SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Pr. Hervé DEBAR

Professeur
SCN

Hervé.debar[@-Code to remove to avoid SPAM-]telecom-sudparis.eu

Article dans une revue

2023

ref_biblio
Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
Accès au bibtex
BibTex

2020

ref_biblio
François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. Computers & Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02387073/file/COSE-D-19-00632R1-preprint.pdf BibTex

2019

ref_biblio
Christophe Kiennert, Pierre-Marie Bajan, Hervé Debar. Evaluating security products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
Accès au bibtex
BibTex

2018

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Kiennert, Ismail Ziad, Hervé Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
Accès au bibtex
BibTex

2017

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01453253/file/preprint_JCSS_2016.pdf BibTex
ref_biblio
Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers & Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
Accès au bibtex
BibTex

2015

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, Mohammed El Barbori, Hervé Debar. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Computers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩. ⟨hal-01255033⟩
Accès au bibtex
BibTex

2014

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
Accès au bibtex
BibTex

2013

ref_biblio
Yosra Ben Mustapha, Hervé Debar. Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. International Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩. ⟨hal-00858941⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00858941/file/3770313.pdf BibTex

2012

ref_biblio
Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N. ⟨hal-00738459⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar. An ontology-driven approach to model SIEM information and operations using the SWRL formalism. International journal of electronic security and digital forensics, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩. ⟨hal-00724431⟩
Accès au bibtex
BibTex

2010

ref_biblio
Ludovic Mé, Hervé Debar. New directions in Intrusion Detection and Alert Correlation. Revue I3 - Information Interaction Intelligence, 2010, 10 (1), pp.NC. ⟨hal-00534564⟩
Accès au bibtex
BibTex

2009

ref_biblio
Diala Abi Haidar, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. XeNA: an access negotiation framework using XACML. Annals of Telecommunications - annales des télécommunications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩. ⟨hal-00448945⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00448945/file/fulltext.pdf BibTex
ref_biblio
Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé. A logic-based model to support alert correlation in intrusion detection. Information Fusion, 2009, 10 (4), pp.285-299. ⟨10.1016/j.inffus.2009.01.005⟩. ⟨hal-00353059⟩
Accès au bibtex
BibTex
ref_biblio
Jouni Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika Tarvainen. Processing Intrusion Detection Alert Aggregates with Time Series Modeling. Information Fusion, 2009, 10 (4), pp.312-324. ⟨hal-00353056⟩
Accès au bibtex
BibTex

2007

ref_biblio
Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia. Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology (JCV), 2007, 3 (3), pp.195-210. ⟨hal-00439845⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00439845/file/jcv07.pdf BibTex

2004

ref_biblio
Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, et al.. Détection d'intrusions : corrélation d'alertes. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23, 32 p. ⟨hal-00356418⟩
Accès au bibtex
BibTex
ref_biblio
Hervé Debar, B. Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Me, et al.. Corrélation d'alertes en détection d'intrusions. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2004, 23 (3). ⟨hal-02964546⟩
Accès au bibtex
BibTex

Communication dans un congrès

2024

ref_biblio
Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩. ⟨hal-04695972⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04695972/file/MealyVerifier.pdf BibTex

2023

ref_biblio
Marwan Abbas-Escribano, Hervé Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400399/file/3600160.3604993.pdf BibTex

2022

ref_biblio
Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar. Towards a systematic and automatic use of state machine inference to uncover security flaws and fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997060/file/document.pdf BibTex

2021

ref_biblio
Mustafizur R. Shahid, Hervé Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨10.1109/ICMLA52953.2021.00256⟩. ⟨hal-03430826⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03430826/file/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf BibTex

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar. Automated saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
Accès au bibtex
BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar. Generative Deep Learning for Internet of Things Network Traffic Generation. 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩. ⟨hal-03127899⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03127899/file/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf BibTex

2019

ref_biblio
Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02176684/file/Article_ICISSP.pdf BibTex
ref_biblio
Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438733/file/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Anomalous communications detection in IoT networks using sparse autoencoders. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-5, ⟨10.1109/NCA.2019.8935007⟩. ⟨hal-02423336⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02423336/file/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf BibTex

2018

ref_biblio
Pierre-Marie Bajan, Hervé Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01901017/file/Article_1_vConf.pdf BibTex
ref_biblio
François Boutigny, Stephane Betge-Brezetz, Hervé Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
Accès au bibtex
BibTex
ref_biblio
Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
Accès au bibtex
BibTex
ref_biblio
Cuong Pham, Gregory Blanc, Hervé Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438757/file/pham_automatic_network_environment.pdf BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01994156/file/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf BibTex

2017

ref_biblio
Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01649980/file/3071064.3071068.pdf BibTex

2016

ref_biblio
François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar. Hybrid Risk Assessment Model Based on Bayesian Networks. 11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩. ⟨hal-01393744⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01393744/file/scalable-hybrid-attack-model.pdf BibTex
ref_biblio
Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. NordSec 2016, Nov 2016, Oulu, Finland. pp.101--116, ⟨10.1007/978-3-319-47560-8_7⟩. ⟨hal-01387569⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Hervé Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01468032/file/preprint_trustcom2016.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. New types of alert correlation for security information and event management systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Hervé Debar. Selection of mitigation actions based on financial and operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450193/file/preprint-ares-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450282/file/preprint-nordsec-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01487752/file/preprint_crisis2016.pdf BibTex
ref_biblio
Mickael Salaun, Marion Daubignard, Hervé Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
Accès au bibtex
BibTex
ref_biblio
Jonathan Yung, Hervé Debar, Louis Granboulan. Security issues and mitigation in Ethernet POWERLINK. CYBERICPS 2016 : 2nd international workshop on Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2016, Heraklion, Greece. ⟨10.1007/978-3-319-61437-3_6⟩. ⟨hal-01560206⟩
Accès au bibtex
BibTex

2015

ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332029/file/preprint-ares-2015.pdf BibTex
ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332331/file/preprint-secrypt-2015.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01263402/file/preprint-NTMS-2015.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332277/file/preprint-securecomm-2015.pdf BibTex
ref_biblio
Guillaume Hiet, Hervé Debar, Sélim Ménouar, Vérène Houdebine. Etude comparative des formats d’alertes. C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148. ⟨hal-01242786⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩. ⟨hal-01255089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01255089/file/337885_1_En_17_Chapter.pdf BibTex
ref_biblio
Olivier Levillain, Baptiste Gourdin, Hervé Debar. TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩. ⟨hal-01154820⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01154820/file/document.pdf BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. Towards autonomic DDoS mitigation using Software Defined Networking. SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩. ⟨hal-01257899⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01257899/file/01_3_2.pdf BibTex

2014

ref_biblio
Yosra Ben Mustapha, Hervé Debar, Gregory Blanc. Policy enforcement point model. SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩. ⟨hal-01263380⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar. Combining technical and financial impacts for countermeasure selection. AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩. ⟨hal-01257903⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01257903/file/countermeasure-selection.pdf BibTex
ref_biblio
Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Hervé Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332339/file/badgers14_ssl.pdf BibTex

2013

ref_biblio
Khaled El Dassouki, Hervé Debar, Haidar Safa, Abbas Hijazi. A TCP delay based mechanism for detecting congestion in the internet. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.141-145, ⟨10.1109/ICCITechnology.2013.6579538⟩. ⟨hal-00860428⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Hervé Debar, Benjamin Morin. Parsifal: writing efficient and robust binary parsers, quickly. 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. pp.1. ⟨hal-00924120⟩
Accès au bibtex
BibTex
ref_biblio
Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
Accès au bibtex
BibTex

2012

ref_biblio
Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob. Limitation of honeypot/honeynet databases to enhance alert correlation. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩. ⟨hal-00747133⟩
Accès au bibtex
BibTex
ref_biblio
Catherine Bernard, Hervé Debar, Salim Benayoune. Cross-domain vulnerabilities over social networks. CASoN '12 : 4th International Conference on Computational Aspects of Social Networks, Nov 2012, Sao Carlos, Brazil. pp.8-13, ⟨10.1109/CASoN.2012.6412370⟩. ⟨hal-00813344⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohamed Achemlal. Individual countermeasure selection based on the return on response investment index. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.156-170, ⟨10.1007/978-3-642-33704-8_14⟩. ⟨hal-00747144⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Grégoire Jacob, Hervé Debar, Luigi Coppolino. Combination approach to select optimal countermeasures based on the RORI index. INTECH '12 : Second International Conference on Innovative Computing Technology, Sep 2012, Casablanca, Morocco. pp.38-45, ⟨10.1109/INTECH.2012.6457801⟩. ⟨hal-00788696⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Hervé Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference, Dec 2012, Austin, United States. pp.171-180, ⟨10.1109/PCCC.2012.6407750⟩. ⟨hal-00813393⟩
Accès au bibtex
BibTex
ref_biblio
Marc Lacoste, Aurelien Wailly, Hervé Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Arnaud Ebalard, Benjamin Morin, Hervé Debar. One year of SSL internet measurement. ACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00768258⟩
Accès au bibtex
BibTex
ref_biblio
Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison. Challenges for advanced security monitoring : the MASSIF project. TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩. ⟨hal-00747573⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. KungFuVisor : enabling hypervisor self-defense. EuroDW '12 : The 6th EuroSys Doctoral Workshop, Apr 2012, Bern, Switzerland. ⟨hal-00738069⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. VESPA : multi-layered self-protection for cloud resources. ICAC '12 : The 9th ACM International Conference on Autonomic Computing, Sep 2012, San José, United States. pp.155-160, ⟨10.1145/2371536.2371564⟩. ⟨hal-00738174⟩
Accès au bibtex
BibTex

2011

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar. An ontology-based model for SIEM environments. ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩. ⟨hal-00728521⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Hervé Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
Accès au bibtex
BibTex

2010

ref_biblio
Yannick Carlinet, Ludovic Mé, Yvon Gourhant, Hervé Debar. Evaluation of P4P based on real traffic measurement. 5th International Conference on Internet Monitoring and Protection, May 2010, Barcelona, Spain. pp.NC. ⟨hal-00534571⟩
Accès au bibtex
BibTex
ref_biblio
Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Caching P2P traffic: what are the benefits for an ISP?. 9th International Conference on Networks - ICN 2010, Apr 2010, Menuires, France. pp.NC. ⟨hal-00534574⟩
Accès au bibtex
BibTex
ref_biblio
Hervé Debar, Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens. Service dependencies in information systems security. MMM-ACNS 2010 : 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, Sep 2010, Saint Petersburg, Russia. pp.1 - 20, ⟨10.1007/978-3-642-14706-7_1⟩. ⟨hal-01164740⟩
Accès au bibtex
BibTex
ref_biblio
Grégoire Jacob, Eric Filiol, Hervé Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. Ex-SDF: an extended service dependency framework for intrusion impact assessment. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩. ⟨hal-00565624⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Hervé Debar. A service dependency model for cost-sensitive intrusion response. ESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Athènes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩. ⟨hal-01164601⟩
Accès au bibtex
BibTex
ref_biblio
Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01306886/file/CloNeSecChallenge.pdf BibTex

2009

ref_biblio
Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka. A service dependency modeling framework for policy-based response enforcement. DIMVA 09 : 6th international conference on Detection of Intrusions, Malware and Vulnerability Assessment, Jul 2009, Como, Italy. pp.176-195. ⟨hal-00433302v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00433302/file/DIMVA09_-_Final_copy.pdf BibTex

2008

ref_biblio
Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. Analysis of Computer Virus Infection Risk Factors based on Customer Network Usage. 2nd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Aug 2008, Cap Estérel, France. ⟨hal-00353009⟩
Accès au bibtex
BibTex

2006

ref_biblio
Y. Thomas, Benjamin Morin, Hervé Debar. Improving security management through passive network observation. First International Conference on Availability, Reliability and Security (ARES), 2006, France. ⟨hal-00269297⟩
Accès au bibtex
BibTex
ref_biblio
Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Seguier. Time series modeling for IDS alert management. ACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113. ⟨hal-00143467⟩
Accès au bibtex
BibTex

2004

ref_biblio
Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p. ⟨hal-00356403⟩
Accès au bibtex
BibTex

Autre publication scientifique

2024

ref_biblio
Eva Poptcheva, Bram Vanderborght, Miguel Colom, Rūta Binkytė, Oana Balalau, et al.. Alvolution - al and digital technologies in the European Union. 2024. ⟨hal-04645463⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645463/file/AIvolution%20Conclusions%20%284%29.pdf BibTex

2023

ref_biblio
Matthews Jose, Rémi Badonnel, Thibault Cholez, Hervé Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 2023. ⟨hal-04165397⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165397/file/REWIRE_RESSI_application.pdf BibTex

Ouvrages

2021

ref_biblio
Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
Accès au bibtex
BibTex

Poster de conférence

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Hervé Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, En Ligne, France. ⟨hal-04165399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165399/file/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf BibTex

2013

ref_biblio
Aurelien Wailly, Marc Lacoste, Hervé Debar. RetroVisor : nested virtualization for multi IaaS VM availability. ComPAS 2013 : Conférence en Parallélisme, Architecture et Système, Jan 2013, Grenoble, France. 2013. ⟨hal-01287046⟩
Accès au bibtex
BibTex

Proceedings/Recueil des communications

2021

ref_biblio
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, et al.. Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense). CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021. ⟨hal-03535661⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03535661/file/Actes_CAID_2021%20%281%29.pdf BibTex