关注
Mireille Ducassé
Mireille Ducassé
Emeritus Professor of Computer Science, IRISA-INSA de Rennes
在 irisa.fr 的电子邮件经过验证
标题
引用次数
引用次数
年份
M2D2: A formal data model for IDS alert correlation
B Morin, L Mé, H Debar, M Ducassé
International Workshop on Recent Advances in Intrusion Detection, 115-137, 2002
3802002
A serial combination of anomaly and misuse IDSes applied to HTTP traffic
E Tombini, H Debar, L Mé, M Ducassé
20th annual computer security applications conference, 428-437, 2004
1802004
A logic-based model to support alert correlation in intrusion detection
B Morin, L Mé, H Debar, M Ducassé
Information Fusion 10 (4), 285-299, 2009
1332009
Coca: An automated debugger for C
M Ducassé
Proceedings of the 21st international conference on Software engineering …, 1999
1191999
A review of automated debugging systems: Knowledge, strategies and techniques
M Decasse, AM Emde
Proceedings.[1989] 11th International Conference on Software Engineering …, 1988
1041988
Opium: An extendable trace analyzer for prolog
M Ducassé
The Journal of Logic programming 39 (1-3), 177-223, 1999
1001999
Formal concept analysis enhances fault localization in software
P Cellier, M Ducassé, S Ferré, O Ridoux
International Conference on Formal Concept Analysis, 273-288, 2008
732008
Logic programming environments: Dynamic program analysis and debugging
M Ducassé, J Noyé
The Journal of Logic Programming 19, 351-384, 1994
731994
A pragmatic survey of automated debugging
M Ducassé
International Workshop on Automated and Algorithmic Debugging, 1-15, 1993
711993
Data mining and cross-checking of execution traces: a re-interpretation of jones, harrold and stasko test information
T Denmat, M Ducassé, O Ridoux
Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005
702005
A backward slicing algorithm for Prolog
S Schoenig, M Ducassé
International Static Analysis Symposium, 317-331, 1996
541996
Using events to debug Java programs backwards in time
B Lewis, M Ducassé
Companion of the 18th annual ACM SIGPLAN conference on Object-oriented …, 2003
492003
From declarative signatures to misuse IDS
JP Pouzol, M Ducasé
International Workshop on Recent Advances in Intrusion Detection, 1-21, 2001
462001
Formal Specification of Intrusion Signatures and Detection Rules.
JP Pouzol, M Ducassé
CSFW, 64-, 2002
422002
Multiple Fault Localization with Data Mining.
P Cellier, M Ducassé, S Ferré, O Ridoux
SEKE, 238-243, 2011
402011
Myrtle: A set-oriented meta-interpreter driven by a “relational” trace for deductive databases debugging
S Mallet, M Ducassé
Logic-Based Program Synthesis and Transformation: 8th International Workshop …, 1999
371999
A parameterized algorithm to explore formal contexts with a taxonomy
P Cellier, S Ferré, O Ridoux, M Ducasse
International Journal of Foundations of Computer Science 19 (02), 319-343, 2008
312008
An interactive guidance process supporting consistent updates of RDFS graphs
A Hermann, S Ferré, M Ducassé
Knowledge Engineering and Knowledge Management: 18th International …, 2012
292012
An abstract interpretation based combinator for modelling while loops in constraint programming
T Denmat, A Gotlieb, M Ducassé
International Conference on Principles and Practice of Constraint …, 2007
292007
Improving constraint-based testing with dynamic linear relaxations
T Denmat, A Gotlieb, M Ducassé
The 18th IEEE International Symposium on Software Reliability (ISSRE'07 …, 2007
282007
系统目前无法执行此操作,请稍后再试。
文章 1–20