percher, L Mé, O Camp, R De Sousa, CJ Barenco Abbas, ... Computational Science and Its Applications—ICCSA 2003: International …, 2003 | 55 | 2003 |
Autonomic trust reasoning enables misbehavior detection in OLSR A Adnane, RT de Sousa Jr, C Bidan, L Mé Proceedings of the 2008 ACM symposium on Applied computing, 2006-2013, 2008 | 53 | 2008 |
An improved reference flow control model for policy-based intrusion detection J Zimmermann, L Mé, C Bidan Lecture notes in computer science 2808, 291-308, 2003 | 49 | 2003 |
Analysis of computer infection risk factors based on customer network usage Y Carlinet, L Mé, H Debar, Y Gourhant 2008 Second International Conference on Emerging Security Information …, 2008 | 43 | 2008 |
Intrusion detection: A bibliography L Mé, C Michel Supélec, Rennes, France, Tech. Rep. SSIR-2001-01, 2001 | 41 | 2001 |
An efficient distributed PKI for structured P2P networks F Lesueur, L Mé, VVT Tong 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009 | 39 | 2009 |
Policy-based intrusion detection in web applications by monitoring java information flows G Hiet, VVT Tong, L Me, B Morin 2008 Third International Conference on Risks and Security of Internet and …, 2008 | 33 | 2008 |