{"id":3575,"date":"2022-04-14T15:28:44","date_gmt":"2022-04-14T13:28:44","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/eric-totel\/"},"modified":"2022-04-14T15:28:44","modified_gmt":"2022-04-14T13:28:44","slug":"eric-totel","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/eric-totel\/","title":{"rendered":"Eric TOTEL"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/totel-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Pr. Eric <span class=\"MonLabo-lastname\">TOTEL<\/span><\/h1><div class=\"coordonnees\"><em>Professeur<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">eric.totel[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Shurok Khozam, Gregory Blanc, S\u00e9bastien Tixeuil, Eric Totel. QoSentry: a reinforcement learning framework for QoS-preserving DDoS mitigation in software-defined networks. <i>Journal of Network and Systems Management<\/i>, 2025, 33 (4), pp.97. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10922-025-09971-8\">&#x27E8;10.1007\/s10922-025-09971-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05244654v1\">&#x27E8;hal-05244654&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05244654\/file\/QoSentry%3A%20A%20Reinforcement%20Learning%20Framework%20for%20QoS%20Preserving%20DDoS%20Mitigation%20in%20Software-Defined%20Networks.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05244654v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erwan Godefroy, Eric Totel, Michel Hurfin, Fr\u00e9d\u00e9ric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios. <i>Journal of Information Assurance and Security<\/i>, 2015, 10 (3), pp.11. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01241807v1\">&#x27E8;hal-01241807&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01241807v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romaric Ludinard, Eric Totel, Fr\u00e9d\u00e9ric Tronel, Vincent Nicomette, Mohamed Ka\u00e2niche, et al.. An Invariant-based Approach for Detecting Attacks against Data in Web Applications. <i>International journal of secure software engineering<\/i>, 2014, 5 (1), pp.19-38. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4018\/ijsse.2014010102\">&#x27E8;10.4018\/ijsse.2014010102&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01083296v1\">&#x27E8;hal-01083296&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01083296\/file\/IJSSE_APA4_def.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01083296\/file\/IJSSE_APA4_def.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01083296\/file\/IJSSE_APA4_def.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01083296v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thomas Demongeot, Eric Totel, Val\u00e9rie Viet Triem Tong, Yves Le Traon. User Data Confidentiality in an Orchestration of Web Services. <i>Journal of Information Assurance and Security<\/i>, 2012, 7 (1), pp.32-40. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00735996v1\">&#x27E8;hal-00735996&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00735996v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Viet-Huy Ha, Vincent Gauthier, Eric Totel. Generating causal logs to explain attacks. <i>20th International Conference on Risks and Security of Internet and Systems (CRISIS)<\/i>, Oct 2025, Gatineau, Canada. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05494614v1\">&#x27E8;hal-05494614&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05494614\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05494614\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05494614\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05494614v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Viet Huy Ha, Vincent Gauthier, Eric Totel. Explaining attacks using causal logs. <i>Rendez-vous de la Recherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RESSI 2025)<\/i>, May 2025, Lannion, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05158092v1\">&#x27E8;hal-05158092&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05158092\/file\/conference_101719.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05158092\/file\/conference_101719.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05158092\/file\/conference_101719.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05158092v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Shurok Khozam, Gregory Blanc, Sebastien Tixeuil, Eric Totel. DAMS: double deep Q-network approach for DDoS attack mitigation in SDN. <i>The 8th International Conference on Future Networks & Distributed Systems (ICFNDS '24)<\/i>, Dec 2024, Marrakesh, Morocco. pp.1049-1056, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3726122.3726282\">&#x27E8;10.1145\/3726122.3726282&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05141570v1\">&#x27E8;hal-05141570&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05141570\/file\/3726122.3726282.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05141570v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs. <i>18th International Conference on Risks and Security of Internet and Systems ( CRiSIS)<\/i>, Dec 2023, Rabat (MOROCCO), Morocco. pp.185-199, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-61231-2_12\">&#x27E8;10.1007\/978-3-031-61231-2_12&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04609669v1\">&#x27E8;hal-04609669&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04609669\/file\/crisis-2023--content.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04609669\/file\/crisis-2023--content.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04609669\/file\/crisis-2023--content.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04609669v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maxime Lanvin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, Ludovic M\u00e9, et al.. Towards understanding alerts raised by unsupervised network intrusion detection systems. <i>The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID )<\/i>, Oct 2023, Hong Kong China, France. pp.135-150, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3607199.3607247\">&#x27E8;10.1145\/3607199.3607247&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04172470v1\">&#x27E8;hal-04172470&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04172470\/file\/2023-Lanvin_et_al-Towards_Understanding_Alerts_raised_by_Unsupervised_Network_Intrusion_Detection_Systems-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04172470\/file\/2023-Lanvin_et_al-Towards_Understanding_Alerts_raised_by_Unsupervised_Network_Intrusion_Detection_Systems-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04172470\/file\/2023-Lanvin_et_al-Towards_Understanding_Alerts_raised_by_Unsupervised_Network_Intrusion_Detection_Systems-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04172470v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Dey, Eric Totel, Benjamin Cost\u00e9. DAEMON: dynamic auto-encoders for contextualised anomaly detection applied to security monitoring. <i>37th IFIP TC 11 International Conference, SEC 2022,<\/i>, Jun 2022, Copenhagen, Denmark. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-06975-8_4\">&#x27E8;10.1007\/978-3-031-06975-8_4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04181626v1\">&#x27E8;hal-04181626&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04181626\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04181626\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04181626\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04181626v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maxime Lanvin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, Ludovic M\u00e9, et al.. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. <i>17th International Conference on Risks and Security of Internet and Systems (CRiSIS)<\/i>, Dec 2022, Sousse, Tunisia. pp.18-33, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-31108-6_2\">&#x27E8;10.1007\/978-3-031-31108-6_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03775466v1\">&#x27E8;hal-03775466&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03775466\/file\/CRiSIS_2022_Maxime_Lanvin.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03775466\/file\/CRiSIS_2022_Maxime_Lanvin.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03775466\/file\/CRiSIS_2022_Maxime_Lanvin.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03775466v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maxime Lanvin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, Ludovic M\u00e9, et al.. Detecting APT through graph anomaly detection. <i>RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, May 2022, Chambon-sur-Lac, France. pp.1-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03675346v1\">&#x27E8;hal-03675346&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03675346\/file\/tmpz65x_ciq_RESSI_2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03675346\/file\/tmpz65x_ciq_RESSI_2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03675346\/file\/tmpz65x_ciq_RESSI_2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03675346v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Dey, Benjamin Cost\u00e9, \u00c9ric Totel, Adrien B\u00e9cue. Simulation r\u00e9aliste d'utilisateurs pour les syst\u00e8mes d'information en Cyber Range. <i>CAID 2021 : applications de l\u2019Intelligence Artificielle aux probl\u00e9matiques d\u00e9fense<\/i>, Nov 2021, Rennes, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03437031v1\">&#x27E8;hal-03437031&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03437031\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03437031\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03437031\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03437031v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic M\u00e9. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. <i>WTMC 2020: 5th International Workshop on Traffic Measurements for Cybersecurity and EuroS&PW 2020: IEEE European Symposium on Security and Privacy Workshops<\/i>, Sep 2020, Genova, Italy. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSPW51379.2020.00083\">&#x27E8;10.1109\/EuroSPW51379.2020.00083&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-02950490v1\">&#x27E8;hal-02950490&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-02950490\/file\/WTMC2020.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02950490\/file\/WTMC2020.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02950490\/file\/WTMC2020.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02950490v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic M\u00e9. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. <i>DIMVA 2020: 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment<\/i>, Jun 2020, Lisbon, Portugal. pp.238-258, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-52683-2_12\">&#x27E8;10.1007\/978-3-030-52683-2_12&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-02950489v1\">&#x27E8;hal-02950489&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-02950489\/file\/dimva2020.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02950489\/file\/dimva2020.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02950489\/file\/dimva2020.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02950489v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic M\u00e9. Novelty detection on graph structured data to detect network intrusions. <i>CAID 2020 - Conference on Artificial Intelligence for Defense<\/i>, Dec 2020, Virtual, France. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-03115308v1\">&#x27E8;hal-03115308&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-03115308\/file\/CAID2020.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03115308\/file\/CAID2020.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03115308\/file\/CAID2020.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03115308v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Lanoe, Michel Hurfin, Eric Totel, Carlos Maziero. An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. <i>SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection<\/i>, Jun 2019, Lisbonne, Portugal. pp.49-63, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-22312-0_4\">&#x27E8;10.1007\/978-3-030-22312-0_4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-02409487v1\">&#x27E8;hal-02409487&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-02409487\/file\/IFIPSEC-Hal-Inria.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02409487\/file\/IFIPSEC-Hal-Inria.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02409487\/file\/IFIPSEC-Hal-Inria.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02409487v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Charles Xosanavongsa, Eric Totel, Olivier Bettan. Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events. <i>EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy<\/i>, Jun 2019, Stockholm, Sweden. pp.340-355, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP.2019.00033\">&#x27E8;10.1109\/EuroSP.2019.00033&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/imt-atlantique.hal.science\/hal-02363431v1\">&#x27E8;hal-02363431&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/imt-atlantique.hal.science\/hal-02363431\/file\/EuroS%26P%202019.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/imt-atlantique.hal.science\/hal-02363431\/file\/EuroS%26P%202019.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/imt-atlantique.hal.science\/hal-02363431\/file\/EuroS%26P%202019.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/imt-atlantique.hal.science\/hal-02363431v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Lanoe, Michel Hurfin, Eric Totel. A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems. <i>SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems<\/i>, Oct 2018, Salvador, Brazil. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/srds.2018.00014\">&#x27E8;10.1109\/srds.2018.00014&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01949183v1\">&#x27E8;hal-01949183&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01949183\/file\/Hal-SRDS-2018.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01949183\/file\/Hal-SRDS-2018.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01949183\/file\/Hal-SRDS-2018.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01949183v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mounir Assaf, David A Naumann, Julien Signoles, Eric Totel, Fr\u00e9d\u00e9ric Tronel. Hypercollecting Semantics and its Application to Static Analysis of Information Flow. <i>POPL 2017 - ACM Symposium on Principles of Programming Languages<\/i>, Jan 2017, Paris, France. pp.874-887, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3009837.3009889\">&#x27E8;10.1145\/3009837.3009889&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01618360v1\">&#x27E8;hal-01618360&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01618360\/file\/2017_popl.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01618360\/file\/2017_popl.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01618360\/file\/2017_popl.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01618360v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic M\u00e9. STARLORD: Linked Security Data Exploration in a 3D Graph. <i>VizSec - IEEE Symposium on Visualization for Cyber Security<\/i>, Oct 2017, Phoenix, United States. pp.1 - 4, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/VIZSEC.2017.8062203\">&#x27E8;10.1109\/VIZSEC.2017.8062203&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01619234v1\">&#x27E8;hal-01619234&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01619234\/file\/17072017_vizsec.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01619234\/file\/17072017_vizsec.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01619234\/file\/17072017_vizsec.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01619234v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, et al.. Connectivity Extraction in Cloud Infrastructures. <i>2017 13th International Conference on Network and Service Management (CNSM)<\/i>, Nov 2017, Tokyo, Japan. pp.1-5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.23919\/cnsm.2017.8256010\">&#x27E8;10.23919\/cnsm.2017.8256010&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01593346v1\">&#x27E8;hal-01593346&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01593346\/file\/CNSM_2017.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01593346\/file\/CNSM_2017.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01593346\/file\/CNSM_2017.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01593346v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, et al.. Connectivity Graph Reconstruction for Networking Cloud Infrastructures. <i>2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)<\/i>, Oct 2017, Cambridge, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/nca.2017.8171337\">&#x27E8;10.1109\/nca.2017.8171337&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01612988v1\">&#x27E8;hal-01612988&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01612988\/file\/NCA%202017.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01612988\/file\/NCA%202017.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01612988\/file\/NCA%202017.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01612988v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mounir Assaf, Julien Signoles, Eric Totel, Fr\u00e9d\u00e9ric Tronel. The Cardinal Abstraction for Quantitative Information Flow. <i>Workshop on Foundations of Computer Security 2016 (FCS 2016)<\/i>, Jun 2016, Lisbon, Portugal. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01334604v1\">&#x27E8;hal-01334604&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01334604\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01334604\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01334604\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01334604v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eric Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock. <i> SEC2 2016 - Deuxi\u00e8me atelier sur la S\u00e9curit\u00e9 dans les Clouds<\/i>, Jul 2016, Lorient, France. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01334608v1\">&#x27E8;hal-01334608&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01334608v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eric Totel, Mouna Hkimi, Michel Hurfin, Mourad Leslous, Yvan Labiche. Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection. <i>12th European Dependable Computing Conference<\/i>, Sep 2016, Gothenburg, Sweden. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/edcc.2016.13\">&#x27E8;10.1109\/edcc.2016.13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01334596v1\">&#x27E8;hal-01334596&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01334596v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erwan Godefroy, Eric Totel, Michel Hurfin, Fr\u00e9d\u00e9ric Majorczyk. Assessment of an Automatic Correlation Rules Generator. <i>11th International Conference on Information Systems Security (ICISS 2015)<\/i>, Dec 2015, Kolkata, India. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-26961-0_13\">&#x27E8;10.1007\/978-3-319-26961-0_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01241810v1\">&#x27E8;hal-01241810&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01241810v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">E Godefroy, E Totel, M Hurfin, F Majorczyk, A Maaroufi. Automatiser la construction de r\u00e8gles de corr\u00e9lation : pr\u00e9requis et processus. <i>C&ESAR 2014 - D\u00e9tection et r\u00e9action face aux attaques informatiques<\/i>, Nov 2014, Rennes, France. pp.9. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01091327v1\">&#x27E8;hal-01091327&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01091327\/file\/cesar.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01091327\/file\/cesar.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01091327\/file\/cesar.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01091327v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erwan Godefroy, Eric Totel, Fr\u00e9d\u00e9ric Majorczyk, Michel Hurfin. G\u00e9n\u00e9ration automatique de r\u00e8gles de corr\u00e9lation pour la d\u00e9tection d'attaques complexes. <i>9eme conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et des Syst\u00e8mes d'Information (SAR-SSI)<\/i>, May 2014, Lyon, France. pp.10. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01083699v1\">&#x27E8;hal-01083699&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01083699\/file\/sarssi2014.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01083699\/file\/sarssi2014.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01083699\/file\/sarssi2014.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01083699v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erwan Godefroy, Eric Totel, Michel Hurfin, Fr\u00e9d\u00e9ric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios. <i>2014 International Conference on Information Assurance and Security (IAS 2014)<\/i>, Nov 2014, Okinawa, Japan. pp.6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISIAS.2014.7064615\">&#x27E8;10.1109\/ISIAS.2014.7064615&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01091385v1\">&#x27E8;hal-01091385&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01091385\/file\/IAS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01091385\/file\/IAS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01091385\/file\/IAS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01091385v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mounir Assaf, Julien Signoles, Fr\u00e9d\u00e9ric Tronel, Eric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs. <i>SARSSI - 8\u00e8me Conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et des Syst\u00e8mes d'Information<\/i>, Sep 2013, Mont de Marsan, France. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00909293v1\">&#x27E8;hal-00909293&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-00909293\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00909293\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00909293\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00909293v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mounir Assaf, Julien Signoles, Fr\u00e9d\u00e9ric Tronel, Eric Totel. Program Transformation for Non-interference Verification on Programs with Pointers. <i>28th Security and Privacy Protection in Information Processing Systems (SEC)<\/i>, Jul 2013, Auckland, New Zealand. pp.231-244, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-39218-4_18\">&#x27E8;10.1007\/978-3-642-39218-4_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00814671v2\">&#x27E8;hal-00814671v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-00814671\/file\/978-3-642-39218-4_18_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00814671\/file\/978-3-642-39218-4_18_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00814671\/file\/978-3-642-39218-4_18_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00814671v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thomas Demongeot, Eric Totel, Val\u00e9rie Viet Triem Tong. User Defined Control Flow Policy for Web Service Orchestration. <i>C&ESAR 2012<\/i>, Nov 2012, Rennes, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00761354v1\">&#x27E8;hal-00761354&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00761354v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romaric Ludinard, Eric Totel, Fr\u00e9d\u00e9ric Tronel, Vincent Nicomette, Mohamed Ka\u00e2niche, et al.. Detecting Attacks Against Data in Web Applications. <i>CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems<\/i>, Oct 2012, Cork, Ireland. pp.1-8. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00735997v1\">&#x27E8;hal-00735997&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00735997v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Emmanuelle Anceaume, Christophe Bidan, S\u00e9bastien Gambs, Guillaume Hiet, Michel Hurfin, et al.. From SSIR to CIDre: a New Security Research Group in Rennes. <i>1st SysSec Workshop<\/i>, Jul 2011, Amsterdam, Netherlands. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00656940v1\">&#x27E8;hal-00656940&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00656940v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jonathan-Christofer Demay, Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Fr\u00e9d\u00e9ric Tronel. Detecting illegal system calls using a data-oriented detection model. <i>26th International Information Security Conference (SEC)<\/i>, Jun 2011, Lucerne, Switzerland. pp.305-316, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-21424-0_25\">&#x27E8;10.1007\/978-3-642-21424-0_25&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00657971v1\">&#x27E8;hal-00657971&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00657971\/file\/ifipsec2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/centralesupelec.hal.science\/hal-00657971\/file\/ifipsec2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/centralesupelec.hal.science\/hal-00657971\/file\/ifipsec2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/centralesupelec.hal.science\/hal-00657971v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thomas Demongeot, Eric Totel, Val\u00e9rie Viet Triem Tong, Yves Le Traon. Preventing data leakage in service orchestration. <i>IAS 2011<\/i>, Dec 2011, Malacca, Malaysia. 6 p., <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISIAS.2011.6122806\">&#x27E8;10.1109\/ISIAS.2011.6122806&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00657796v1\">&#x27E8;hal-00657796&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00657796\/file\/ias2011-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/centralesupelec.hal.science\/hal-00657796\/file\/ias2011-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/centralesupelec.hal.science\/hal-00657796\/file\/ias2011-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/centralesupelec.hal.science\/hal-00657796v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Romaric Ludinard, Loic Le Hennaff, Eric Totel. RRABIDS, un syst\u00e8me de d\u00e9tection d'intrusion pour les applications Ruby on Rails. <i>SSTIC 2011<\/i>, Jun 2011, Rennes, France. 11 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00657814v1\">&#x27E8;hal-00657814&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00657814\/file\/sstic.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/centralesupelec.hal.science\/hal-00657814\/file\/sstic.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/centralesupelec.hal.science\/hal-00657814\/file\/sstic.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/centralesupelec.hal.science\/hal-00657814v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jonathan-Christofer Demay, Eric Totel, Fr\u00e9d\u00e9ric Tronel. Generation et evaluation de mecanismes de detection d'intrusion au niveau applicatif. <i>SARSSI 2010<\/i>, May 2010, Menton, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00536661v1\">&#x27E8;hal-00536661&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00536661v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thomas Demongeot, Eric Totel, Val\u00e9rie Viet Triem Tong, Yves Le Traon. Protection des donn\u00e9es utilisateurs dans une orchestration de Web-Services. <i>SARSSI 2010<\/i>, May 2010, Menton, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00536660v1\">&#x27E8;hal-00536660&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00536660v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jonathan-Christofer Demay, Eric Totel, Fr\u00e9d\u00e9ric Tronel. SIDAN: a tool dedicated to Software Instrumentation for Detecting Attacks on Non-control-data. <i>4th International Conference on Risks and Security of Internet and Systems (CRISIS'2009)<\/i>, Oct 2009, Toulouse, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00424574v1\">&#x27E8;hal-00424574&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00424574v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Sarrouy, Eric Totel, Bernard Jouga. Building an application data behavior model for intrusion detection. <i>23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security<\/i>, Jul 2009, Montreal, Canada. pp. 299-306. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00441423v1\">&#x27E8;hal-00441423&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00441423v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Sarrouy, Eric Totel, Bernard Jouga. Un mod\u00e8le de comportement fond\u00e9 sur les donn\u00e9es pour la d\u00e9tection d'intrusion dans les applications. <i>4\u00e8me Conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et des Syst\u00e8mes d'Information (SAR-SSI 2009)<\/i>, Jun 2009, Luchon, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00424582v1\">&#x27E8;hal-00424582&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00424582v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Sarrouy, Eric Totel, Bernard Jouga. Application data consistency checking for anomaly based intrusion detection. <i>The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009)<\/i>, Nov 2009, Lyon, France. pp.NC. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00424584v1\">&#x27E8;hal-00424584&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00424584v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Ludovic M\u00e9, Ayda Saidane. Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. <i>IFIP SEC 2008<\/i>, Sep 2008, Milan, Italy. 15 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00353005v1\">&#x27E8;hal-00353005&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00353005v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Ludovic M\u00e9. Experiments on COTS Diversity as an Intrusion Detection and Tolerance Mechanism. <i>Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS)<\/i>, Mar 2007, Lisbon, Portugal. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00268683v1\">&#x27E8;hal-00268683&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00268683v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Ludovic M\u00e9, Ayda Saidane. D\u00e9tection d'intrusions et diagnostic d'anomalies dans un syst\u00e8me diversifi\u00e9 par comparaison de graphes de flux d'informations. <i>Sixth Conference on Security and Network Architectures (SARSSI)<\/i>, Jun 2007, France. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00268620v1\">&#x27E8;hal-00268620&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00268620v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Michel Hurfin, Jean-Pierre Le Narzul, Fr\u00e9d\u00e9ric Majorczyk, Ludovic M\u00e9, Ayda Saidane, et al.. A dependable intrusion detection architecture based on agreement services. <i>Eighth International Symposium on Stabilization, Safety, and Security of Distributes Systems<\/i>, Nov 2006, France. 17 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00269302v1\">&#x27E8;hal-00269302&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00269302v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2005<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Ludovic M\u00e9. COTS diversity based intrusion detection and application to web servers. <i>8th international Symposium on the Recent Advances in Intrusion Detection<\/i>, Sep 2005, Seattle, United States. 18 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00356396v1\">&#x27E8;hal-00356396&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00356396v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fr\u00e9d\u00e9ric Majorczyk, Eric Totel, Ludovic M\u00e9. D\u00e9tection d'intrusions par diversification de COTS. <i>4\u00e8me conf\u00e9rence \"Security and Network Architectures\" (SAR)<\/i>, Jun 2005, France. 12 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00354844v1\">&#x27E8;hal-00354844&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00354844v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2004<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eric Totel, Bernard Vivinis, Ludovic M\u00e9. A Language Driven Intrusion Detection System for Events and Alerts Correlation. <i>19th IFIP International Information Security Conference<\/i>, Aug 2004, Toulouse, France. 16 p. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00356409v1\">&#x27E8;hal-00356409&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00356409v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>HDR<\/p>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eric Totel. Techniques de d\u00e9tection d'erreur appliqu\u00e9es \u00e0 la d\u00e9tection d'intrusion. Cryptographie et s\u00e9curit\u00e9 [cs.CR]. Universit\u00e9 Rennes 1, 2012. <a target=\"_blank\" href=\"https:\/\/theses.hal.science\/tel-00763746v1\">&#x27E8;tel-00763746&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/theses.hal.science\/tel-00763746\/file\/HDR_totel.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-00763746\/file\/HDR_totel.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-00763746\/file\/HDR_totel.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-00763746v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jonathan-Christofer Demay, Eric Totel, Fr\u00e9d\u00e9ric Tronel. Automatic Software Instrumentation for the Detection of Non-control-data Attacks. 2009. <a target=\"_blank\" href=\"https:\/\/centralesupelec.hal.science\/hal-00420086v1\">&#x27E8;hal-00420086&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/centralesupelec.hal.science\/hal-00420086v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Poster de conf\u00e9rence<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adam Oumar Abdel-Rahman, Olivier Levillain, Eric Totel. Recherche d'indicateurs de compromission dans des journaux DNS chiffr\u00e9s. <i>Rendez-Vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information (RESSI)<\/i>, May 2022, Chambon-sur-Lac, France. RESSI 2022: Rendez-Vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997075v1\">&#x27E8;hal-03997075&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997075\/file\/slides.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997075\/file\/slides.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997075\/file\/slides.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997075v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erwan Godefroy, Eric Totel, Michel Hurfin, Fr\u00e9d\u00e9ric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios. <i>IEEE Conference on Communications and Network Security (CNS 2015)<\/i>, Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01241813v1\">&#x27E8;hal-01241813&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01241813v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexandre Dey, Benjamin Cost\u00e9, \u00c9ric Totel, Adrien B\u00e9cue, Elkin Aguas, et al.. Actes de la conf\u00e9rence CAID 2021 (Conference on Artificial Intelligence for Defense). <i>CAID 2021 (Conference on Artificial Intelligence for Defense)<\/i>, pp.1-152, 2021. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03535661v1\">&#x27E8;hal-03535661&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03535661\/file\/Actes_CAID_2021%20%281%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03535661v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mounir Assaf, Julien Signoles, Fr\u00e9d\u00e9ric Tronel, Eric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs. [Rapport de recherche] RR-8326, INRIA. 2013, pp.25. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00841048v1\">&#x27E8;hal-00841048&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-00841048\/file\/RR8326.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00841048\/file\/RR8326.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00841048\/file\/RR8326.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00841048v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4482,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3575","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3575"}],"version-history":[{"count":0,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3575\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4482"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}