Towards a taxonomy of intrusion-detection systems H Debar, M Dacier, A Wespi Computer networks 31 (8), 805-822, 1999 | 1473 | 1999 |
Revised taxonomy for intrusion-detection systems H Debar, M Dacier, A Wespi Annales des Telecommunications/Annals of Telecommunications, 2000 | 575 | 2000 |
Mining intrusion detection alarms for actionable knowledge K Julisch, M Dacier Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002 | 414 | 2002 |
Intrusion detection using variable-length audit trail patterns A Wespi, M Dacier, H Debar Recent Advances in Intrusion Detection: Third International Workshop, RAID …, 2000 | 291 | 2000 |
Scriptgen: an automated script generation tool for honeyd C Leita, K Mermoud, M Dacier 21st Annual Computer Security Applications Conference (ACSAC'05), 12 pp.-214, 2005 | 282 | 2005 |
Quantitative assessment of operational security: Models and tools M Dacier, Y Deswarte, M Kaâniche Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996 | 279* | 1996 |
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. SD Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier Usenix security symposium, 2015 | 204* | 2015 |
A survey on malicious domains detection through DNS data analysis Y Zhauniarovich, I Khalil, T Yu, M Dacier ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018 | 203 | 2018 |
Method, computer program element and a system for processing alarms triggered by a monitoring system M Dacier, K Julisch US Patent 7,437,762, 2008 | 196* | 2008 |
Cyber SA: Situational awareness for cyber defense P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ... Cyber Situational Awareness: Issues and Research, 3-13, 2010 | 195 | 2010 |
Lessons learned from the deployment of a high-interaction honeypot E Alata, V Nicomette, M Kaâniche, M Dacier, M Herrb 2006 Sixth European Dependable Computing Conference, 39-46, 2006 | 179 | 2006 |
Privilege graph: an extension to the typed access matrix model M Dacier, Y Deswarte Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994 | 169 | 1994 |
Honeypot-based forensics F Pouget, M Dacier AusCERT Asia Pacific Information Technology Security Conference, 2004 | 146 | 2004 |
Towards quantitative evaluation of computer security M Dacier PhD thesis, Institut National Polytechnique de Toulouse, 1994 | 143* | 1994 |
On the advantages of deploying a large scale distributed honeypot platform F Pouget, M Dacier, VH Pham proceedings of the e-crime and computer evidence conference, 2005 | 133 | 2005 |
A Lightweight Tool for Detecting Web Server Attacks. M Almgren, H Debar, M Dacier NDSS, 2000 | 132 | 2000 |
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots C Leita, M Dacier, F Massicotte Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 118 | 2006 |
A framework for attack patterns' discovery in honeynet data O Thonnard, M Dacier digital investigation 5, S128-S139, 2008 | 117 | 2008 |
Security challenges and opportunities of software-defined networking MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich IEEE Security & Privacy 15 (2), 96-100, 2017 | 115 | 2017 |
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. PA Vervier, O Thonnard, M Dacier NDSS, 2015 | 108 | 2015 |