{"id":3558,"date":"2022-04-14T11:37:24","date_gmt":"2022-04-14T09:37:24","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/herve-debar-2\/"},"modified":"2022-04-14T11:37:37","modified_gmt":"2022-04-14T09:37:37","slug":"herve-debar-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/herve-debar-2\/","title":{"rendered":"Herv\u00e9 DEBAR"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/Debar-150x150.jpeg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Pr. Herv\u00e9 <span class=\"MonLabo-lastname\">DEBAR<\/span><\/h1><div class=\"coordonnees\"><em>Professeur<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">Herv\u00e9.debar[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><div class=\"external_url\"><h1 style=\"text-align: center;\"><a href=\"https:\/\/www-public.imtbs-tsp.eu\/~debar_he\/\"><button class=\"btn btn-oldstyle\" type=\"button\">Site personnel<\/button><\/a><\/h1><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dimitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, et al.. RAMA: a risk assessment solution for healthcare organizations. <i>International Journal of Information Security<\/i>, 2023, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.21203\/rs.3.rs-3255684\/v1\">&#x27E8;10.21203\/rs.3.rs-3255684\/v1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04400490v1\">&#x27E8;hal-04400490&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04400490v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois Boutigny, St\u00e9phane Betg\u00e9-Brezetz, Gregory Blanc, Antoine Lavignotte, Herv\u00e9 Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. <i>Computers & Security<\/i>, 2020, 89, pp.101662-1 - 101662-18. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2019.101662\">&#x27E8;10.1016\/j.cose.2019.101662&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02387073v1\">&#x27E8;hal-02387073&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02387073\/file\/COSE-D-19-00632R1-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02387073v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Pierre-Marie Bajan, Herv\u00e9 Debar. Evaluating security products: formal model and requirements of a new approach. <i>International Journal On Advances in Security<\/i>, 2019, 12 (1 & 2), pp.29-41. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02281230v1\">&#x27E8;hal-02281230&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02281230v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. <i>Future Generation Computer Systems<\/i>, 2018, 83, pp.535 - 552. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.future.2017.05.043\">&#x27E8;10.1016\/j.future.2017.05.043&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01745780v1\">&#x27E8;hal-01745780&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01745780v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Ismail Ziad, Herv\u00e9 Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. <i>ACM Computing Surveys<\/i>, 2018, 51 (5), pp.1-31. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3232848\">&#x27E8;10.1145\/3232848&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02009646v1\">&#x27E8;hal-02009646&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02009646v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. A polytope-based approach to measure the impact of events against critical infrastructures. <i>Journal of Computer and System Sciences<\/i>, 2017, 83 (1), pp.3 - 21. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jcss.2016.02.004\">&#x27E8;10.1016\/j.jcss.2016.02.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01453253v1\">&#x27E8;hal-01453253&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01453253\/file\/preprint_JCSS_2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01453253v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Herv\u00e9 Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. <i>EURASIP Journal on Information Security<\/i>, 2017, 2017 (12), pp.1 - 22. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13635-017-0063-6\">&#x27E8;10.1186\/s13635-017-0063-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01649965v1\">&#x27E8;hal-01649965&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01649965v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. <i>Computers & Security<\/i>, 2017, 70, pp.482 - 499. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2017.07.008\">&#x27E8;10.1016\/j.cose.2017.07.008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01648031v1\">&#x27E8;hal-01648031&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01648031v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, Mohammed El Barbori, Herv\u00e9 Debar. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. <i>Computers and Electrical Engineering<\/i>, 2015, 47, pp.13 - 34. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.compeleceng.2015.07.023\">&#x27E8;10.1016\/j.compeleceng.2015.07.023&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255033v1\">&#x27E8;hal-01255033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255033v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Herv\u00e9 Debar, Gr\u00e9goire Jacob. RORI-based countermeasure selection using the OrBAC formalism. <i>International Journal of Information Security<\/i>, 2014, 13 (1), pp.63 - 79. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-013-0207-8\">&#x27E8;10.1007\/s10207-013-0207-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01274857v1\">&#x27E8;hal-01274857&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01274857v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Mustapha, Herv\u00e9 Debar. Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. <i>International Symposium on Security in Computing and Communications<\/i>, 2013, pp.313-321. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-40576-1_31\">&#x27E8;10.1007\/978-3-642-40576-1_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00858941v1\">&#x27E8;hal-00858941&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00858941\/file\/3770313.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00858941\/file\/3770313.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00858941\/file\/3770313.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00858941v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Mustapha, Herv\u00e9 Debar, Gr\u00e9goire Jacob. Limitation of Honeypot\/Honeynet Databases to Enhance Alert Correlation. <i>International Conference Mathematical Methods, Models and Architectures for Computer Network Security<\/i>, 2012, 7531, pp.Proceedings of the International Conference on Mathematical Methods, Models, and Architectures for N. <a target=\"_blank\" href=\"https:\/\/hal.sorbonne-universite.fr\/hal-00738459v1\">&#x27E8;hal-00738459&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.sorbonne-universite.fr\/hal-00738459v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Herv\u00e9 Debar. An ontology-driven approach to model SIEM information and operations using the SWRL formalism. <i>International journal of electronic security and digital forensics<\/i>, 2012, 4 (2\/3), pp.104-123. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1504\/IJESDF.2012.048412\">&#x27E8;10.1504\/IJESDF.2012.048412&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00724431v1\">&#x27E8;hal-00724431&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00724431v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ludovic M\u00e9, Herv\u00e9 Debar. New directions in Intrusion Detection and Alert Correlation. <i>Revue I3 - Information Interaction Intelligence<\/i>, 2010, 10 (1), pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00534564v1\">&#x27E8;hal-00534564&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00534564v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diala Abi Haidar, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Herv\u00e9 Debar. XeNA: an access negotiation framework using XACML. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2009, 64 (1-2), pp.155 - 169. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-008-0050-5\">&#x27E8;10.1007\/s12243-008-0050-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00448945v1\">&#x27E8;hal-00448945&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00448945\/file\/fulltext.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00448945\/file\/fulltext.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00448945\/file\/fulltext.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00448945v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Benjamin Morin, Ludovic M\u00e9, Herv\u00e9 Debar, Mireille Ducass\u00e9. A logic-based model to support alert correlation in intrusion detection. <i>Information Fusion<\/i>, 2009, 10 (4), pp.285-299. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.inffus.2009.01.005\">&#x27E8;10.1016\/j.inffus.2009.01.005&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00353059v1\">&#x27E8;hal-00353059&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00353059v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jouni Viinikka, Herv\u00e9 Debar, Ludovic M\u00e9, Anssi Lehikoinen, Mika Tarvainen. Processing Intrusion Detection Alert Aggregates with Time Series Modeling. <i>Information Fusion<\/i>, 2009, 10 (4), pp.312-324. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00353056v1\">&#x27E8;hal-00353056&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00353056v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, Yohann Thomas, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia. Enabling automated threat response through the use of a dynamic security policy. <i>Journal in Computer Virology (JCV)<\/i>, 2007, 3 (3), pp.195-210. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00439845v1\">&#x27E8;hal-00439845&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00439845\/file\/jcv07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00439845\/file\/jcv07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00439845\/file\/jcv07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00439845v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2004<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, Benjamin Morin, Fr\u00e9d\u00e9ric Cuppens, Fabien Autrel, Ludovic M\u00e9, et al.. D\u00e9tection d'intrusions : corr\u00e9lation d'alertes. <i>Revue des Sciences et Technologies de l'Information - S\u00e9rie TSI : Technique et Science Informatiques<\/i>, 2004, 23, 32 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00356418v1\">&#x27E8;hal-00356418&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00356418v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, B. Morin, Fr\u00e9d\u00e9ric Cuppens, Fabien Autrel, Ludovic Me, et al.. Corr\u00e9lation d'alertes en d\u00e9tection d'intrusions. <i>Revue des Sciences et Technologies de l'Information - S\u00e9rie TSI : Technique et Science Informatiques<\/i>, 2004, 23 (3). <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02964546v1\">&#x27E8;hal-02964546&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02964546v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Umberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, et al.. No bot allowed: detection of automated traffic on modern booking platforms. Methods, insights, and current challenges. <i>Assessment with New methodologies, Unified Benchmarks, and environments, of Intrusion detection and response Systems (ANUBIS @ESORICS)<\/i>, Sep 2025, Toulouse, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05470994v1\">&#x27E8;hal-05470994&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05470994\/file\/ANUBIS2025_No_Bot_Allowed.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05470994\/file\/ANUBIS2025_No_Bot_Allowed.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05470994\/file\/ANUBIS2025_No_Bot_Allowed.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05470994v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Umberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, et al.. Detecting scrapers on E-commerce websites using a reduced feature set. <i>2025 55th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)<\/i>, Jun 2025, Naples, Italy. pp.257 - 258, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/dsn-s65789.2025.00073\">&#x27E8;10.1109\/dsn-s65789.2025.00073&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05319353v1\">&#x27E8;hal-05319353&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05319353\/file\/124_POSTER.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05319353\/file\/124_POSTER.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05319353\/file\/124_POSTER.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05319353v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Arthur Tran Van, Olivier Levillain, Herve Debar. Mealy verifier : an automated, exhaustive, and explainable methodology for analyzing state machines in protocol implementations. <i>The 19th International Conference on Availability, Reliability and Security (ARES 2024)<\/i>, Jul 2024, Vienna Austria, France. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3664506\">&#x27E8;10.1145\/3664476.3664506&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04695972v1\">&#x27E8;hal-04695972&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04695972\/file\/MealyVerifier.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04695972\/file\/MealyVerifier.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04695972\/file\/MealyVerifier.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04695972v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marwan Abbas-Escribano, Herv\u00e9 Debar. An improved honeypot model for attack detection and analysis. <i>The 18th International Conference on Availability, Reliability and Security (ARES)<\/i>, Aug 2023, Benevento, France. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3600160.3604993\">&#x27E8;10.1145\/3600160.3604993&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04400399v1\">&#x27E8;hal-04400399&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04400399\/file\/3600160.3604993.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04400399\/file\/3600160.3604993.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04400399\/file\/3600160.3604993.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04400399v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aina Toky Rasoamanana, Olivier Levillain, Herv\u00e9 Debar. Towards a\u00a0systematic and\u00a0automatic use of\u00a0state machine inference to\u00a0uncover security flaws and\u00a0fingerprint TLS stacks. <i>27th European Symposium on Research in Computer Security ( ESORICS)<\/i>, Sep 2022, Copenhague, France. pp.637-657, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-17143-7_31\">&#x27E8;10.1007\/978-3-031-17143-7_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997060v1\">&#x27E8;hal-03997060&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997060\/file\/document.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997060\/file\/document.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997060\/file\/document.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997060v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur R. Shahid, Herv\u00e9 Debar. CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description. <i>2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)<\/i>, Dec 2021, Pasadena, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICMLA52953.2021.00256\">&#x27E8;10.1109\/ICMLA52953.2021.00256&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03430826v1\">&#x27E8;hal-03430826&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03430826\/file\/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03430826\/file\/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03430826\/file\/CVSS_BERT__Explainable_Natural_Language_Processing_to_Determine_the_Severity_of_a_Computer_Security_Vulnerability_from_its_Description.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03430826v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elkin Aguas, Anthony Lambert, Gregory Blanc, Herv\u00e9 Debar. Automated saturation mitigation controlled by deep reinforcement learning. <i>ICNP 2020: IEEE 28th International Conference on Network Protocols<\/i>, Oct 2020, Madrid (online), Spain. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICNP49622.2020.9259356\">&#x27E8;10.1109\/ICNP49622.2020.9259356&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03124039v1\">&#x27E8;hal-03124039&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03124039v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Herv\u00e9 Debar. Generative Deep Learning for Internet of Things Network Traffic Generation. <i>2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)<\/i>, Dec 2020, Perth, Australia. pp.70-79, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PRDC50213.2020.00018\">&#x27E8;10.1109\/PRDC50213.2020.00018&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03127899v1\">&#x27E8;hal-03127899&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03127899\/file\/Generative_Deep_Learning_for_Internet_of_Things_Network_Traffic_Generation.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03127899v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Marie Bajan, Christophe Kiennert, Herv\u00e9 Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. <i>ICISSP 2019: 5th International Conference on Information Systems Security and Privacy<\/i>, Feb 2019, Prague, Czech Republic. pp.378-388, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0007378603780388\">&#x27E8;10.5220\/0007378603780388&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02176684v1\">&#x27E8;hal-02176684&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02176684\/file\/Article_ICISSP.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02176684v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Anomalous communications detection in IoT networks using sparse autoencoders. <i>NCA 2019: 18th International Symposium on Network Computing and Applications<\/i>, Sep 2019, Cambridge, MA, United States. pp.1-5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2019.8935007\">&#x27E8;10.1109\/NCA.2019.8935007&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02423336v1\">&#x27E8;hal-02423336&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02423336\/file\/IEEE_NCA2019_Anomalous_Communications_Detection_in_IoT_Networks_Using_Sparse_Autoencoders.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02423336v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Machine learning for IoT network monitoring. <i>RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2019, Erquy, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438733v1\">&#x27E8;hal-02438733&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438733\/file\/final_RESSI_2019_ML_for_IoT_network_monitoring.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438733v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Marie Bajan, Herv\u00e9 Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. <i>ICIMP 2018: 13th International Conference on Internet Monitoring and Protection<\/i>, Jul 2018, Barcelone, Spain. pp.35-41. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01901017v1\">&#x27E8;hal-01901017&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01901017\/file\/Article_1_vConf.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01901017v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois Boutigny, Stephane Betge-Brezetz, Herv\u00e9 Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. <i>NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Feb 2018, Paris, France. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2018.8328706\">&#x27E8;10.1109\/NTMS.2018.8328706&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01868949v1\">&#x27E8;hal-01868949&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01868949v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Edouard Fabre, Jouni Viinikka, Herv\u00e9 Debar, Gregory Blanc. Network visibility-aware blacklist generation. <i>ICIMP 2018: 13th International Conference on Internet Monitoring and Protection<\/i>, Jul 2018, Barcelone, Spain. pp.7 - 15. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01987693v1\">&#x27E8;hal-01987693&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01987693v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cuong Pham, Gregory Blanc, Herv\u00e9 Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. <i>RESSI 2018: Rendez-vous de la Recherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/i>, May 2018, La Bresse, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02438757v1\">&#x27E8;hal-02438757&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02438757\/file\/pham_automatic_network_environment.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02438757v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. IoT devices recognition through network traffic analysis. <i>BIG DATA 2018: IEEE International Conference on Big Data<\/i>, Dec 2018, Seattle, United States. pp.5187-5192, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BigData.2018.8622243\">&#x27E8;10.1109\/BigData.2018.8622243&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01994156v1\">&#x27E8;hal-01994156&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01994156\/file\/IEEE_BigData2018_IoT_devices_recognition_through_network_traffic_analysis.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01994156v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. <i>MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security<\/i>, Aug 2017, Warsaw, Poland. pp.75 - 87, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-65127-9_7\">&#x27E8;10.1007\/978-3-319-65127-9_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01648050v1\">&#x27E8;hal-01648050&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01648050v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Herv\u00e9 Debar. Adaptive policy-driven attack mitigation in SDN. <i>XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO)<\/i>, Apr 2017, Belgrade, Serbia. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3071064.3071068\">&#x27E8;10.1145\/3071064.3071068&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01649980v1\">&#x27E8;hal-01649980&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01649980\/file\/3071064.3071068.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01649980v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fran\u00e7ois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Herv\u00e9 Debar. Hybrid Risk Assessment Model Based on Bayesian Networks. <i>11th International Workshop on Security, IWSEC 2016<\/i>, Sep 2016, Tokyo, Japan. pp.21 - 40, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-44524-3_2\">&#x27E8;10.1007\/978-3-319-44524-3_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01393744v1\">&#x27E8;hal-01393744&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01393744\/file\/scalable-hybrid-attack-model.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01393744v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pierre-Edouard Fabre, Herv\u00e9 Debar, Jouni Viinikka, Gregory Blanc. ML: DDoS Damage Control with MPLS. <i>NordSec 2016<\/i>, Nov 2016, Oulu, Finland. pp.101--116, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_7\">&#x27E8;10.1007\/978-3-319-47560-8_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01387569v1\">&#x27E8;hal-01387569&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01387569v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Selection of mitigation actions based on financial and operational impact assessments. <i>ARES 2016 : 11th International Conference on Availability, Reliability and Security<\/i>, Aug 2016, Salzburg, Austria. pp.137 - 146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2016.3\">&#x27E8;10.1109\/ARES.2016.3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450193v1\">&#x27E8;hal-01450193&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450193\/file\/preprint-ares-2016-B.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450193v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Ender Yesid Alvarez Lopez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. <i>NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems<\/i>, Nov 2016, Oulu, Finland. pp.37 - 53, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-47560-8_3\">&#x27E8;10.1007\/978-3-319-47560-8_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01450282v1\">&#x27E8;hal-01450282&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01450282\/file\/preprint-nordsec-2016-B.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01450282v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. An n-sided polygonal model to calculate the impact of cyber security events. <i>CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems<\/i>, Sep 2016, Roscoff, France. pp.87 - 102, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-54876-0_7\">&#x27E8;10.1007\/978-3-319-54876-0_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01487752v1\">&#x27E8;hal-01487752&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01487752\/file\/preprint_crisis2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01487752v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. <i>TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Aug 2016, Tianjin, China. pp.340 - 348, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2016.0082\">&#x27E8;10.1109\/TrustCom.2016.0082&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01468032v1\">&#x27E8;hal-01468032&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01468032\/file\/preprint_trustcom2016.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01468032v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Herv\u00e9 Debar. New types of alert correlation for security information and event management systems. <i>NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Nov 2016, Larnaca, Cyprus. pp.1 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2016.7792462\">&#x27E8;10.1109\/NTMS.2016.7792462&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01452817v1\">&#x27E8;hal-01452817&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01452817v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mickael Salaun, Marion Daubignard, Herv\u00e9 Debar. StemJail: dynamic role compartmentalization. <i>ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security <\/i>, May 2016, Xi'An, China. pp.865 - 876 <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2897845.2897912\">&#x27E8;10.1145\/2897845.2897912&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01452811v1\">&#x27E8;hal-01452811&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01452811v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jonathan Yung, Herv\u00e9 Debar, Louis Granboulan. Security issues and mitigation in Ethernet POWERLINK. <i>CYBERICPS 2016 : 2nd international workshop on Security of Industrial Control Systems and Cyber-Physical Systems<\/i>, Sep 2016, Heraklion, Greece. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-61437-3_6\">&#x27E8;10.1007\/978-3-319-61437-3_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01560206v1\">&#x27E8;hal-01560206&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01560206v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Malek Belhaouane, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. On the isofunctionality of network access control lists. <i>ARES 2015: 10th International Conference on Availability, Reliability and Security<\/i>, Aug 2015, Toulouse, France. pp.168 - 173, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2015.78\">&#x27E8;10.1109\/ARES.2015.78&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332029v1\">&#x27E8;hal-01332029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332029\/file\/preprint-ares-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332029v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Malek Belhaouane, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. <i>SECRYPT 2015 : 12th International Conference on Security and Cryptography<\/i>, Jul 2015, Colmar, France. pp.53 - 64, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005544100530064\">&#x27E8;10.5220\/0005544100530064&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332331v1\">&#x27E8;hal-01332331&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332331\/file\/preprint-secrypt-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332331v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. <i>NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security<\/i>, Jul 2015, Paris, France. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2015.7266480\">&#x27E8;10.1109\/NTMS.2015.7266480&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263402v2\">&#x27E8;hal-01263402v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263402\/file\/preprint-NTMS-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263402v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. <i>11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015)<\/i>, Oct 2015, Dallas, TX, United States. pp.538-555, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-28865-9_29\">&#x27E8;10.1007\/978-3-319-28865-9_29&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332277v1\">&#x27E8;hal-01332277&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332277\/file\/preprint-securecomm-2015.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332277v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Guillaume Hiet, Herv\u00e9 Debar, S\u00e9lim M\u00e9nouar, V\u00e9r\u00e8ne Houdebine. Etude comparative des formats d\u2019alertes. <i>C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015<\/i>, Nov 2015, Rennes, France. pp.125-148. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01242786v1\">&#x27E8;hal-01242786&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01242786v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro, Dingqi Yang. Automated classification of C&C connections through malware URL clustering. <i> 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection<\/i>, May 2015, Hamburg, Germany. pp.252 - 266, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-18467-8_17\">&#x27E8;10.1007\/978-3-319-18467-8_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255089v1\">&#x27E8;hal-01255089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01255089\/file\/337885_1_En_17_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01255089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Levillain, Baptiste Gourdin, Herv\u00e9 Debar. TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. <i>10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15)<\/i>, Apr 2015, Singapour, Singapore. pp.225-236, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2714576.2714592\">&#x27E8;10.1145\/2714576.2714592&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01154820v1\">&#x27E8;hal-01154820&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01154820\/file\/document.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01154820\/file\/document.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01154820\/file\/document.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01154820v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Herv\u00e9 Debar. Towards autonomic DDoS mitigation using Software Defined Networking. <i>SENT 2015 : NDSS Workshop on Security of Emerging Networking Technologies<\/i>, Feb 2015, San Diego, Ca, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.14722\/sent.2015.23004\">&#x27E8;10.14722\/sent.2015.23004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01257899v1\">&#x27E8;hal-01257899&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01257899\/file\/01_3_2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01257899v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Mustapha, Herv\u00e9 Debar, Gregory Blanc. Policy enforcement point model. <i>SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks<\/i>, Sep 2014, Beijing, China. pp.278 - 286, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-23829-6_20\">&#x27E8;10.1007\/978-3-319-23829-6_20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263380v1\">&#x27E8;hal-01263380&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263380v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Herv\u00e9 Debar. Combining technical and financial impacts for countermeasure selection. <i>AIDP 2014 : International Workshop on Advanced Intrusion Detection and Prevention<\/i>, Jun 2014, Marrakesh, Morocco. pp.1 - 14, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4204\/EPTCS.165.1\">&#x27E8;10.4204\/EPTCS.165.1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01257903v1\">&#x27E8;hal-01257903&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01257903\/file\/countermeasure-selection.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01257903v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. <i>BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security<\/i>, Sep 2014, Wroclaw, Poland. pp.30 - 39, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BADGERS.2014.10\">&#x27E8;10.1109\/BADGERS.2014.10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01332339v1\">&#x27E8;hal-01332339&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01332339\/file\/badgers14_ssl.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01332339v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khaled El Dassouki, Herv\u00e9 Debar, Haidar Safa, Abbas Hijazi. A TCP delay based mechanism for detecting congestion in the internet. <i>ICCIT '13 : The Third International Conference on Communications and Information Technology<\/i>, Jun 2013, Beirut, Lebanon. pp.141-145, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICCITechnology.2013.6579538\">&#x27E8;10.1109\/ICCITechnology.2013.6579538&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00860428v1\">&#x27E8;hal-00860428&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00860428v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nabil Hachem, Joaquin Garcia-Alfaro, Herv\u00e9 Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. <i>NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems<\/i>, Oct 2013, Ilulissat, Greenland. pp.297 - 312, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-41488-6_20\">&#x27E8;10.1007\/978-3-642-41488-6_20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01269681v1\">&#x27E8;hal-01269681&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01269681v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Levillain, Herv\u00e9 Debar, Benjamin Morin. Parsifal: writing efficient and robust binary parsers, quickly. <i>8th International Conference on Risks and Security of Internet and Systems<\/i>, Oct 2013, La Rochelle, France. pp.1. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00924120v1\">&#x27E8;hal-00924120&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00924120v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ahmad Samer Wazan, Gregory Blanc, Herv\u00e9 Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. <i>TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Jul 2013, Melbourne, Australia. pp.421 - 430, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2013.53\">&#x27E8;10.1109\/TrustCom.2013.53&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275020v1\">&#x27E8;hal-01275020&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275020v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Mustapha, Herv\u00e9 Debar, Gr\u00e9goire Jacob. Limitation of honeypot\/honeynet databases to enhance alert correlation. <i>MMM-ACNS '12 : Sixth International Conference \"Mathematical Methods, Models, and Architectures for Computer Network Security\"<\/i>, Oct 2012, Saint Petersburg, Russia. pp.203-217, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33704-8_18\">&#x27E8;10.1007\/978-3-642-33704-8_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00747133v1\">&#x27E8;hal-00747133&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00747133v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Catherine Bernard, Herv\u00e9 Debar, Salim Benayoune. Cross-domain vulnerabilities over social networks. <i>CASoN '12 : 4th International Conference on Computational Aspects of Social Networks<\/i>, Nov 2012, Sao Carlos, Brazil. pp.8-13, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CASoN.2012.6412370\">&#x27E8;10.1109\/CASoN.2012.6412370&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00813344v1\">&#x27E8;hal-00813344&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00813344v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Herv\u00e9 Debar, Gr\u00e9goire Jacob, Chrystel Gaber, Mohamed Achemlal. Individual countermeasure selection based on the return on response investment index. <i>MMM-ACNS '12 : Sixth International Conference \"Mathematical Methods, Models, and Architectures for Computer Network Security\"<\/i>, Oct 2012, Saint Petersburg, Russia. pp.156-170, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33704-8_14\">&#x27E8;10.1007\/978-3-642-33704-8_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00747144v1\">&#x27E8;hal-00747144&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00747144v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Gr\u00e9goire Jacob, Herv\u00e9 Debar, Luigi Coppolino. Combination approach to select optimal countermeasures based on the RORI index. <i>INTECH '12 : Second International Conference on Innovative Computing Technology<\/i>, Sep 2012, Casablanca, Morocco. pp.38-45, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/INTECH.2012.6457801\">&#x27E8;10.1109\/INTECH.2012.6457801&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00788696v1\">&#x27E8;hal-00788696&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00788696v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nabil Hachem, Herv\u00e9 Debar, Joaquin Garcia Alfaro. HADEGA : a novel MPLS-based mitigation solution to handle network attacks. <i>IPCCC '12 : IEEE 31st International Performance Computing and Communications Conference<\/i>, Dec 2012, Austin, United States. pp.171-180, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PCCC.2012.6407750\">&#x27E8;10.1109\/PCCC.2012.6407750&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00813393v1\">&#x27E8;hal-00813393&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00813393v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marc Lacoste, Aurelien Wailly, Herv\u00e9 Debar. Self-defending clouds : myth and realities. <i>C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous<\/i>, Nov 2012, Rennes, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01464909v1\">&#x27E8;hal-01464909&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01464909v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Levillain, Arnaud \u00c9balard, Benjamin Morin, Herv\u00e9 Debar. One Year of Internet SSL measurement. <i>ACSAC - Annual Computer Security Applications Conference<\/i>, Dec 2012, Orlando, United States. pp.11-20. <a target=\"_blank\" href=\"https:\/\/hal.sorbonne-universite.fr\/hal-00770473v1\">&#x27E8;hal-00770473&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.sorbonne-universite.fr\/hal-00770473v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Levillain, Arnaud Ebalard, Benjamin Morin, Herv\u00e9 Debar. One year of SSL internet measurement. <i>ACSAC '12 : 28th Annual Computer Security Applications Conference<\/i>, Dec 2012, Orlando, United States. pp.11-20. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00768258v1\">&#x27E8;hal-00768258&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00768258v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Roland Rieke, Elsa Prieto, Rodrigo Diaz, Herv\u00e9 Debar, Andrew Hutchison. Challenges for advanced security monitoring : the MASSIF project. <i>TrustBus '12 : 9th International Conference on Trust, Privacy and Security in Digital Business<\/i>, Sep 2012, Vienne, Austria. pp.222-223, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-32287-7_23\">&#x27E8;10.1007\/978-3-642-32287-7_23&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00747573v1\">&#x27E8;hal-00747573&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00747573v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aurelien Wailly, Marc Lacoste, Herv\u00e9 Debar. KungFuVisor : enabling hypervisor self-defense. <i>EuroDW '12 : The 6th EuroSys Doctoral Workshop<\/i>, Apr 2012, Bern, Switzerland. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738069v1\">&#x27E8;hal-00738069&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738069v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aurelien Wailly, Marc Lacoste, Herv\u00e9 Debar. VESPA : multi-layered self-protection for cloud resources. <i>ICAC '12 : The 9th ACM International Conference on Autonomic Computing<\/i>, Sep 2012, San Jos\u00e9, United States. pp.155-160, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2371536.2371564\">&#x27E8;10.1145\/2371536.2371564&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738174v1\">&#x27E8;hal-00738174&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738174v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Herv\u00e9 Debar. An ontology-based model for SIEM environments. <i>ICGS3 '11 : 7th International Conference in Global Security, Safety and Sustainability<\/i>, Aug 2011, Thessalonik, Greece. pp.148-155, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33448-1_21\">&#x27E8;10.1007\/978-3-642-33448-1_21&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00728521v1\">&#x27E8;hal-00728521&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00728521v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Herv\u00e9 Debar. Botnets : lifecycle and taxonomy. <i>SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security<\/i>, May 2011, La Rochelle, France. pp.1 - 8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SAR-SSI.2011.5931395\">&#x27E8;10.1109\/SAR-SSI.2011.5931395&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01301872v1\">&#x27E8;hal-01301872&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01301872v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aurelien Wailly, Marc Lacoste, Herv\u00e9 Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. <i>CSC 2011 : Workshop on Cryptography and Security in Clouds <\/i>, Mar 2011, Zurich, Switzerland. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01300936v1\">&#x27E8;hal-01300936&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01300936v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aurelien Wailly, Marc Lacoste, Herv\u00e9 Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. <i>SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security<\/i>, May 2011, La Rochelle, France. pp.1 - 9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SAR-SSI.2011.5931358\">&#x27E8;10.1109\/SAR-SSI.2011.5931358&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01300934v1\">&#x27E8;hal-01300934&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01300934v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yannick Carlinet, Ludovic M\u00e9, Herv\u00e9 Debar, Yvon Gourhant. Caching P2P traffic: what are the benefits for an ISP?. <i>9th International Conference on Networks - ICN 2010<\/i>, Apr 2010, Menuires, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00534574v1\">&#x27E8;hal-00534574&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00534574v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yannick Carlinet, Ludovic M\u00e9, Yvon Gourhant, Herv\u00e9 Debar. Evaluation of P4P based on real traffic measurement. <i>5th International Conference on Internet Monitoring and Protection<\/i>, May 2010, Barcelona, Spain. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00534571v1\">&#x27E8;hal-00534571&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00534571v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, Nizar Kheir, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens. Service dependencies in information systems security. <i>MMM-ACNS 2010 : 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security<\/i>, Sep 2010, Saint Petersburg, Russia. pp.1 - 20, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-14706-7_1\">&#x27E8;10.1007\/978-3-642-14706-7_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164740v1\">&#x27E8;hal-01164740&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164740v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gr\u00e9goire Jacob, Eric Filiol, Herv\u00e9 Debar. Formalization of viruses and malware through process algebras. <i>WAIS 2010 : 4th International Workshop on Advances in Information Security<\/i>, Feb 2010, Krakow, Poland. pp.597 - 602, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2010.59\">&#x27E8;10.1109\/ARES.2010.59&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355337v1\">&#x27E8;hal-01355337&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355337v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Herv\u00e9 Debar. Ex-SDF: an extended service dependency framework for intrusion impact assessment. <i>25th IFIP TC 11 International Information Security Conference (SEC) \/ Held as Part of World Computer Congress (WCC)<\/i>, Sep 2010, Brisbane, Australia. pp.148-160, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-15257-3_14\">&#x27E8;10.1007\/978-3-642-15257-3_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00565624v1\">&#x27E8;hal-00565624&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00565624v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Herv\u00e9 Debar. A service dependency model for cost-sensitive intrusion response. <i>ESORICS 2010 : 15th European Symposium on Research in Computer Security<\/i>, Sep 2010, Ath\u00e8nes, Greece. pp.626 - 642, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-15497-3_38\">&#x27E8;10.1007\/978-3-642-15497-3_38&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01164601v1\">&#x27E8;hal-01164601&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01164601v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. <i>MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management<\/i>, Sep 2010, Santander, Spain. pp.298 - 313, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-21444-8_26\">&#x27E8;10.1007\/978-3-642-21444-8_26&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306886v1\">&#x27E8;hal-01306886&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01306886\/file\/CloNeSecChallenge.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01306886\/file\/CloNeSecChallenge.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01306886\/file\/CloNeSecChallenge.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01306886v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nizar Kheir, Herv\u00e9 Debar, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka. A service dependency modeling framework for policy-based response enforcement. <i>DIMVA 09 : 6th international conference on Detection of Intrusions, Malware and Vulnerability Assessment<\/i>, Jul 2009, Como, Italy. pp.176-195. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00433302v2\">&#x27E8;hal-00433302v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00433302\/file\/DIMVA09_-_Final_copy.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00433302\/file\/DIMVA09_-_Final_copy.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00433302\/file\/DIMVA09_-_Final_copy.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00433302v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yannick Carlinet, Ludovic M\u00e9, Herv\u00e9 Debar, Yvon Gourhant. Analysis of Computer Virus Infection Risk Factors based on Customer Network Usage. <i>2nd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)<\/i>, Aug 2008, Cap Est\u00e9rel, France. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00353009v1\">&#x27E8;hal-00353009&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00353009v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Y. Thomas, Benjamin Morin, Herv\u00e9 Debar. Improving security management through passive network observation. <i>First International Conference on Availability, Reliability and Security (ARES)<\/i>, 2006, France. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00269297v1\">&#x27E8;hal-00269297&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00269297v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jouni Viinikka, Herv\u00e9 Debar, Ludovic M\u00e9, Renaud Seguier. Time series modeling for IDS alert management. <i>ACM Symposium on Information, Computer and Communications Security, ASIACCS<\/i>, Mar 2006, France. pp.102-113. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00143467v1\">&#x27E8;hal-00143467&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00143467v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2004<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elvis Tombini, Herv\u00e9 Debar, Ludovic M\u00e9, Mireille Ducass\u00e9. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. <i>Annual Computer Security Applications Conference 2004<\/i>, Sep 2004, Beijing, China. 10 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00356403v1\">&#x27E8;hal-00356403&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00356403v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eva Poptcheva, Bram Vanderborght, Miguel Colom, R\u016bta Binkyt\u0117, Oana Balalau, et al.. Alvolution - al and digital technologies in the European Union. 2024. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04645463v1\">&#x27E8;hal-04645463&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04645463\/file\/AIvolution%20Conclusions%20%284%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04645463\/file\/AIvolution%20Conclusions%20%284%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04645463\/file\/AIvolution%20Conclusions%20%284%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04645463v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Matthews Jose, R\u00e9mi Badonnel, Thibault Cholez, Herv\u00e9 Debar, Olivier Levillain, et al.. REWIRE -Cybersecurity skills alliance: a new vision for Europe. <i>RESSI 2023 : Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165397v1\">&#x27E8;hal-04165397&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165397\/file\/REWIRE_RESSI_application.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165397v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Ouvrages<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Shujun Li, Radha Poovendran, Herv\u00e9 Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-90019-9\">&#x27E8;10.1007\/978-3-030-90019-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628450v1\">&#x27E8;hal-03628450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Joaquin Garcia\u2010alfaro, Shujun Li, Radha Poovendran, Herv\u00e9 Debar, Moti Yung (Dir.). Security and privacy in communication networks. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-90022-9\">&#x27E8;10.1007\/978-3-030-90022-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03628451v1\">&#x27E8;hal-03628451&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03628451v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Poster de conf\u00e9rence<\/p>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elkin Aguas, Anthony Lambert, Herv\u00e9 Debar, Gregory Blanc. Towards network resiliency with AI driven automated load sharing in content delivery environments. <i>RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, Dec 2020, En Ligne, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04165399v1\">&#x27E8;hal-04165399&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04165399\/file\/aguas_ressi2020_Towards_Network_Resiliency_with_AI_Driven_Automated_Load_Sharing_in_Content_Delivery_Environments.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04165399v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aurelien Wailly, Marc Lacoste, Herv\u00e9 Debar. RetroVisor : nested virtualization for multi IaaS VM availability. <i>ComPAS 2013 : Conf\u00e9rence en Parall\u00e9lisme, Architecture et Syst\u00e8me<\/i>, Jan 2013, Grenoble, France. 2013. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01287046v1\">&#x27E8;hal-01287046&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01287046v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Dey, Benjamin Cost\u00e9, \u00c9ric Totel, Adrien B\u00e9cue, Elkin Aguas, et al.. Actes de la conf\u00e9rence CAID 2021 (Conference on Artificial Intelligence for Defense). <i>CAID 2021 (Conference on Artificial Intelligence for Defense)<\/i>, pp.1-152, 2021. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03535661v1\">&#x27E8;hal-03535661&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03535661v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herv\u00e9 Debar, Ludovic M\u00e9, Jean Leneutre, Vincent Nicomette, J\u00e9r\u00f4me Fran\u00e7ois, et al.. SuperviZ - Supervision et orchestration de la s\u00e9curit\u00e9 - Rapport d\u2019avancement \u00e0 mi-projet. L02, L03, L04, L05, L06, L07, T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com); Inria. 2025, pp.1-58. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05444442v1\">&#x27E8;hal-05444442&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05444442\/file\/L02-07_Superviz_progress_report_VF.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05444442v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4480,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3558","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3558"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3558\/revisions"}],"predecessor-version":[{"id":3559,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3558\/revisions\/3559"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4480"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}