Follow
Marc Dacier
Marc Dacier
RC3, CEMSE - KAUST
Verified email at kaust.edu.sa - Homepage
Title
Cited by
Cited by
Year
Towards a taxonomy of intrusion-detection systems
H Debar, M Dacier, A Wespi
Computer networks 31 (8), 805-822, 1999
14811999
Revised taxonomy for intrusion-detection systems
H Debar, M Dacier, A Wespi
Annales des Telecommunications/Annals of Telecommunications, 2000
5792000
Mining intrusion detection alarms for actionable knowledge
K Julisch, M Dacier
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
4132002
Intrusion detection using variable-length audit trail patterns
A Wespi, M Dacier, H Debar
Recent Advances in Intrusion Detection: Third International Workshop, RAID …, 2000
3202000
Scriptgen: an automated script generation tool for honeyd
C Leita, K Mermoud, M Dacier
21st Annual Computer Security Applications Conference (ACSAC'05), 12 pp.-214, 2005
2862005
Quantitative assessment of operational security: Models and tools
M Dacier, Y Deswarte, M Kaâniche
Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996
279*1996
A survey on malicious domains detection through DNS data analysis
Y Zhauniarovich, I Khalil, T Yu, M Dacier
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
2272018
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services.
SD Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier
Usenix security symposium, 2015
226*2015
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness: Issues and Research, 3-13, 2010
2012010
Method, computer program element and a system for processing alarms triggered by a monitoring system
M Dacier, K Julisch
US Patent 7,437,762, 2008
198*2008
Lessons learned from the deployment of a high-interaction honeypot
E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb
2006 Sixth European Dependable Computing Conference, 39-46, 2006
1832006
Privilege graph: an extension to the typed access matrix model
M Dacier, Y Deswarte
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1691994
Honeypot-based forensics
F Pouget, M Dacier
AusCERT Asia Pacific Information Technology Security Conference, 2004
1472004
Towards quantitative evaluation of computer security
M Dacier
PhD thesis, Institut National Polytechnique de Toulouse, 1994
142*1994
A Lightweight Tool for Detecting Web Server Attacks.
M Almgren, H Debar, M Dacier
NDSS, 2000
1322000
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
1312005
Security challenges and opportunities of software-defined networking
MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich
IEEE Security & Privacy 15 (2), 96-100, 2017
1222017
A framework for attack patterns' discovery in honeynet data
O Thonnard, M Dacier
digital investigation 5, S128-S139, 2008
1182008
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
C Leita, M Dacier, F Massicotte
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
1172006
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
PA Vervier, O Thonnard, M Dacier
NDSS, 2015
1142015
The system can't perform the operation now. Try again later.
Articles 1–20