SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Pr. Hervé DEBAR

Professeur
SCN

Hervé.debar[@-Code to remove to avoid SPAM-]telecom-sudparis.eu

Article dans une revue

2023

ref_biblio
Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security, 2023, ⟨10.21203/rs.3.rs-3255684/v1⟩. ⟨hal-04400490⟩
Accès au bibtex
BibTex

2020

ref_biblio
Fran√ßois Boutigny, St√©phane Betg√©-Brezetz, Gregory Blanc, Antoine Lavignotte, Herv√© Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. Computers & Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02387073/file/COSE-D-19-00632R1-preprint.pdf BibTex

2019

ref_biblio
Christophe Kiennert, Pierre-Marie Bajan, Herv√© Debar. Evaluating security products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
Accès au bibtex
BibTex

2018

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Kiennert, Ismail Ziad, Herv√© Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
Accès au bibtex
BibTex

2017

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv√© Debar. A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01453253/file/preprint_JCSS_2016.pdf BibTex
ref_biblio
Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Herv√© Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv√© Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers & Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
Accès au bibtex
BibTex

2015

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, Mohammed El Barbori, Herv√© Debar. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Computers and Electrical Engineering, 2015, 47, pp.13 - 34. ⟨10.1016/j.compeleceng.2015.07.023⟩. ⟨hal-01255033⟩
Accès au bibtex
BibTex

2014

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Herv√© Debar, Gr√©goire Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
Accès au bibtex
BibTex

2013

ref_biblio
Yosra Ben Mustapha, Herv√© Debar. Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. International Symposium on Security in Computing and Communications, 2013, pp.313-321. ⟨10.1007/978-3-642-40576-1_31⟩. ⟨hal-00858941⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00858941/file/3770313.pdf BibTex

2012

ref_biblio
Yosra Ben Mustapha, Herv√© Debar, Gr√©goire Jacob. Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. International Conference Mathematical Methods, Models and Architectures for Computer Network Security, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N. ⟨hal-00738459⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Herv√© Debar. An ontology-driven approach to model SIEM information and operations using the SWRL formalism. International journal of electronic security and digital forensics, 2012, 4 (2/3), pp.104-123. ⟨10.1504/IJESDF.2012.048412⟩. ⟨hal-00724431⟩
Accès au bibtex
BibTex

2010

ref_biblio
Ludovic M√©, Herv√© Debar. New directions in Intrusion Detection and Alert Correlation. Revue I3 - Information Interaction Intelligence, 2010, 10 (1), pp.NC. ⟨hal-00534564⟩
Accès au bibtex
BibTex

2009

ref_biblio
Diala Abi Haidar, Nora Cuppens-Bouhlahia, Fr√©d√©ric Cuppens, Herv√© Debar. XeNA: an access negotiation framework using XACML. Annals of Telecommunications - annales des t√©l√©communications, 2009, 64 (1-2), pp.155 - 169. ⟨10.1007/s12243-008-0050-5⟩. ⟨hal-00448945⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00448945/file/fulltext.pdf BibTex
ref_biblio
Benjamin Morin, Ludovic M√©, Herv√© Debar, Mireille Ducass√©. A logic-based model to support alert correlation in intrusion detection. Information Fusion, 2009, 10 (4), pp.285-299. ⟨10.1016/j.inffus.2009.01.005⟩. ⟨hal-00353059⟩
Accès au bibtex
BibTex
ref_biblio
Jouni Viinikka, Herv√© Debar, Ludovic M√©, Anssi Lehikoinen, Mika Tarvainen. Processing Intrusion Detection Alert Aggregates with Time Series Modeling. Information Fusion, 2009, 10 (4), pp.312-324. ⟨hal-00353056⟩
Accès au bibtex
BibTex

2007

ref_biblio
Herv√© Debar, Yohann Thomas, Fr√©d√©ric Cuppens, Nora Cuppens-Boulahia. Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology (JCV), 2007, 3 (3), pp.195-210. ⟨hal-00439845⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00439845/file/jcv07.pdf BibTex

2004

ref_biblio
Herv√© Debar, Benjamin Morin, Fr√©d√©ric Cuppens, Fabien Autrel, Ludovic M√©, et al.. D√©tection d'intrusions : corr√©lation d'alertes. Revue des Sciences et Technologies de l'Information - S√©rie TSI : Technique et Science Informatiques, 2004, 23, 32 p. ⟨hal-00356418⟩
Accès au bibtex
BibTex
ref_biblio
Herv√© Debar, B. Morin, Fr√©d√©ric Cuppens, Fabien Autrel, Ludovic Me, et al.. Corr√©lation d'alertes en d√©tection d'intrusions. Revue des Sciences et Technologies de l'Information - S√©rie TSI : Technique et Science Informatiques, 2004, 23 (3). ⟨hal-02964546⟩
Accès au bibtex
BibTex

Communication dans un congrès

2023

ref_biblio
Marwan Abbas-Escribano, Herv√© Debar. An improved honeypot model for attack detection and analysis. The 18th International Conference on Availability, Reliability and Security (ARES), Aug 2023, Benevento, France. pp.1-10, ⟨10.1145/3600160.3604993⟩. ⟨hal-04400399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400399/file/3600160.3604993.pdf BibTex

2022

ref_biblio
Aina Toky Rasoamanana, Olivier Levillain, Herv√© Debar. Towards a¬†systematic and¬†automatic use of¬†state machine inference to¬†uncover security flaws and¬†fingerprint TLS stacks. 27th European Symposium on Research in Computer Security ( ESORICS), Sep 2022, Copenhague, France. pp.637-657, ⟨10.1007/978-3-031-17143-7_31⟩. ⟨hal-03997060⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03997060/file/document.pdf BibTex

2021

ref_biblio
Mustafizur R. Shahid, Herv√© Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States. ⟨10.1109/ICMLA52953.2021.00256⟩. ⟨hal-03430826⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03430826/file/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf BibTex

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Gregory Blanc, Herv√© Debar. Automated saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
Accès au bibtex
BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Herv√© Debar. Generative Deep Learning for Internet of Things Network Traffic Generation. 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2020, Perth, Australia. pp.70-79, ⟨10.1109/PRDC50213.2020.00018⟩. ⟨hal-03127899⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03127899/file/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf BibTex

2019

ref_biblio
Pierre-Marie Bajan, Christophe Kiennert, Herv√© Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02176684/file/Article_ICISSP.pdf BibTex
ref_biblio
Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Herv√© Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la S√©curit√© des Syst√®mes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438733/file/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv√© Debar. Anomalous communications detection in IoT networks using sparse autoencoders. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-5, ⟨10.1109/NCA.2019.8935007⟩. ⟨hal-02423336⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02423336/file/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf BibTex

2018

ref_biblio
Pierre-Marie Bajan, Herv√© Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01901017/file/Article_1_vConf.pdf BibTex
ref_biblio
Fran√ßois Boutigny, Stephane Betge-Brezetz, Herv√© Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
Accès au bibtex
BibTex
ref_biblio
Pierre-Edouard Fabre, Jouni Viinikka, Herv√© Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
Accès au bibtex
BibTex
ref_biblio
Cuong Pham, Gregory Blanc, Herv√© Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l‚ÄôEnseignement de la S√©curit√© des Syst√®mes d‚ÄôInformation, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02438757/file/pham_automatic_network_environment.pdf BibTex
ref_biblio
Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv√© Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01994156/file/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf BibTex

2017

ref_biblio
Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
Accès au bibtex
BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Herv√© Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01649980/file/3071064.3071068.pdf BibTex

2016

ref_biblio
Fran√ßois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Herv√© Debar. Hybrid Risk Assessment Model Based on Bayesian Networks. 11th International Workshop on Security, IWSEC 2016, Sep 2016, Tokyo, Japan. pp.21 - 40, ⟨10.1007/978-3-319-44524-3_2⟩. ⟨hal-01393744⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01393744/file/scalable-hybrid-attack-model.pdf BibTex
ref_biblio
Pierre-Edouard Fabre, Herv√© Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. NordSec 2016, Nov 2016, Oulu, Finland. pp.101--116, ⟨10.1007/978-3-319-47560-8_7⟩. ⟨hal-01387569⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Herv√© Debar. New types of alert correlation for security information and event management systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Herv√© Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01468032/file/preprint_trustcom2016.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Herv√© Debar. Selection of mitigation actions based on financial and operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450193/file/preprint-ares-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01450282/file/preprint-nordsec-2016-B.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv√© Debar. An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01487752/file/preprint_crisis2016.pdf BibTex
ref_biblio
Mickael Salaun, Marion Daubignard, Herv√© Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
Accès au bibtex
BibTex
ref_biblio
Jonathan Yung, Herv√© Debar, Louis Granboulan. Security issues and mitigation in Ethernet POWERLINK. CYBERICPS 2016 : 2nd international workshop on Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2016, Heraklion, Greece. ⟨10.1007/978-3-319-61437-3_6⟩. ⟨hal-01560206⟩
Accès au bibtex
BibTex

2015

ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Herv√© Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332029/file/preprint-ares-2015.pdf BibTex
ref_biblio
Malek Belhaouane, Joaquin Garcia-Alfaro, Herv√© Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332331/file/preprint-secrypt-2015.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv√© Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332277/file/preprint-securecomm-2015.pdf BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv√© Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01263402/file/preprint-NTMS-2015.pdf BibTex
ref_biblio
Guillaume Hiet, Herv√© Debar, S√©lim M√©nouar, V√©r√®ne Houdebine. Etude comparative des formats d‚Äôalertes. C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148. ⟨hal-01242786⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Gregory Blanc, Herv√© Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩. ⟨hal-01255089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01255089/file/337885_1_En_17_Chapter.pdf BibTex
ref_biblio
Olivier Levillain, Baptiste Gourdin, Herv√© Debar. TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), Apr 2015, Singapour, Singapore. pp.225-236, ⟨10.1145/2714576.2714592⟩. ⟨hal-01154820⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01154820/file/document.pdf BibTex
ref_biblio
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv√© Debar. Towards autonomic DDoS mitigation using Software Defined Networking. SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies, Feb 2015, San Diego, Ca, United States. ⟨10.14722/sent.2015.23004⟩. ⟨hal-01257899⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01257899/file/01_3_2.pdf BibTex

2014

ref_biblio
Yosra Ben Mustapha, Herv√© Debar, Gregory Blanc. Policy enforcement point model. SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278 - 286, ⟨10.1007/978-3-319-23829-6_20⟩. ⟨hal-01263380⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Herv√© Debar. Combining technical and financial impacts for countermeasure selection. AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention, Jun 2014, Marrakesh, Morocco. pp.1 - 14, ⟨10.4204/EPTCS.165.1⟩. ⟨hal-01257903⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01257903/file/countermeasure-selection.pdf BibTex
ref_biblio
Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Herv√© Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01332339/file/badgers14_ssl.pdf BibTex

2013

ref_biblio
Khaled El Dassouki, Herv√© Debar, Haidar Safa, Abbas Hijazi. A TCP delay based mechanism for detecting congestion in the internet. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.141-145, ⟨10.1109/ICCITechnology.2013.6579538⟩. ⟨hal-00860428⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Joaquin Garcia-Alfaro, Herv√© Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Herv√© Debar, Benjamin Morin. Parsifal: writing efficient and robust binary parsers, quickly. 8th International Conference on Risks and Security of Internet and Systems, Oct 2013, La Rochelle, France. pp.1. ⟨hal-00924120⟩
Accès au bibtex
BibTex
ref_biblio
Ahmad Samer Wazan, Gregory Blanc, Herv√© Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
Accès au bibtex
BibTex

2012

ref_biblio
Yosra Ben Mustapha, Herv√© Debar, Gr√©goire Jacob. Limitation of honeypot/honeynet databases to enhance alert correlation. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.203-217, ⟨10.1007/978-3-642-33704-8_18⟩. ⟨hal-00747133⟩
Accès au bibtex
BibTex
ref_biblio
Catherine Bernard, Herv√© Debar, Salim Benayoune. Cross-domain vulnerabilities over social networks. CASoN '12 : 4th International Conference on Computational Aspects of Social Networks, Nov 2012, Sao Carlos, Brazil. pp.8-13, ⟨10.1109/CASoN.2012.6412370⟩. ⟨hal-00813344⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Gr√©goire Jacob, Herv√© Debar, Luigi Coppolino. Combination approach to select optimal countermeasures based on the RORI index. INTECH '12 : Second International Conference on Innovative Computing Technology, Sep 2012, Casablanca, Morocco. pp.38-45, ⟨10.1109/INTECH.2012.6457801⟩. ⟨hal-00788696⟩
Accès au bibtex
BibTex
ref_biblio
Gustavo Daniel Gonzalez Granadillo, Herv√© Debar, Gr√©goire Jacob, Chrystel Gaber, Mohamed Achemlal. Individual countermeasure selection based on the return on response investment index. MMM-ACNS '12 : Sixth International Conference "Mathematical Methods, Models, and Architectures for Computer Network Security", Oct 2012, Saint Petersburg, Russia. pp.156-170, ⟨10.1007/978-3-642-33704-8_14⟩. ⟨hal-00747144⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Herv√© Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference, Dec 2012, Austin, United States. pp.171-180, ⟨10.1109/PCCC.2012.6407750⟩. ⟨hal-00813393⟩
Accès au bibtex
BibTex
ref_biblio
Marc Lacoste, Aurelien Wailly, Herv√© Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Arnaud √Čbalard, Benjamin Morin, Herv√© Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Levillain, Arnaud Ebalard, Benjamin Morin, Herv√© Debar. One year of SSL internet measurement. ACSAC '12 : 28th Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00768258⟩
Accès au bibtex
BibTex
ref_biblio
Roland Rieke, Elsa Prieto, Rodrigo Diaz, Herv√© Debar, Andrew Hutchison. Challenges for advanced security monitoring : the MASSIF project. TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business, Sep 2012, Vienne, Austria. pp.222-223, ⟨10.1007/978-3-642-32287-7_23⟩. ⟨hal-00747573⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Herv√© Debar. KungFuVisor : enabling hypervisor self-defense. EuroDW '12 : The 6th EuroSys Doctoral Workshop, Apr 2012, Bern, Switzerland. ⟨hal-00738069⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Herv√© Debar. VESPA : multi-layered self-protection for cloud resources. ICAC '12 : The 9th ACM International Conference on Autonomic Computing, Sep 2012, San Jos√©, United States. pp.155-160, ⟨10.1145/2371536.2371564⟩. ⟨hal-00738174⟩
Accès au bibtex
BibTex

2011

ref_biblio
Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Herv√© Debar. An ontology-based model for SIEM environments. ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability, Aug 2011, Thessalonik, Greece. pp.148-155, ⟨10.1007/978-3-642-33448-1_21⟩. ⟨hal-00728521⟩
Accès au bibtex
BibTex
ref_biblio
Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Herv√© Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Herv√© Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
Accès au bibtex
BibTex
ref_biblio
Aurelien Wailly, Marc Lacoste, Herv√© Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
Accès au bibtex
BibTex

2010

ref_biblio
Yannick Carlinet, Ludovic M√©, Yvon Gourhant, Herv√© Debar. Evaluation of P4P based on real traffic measurement. 5th International Conference on Internet Monitoring and Protection, May 2010, Barcelona, Spain. pp.NC. ⟨hal-00534571⟩
Accès au bibtex
BibTex
ref_biblio
Yannick Carlinet, Ludovic M√©, Herv√© Debar, Yvon Gourhant. Caching P2P traffic: what are the benefits for an ISP?. 9th International Conference on Networks - ICN 2010, Apr 2010, Menuires, France. pp.NC. ⟨hal-00534574⟩
Accès au bibtex
BibTex
ref_biblio
Herv√© Debar, Nizar Kheir, Nora Cuppens-Bouhlahia, Fr√©d√©ric Cuppens. Service dependencies in information systems security. MMM-ACNS 2010 : 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, Sep 2010, Saint Petersburg, Russia. pp.1 - 20, ⟨10.1007/978-3-642-14706-7_1⟩. ⟨hal-01164740⟩
Accès au bibtex
BibTex
ref_biblio
Gr√©goire Jacob, Eric Filiol, Herv√© Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Nora Cuppens-Bouhlahia, Fr√©d√©ric Cuppens, Herv√© Debar. Ex-SDF: an extended service dependency framework for intrusion impact assessment. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩. ⟨hal-00565624⟩
Accès au bibtex
BibTex
ref_biblio
Nizar Kheir, Nora Cuppens-Bouhlahia, Fr√©d√©ric Cuppens, Herv√© Debar. A service dependency model for cost-sensitive intrusion response. ESORICS 2010 : 15th European Symposium on Research in Computer Security, Sep 2010, Ath√®nes, Greece. pp.626 - 642, ⟨10.1007/978-3-642-15497-3_38⟩. ⟨hal-01164601⟩
Accès au bibtex
BibTex
ref_biblio
Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01306886/file/CloNeSecChallenge.pdf BibTex

2009

ref_biblio
Nizar Kheir, Herv√© Debar, Fr√©d√©ric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka. A service dependency modeling framework for policy-based response enforcement. DIMVA 09 : 6th international conference on Detection of Intrusions, Malware and Vulnerability Assessment, Jul 2009, Como, Italy. pp.176-195. ⟨hal-00433302v2⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00433302/file/DIMVA09_-_Final_copy.pdf BibTex

2008

ref_biblio
Yannick Carlinet, Ludovic M√©, Herv√© Debar, Yvon Gourhant. Analysis of Computer Virus Infection Risk Factors based on Customer Network Usage. 2nd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Aug 2008, Cap Est√©rel, France. ⟨hal-00353009⟩
Accès au bibtex
BibTex

2006

ref_biblio
Y. Thomas, Benjamin Morin, Herv√© Debar. Improving security management through passive network observation. First International Conference on Availability, Reliability and Security (ARES), 2006, France. ⟨hal-00269297⟩
Accès au bibtex
BibTex
ref_biblio
Jouni Viinikka, Herv√© Debar, Ludovic M√©, Renaud Seguier. Time series modeling for IDS alert management. ACM Symposium on Information, Computer and Communications Security, ASIACCS, Mar 2006, France. pp.102-113. ⟨hal-00143467⟩
Accès au bibtex
BibTex

2004

ref_biblio
Elvis Tombini, Herv√© Debar, Ludovic M√©, Mireille Ducass√©. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Annual Computer Security Applications Conference 2004, Sep 2004, Beijing, China. 10 p. ⟨hal-00356403⟩
Accès au bibtex
BibTex

Autre publication scientifique

2024

ref_biblio
Eva Poptcheva, Oana Balalau, Oana Goga, Herv√© Debar, Marceau Coupechoux, et al.. Alvolution - Al and digital technologies in the European Union: Conclusions. 2024. ⟨hal-04645463⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04645463/file/AIvolution%20Conclusions%20%284%29.pdf BibTex

2023

ref_biblio
Matthews Jose, R√©mi Badonnel, Thibault Cholez, Herv√© Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la S√©curit√© des Syst√®mes d'Information, 2023. ⟨hal-04165397⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165397/file/REWIRE_RESSI_application.pdf BibTex

Ouvrages

2021

ref_biblio
Joaquin Garcia‚Äźalfaro, Shujun Li, Radha Poovendran, Herv√© Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6‚Äď9, 2021, proceedings, part I. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
Accès au bibtex
BibTex
ref_biblio
Joaquin Garcia‚Äźalfaro, Shujun Li, Radha Poovendran, Herv√© Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6‚Äď9, 2021, proceedings, part II. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
Accès au bibtex
BibTex

Poster de conférence

2020

ref_biblio
Elkin Aguas, Anthony Lambert, Herv√© Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S√©curit√© des Syst√®mes d'Information, Dec 2020, En Ligne, France. ⟨hal-04165399⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04165399/file/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf BibTex

2013

ref_biblio
Aurelien Wailly, Marc Lacoste, Herv√© Debar. RetroVisor : nested virtualization for multi IaaS VM availability. ComPAS 2013 : Conf√©rence en Parall√©lisme, Architecture et Syst√®me, Jan 2013, Grenoble, France. 2013. ⟨hal-01287046⟩
Accès au bibtex
BibTex

Proceedings/Recueil des communications

2021

ref_biblio
Alexandre Dey, Benjamin Cost√©, √Čric Totel, Adrien B√©cue, Elkin Aguas, et al.. Actes de la conf√©rence CAID 2021 (Conference on Artificial Intelligence for Defense). CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021. ⟨hal-03535661⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03535661/file/Actes_CAID_2021%20%281%29.pdf BibTex