M2D2: A formal data model for IDS alert correlation B Morin, L Mé, H Debar, M Ducassé International Workshop on Recent Advances in Intrusion Detection, 115-137, 2002 | 353 | 2002 |
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. P Albers, O Camp, JM Percher, B Jouga, L Me, RS Puttini Wireless Information Systems, 1-12, 2002 | 304 | 2002 |
Code obfuscation techniques for metamorphic viruses JM Borello, L Mé Journal in Computer Virology 4 (3), 211-220, 2008 | 189 | 2008 |
A serial combination of anomaly and misuse IDSes applied to HTTP traffic E Tombini, H Debar, L Mé, M Ducassé 20th annual computer security applications conference, 428-437, 2004 | 162 | 2004 |
Gassata, a genetic algorithm as an alternative tool for security audit trails analysis M Ludovic Proceedings of the First International Workshop on the Recent Advances in …, 1998 | 156 | 1998 |
Adele: an attack description language for knowledge-based intrusion detection C Michel, L Mé IFIP International Information Security Conference, 353-368, 2001 | 131 | 2001 |
A logic-based model to support alert correlation in intrusion detection B Morin, L Mé, H Debar, M Ducassé Information Fusion 10 (4), 285-299, 2009 | 124 | 2009 |
Time series modeling for IDS alert management J Viinikka, H Debar, L Mé, R Séguier Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 97 | 2006 |
A fully distributed IDS for MANET R Puttini, JM Percher, L Mé, R de Sousa Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004 | 95 | 2004 |
Processing intrusion detection alert aggregates with time series modeling J Viinikka, H Debar, L Me, A Lehikoinen, M Tarvainen Information Fusion 10 (4), 312-324, 2009 | 91 | 2009 |
COTS diversity based intrusion detection and application to web servers E Totel, F Majorczyk, L Me International Workshop on Recent Advances in Intrusion Detection, 43-62, 2005 | 82 | 2005 |
A Bayesian Classification Model for Real‐Time Intrusion Detection RS Puttini, Z Marrakchi, L Mé AIP Conference Proceedings 659 (1), 150-162, 2003 | 76 | 2003 |
A modular architecture for distributed IDS in MANET RS Puttini, JM Percher, L Mé, O Camp, R De Sousa, CJB Abbas, ... International Conference on Computational Science and Its Applications, 91-113, 2003 | 53 | 2003 |
Autonomic trust reasoning enables misbehavior detection in OLSR A Adnane, RT de Sousa Jr, C Bidan, L Mé Proceedings of the 2008 ACM symposium on Applied computing, 2006-2013, 2008 | 52 | 2008 |
A language driven intrusion detection system for event and alert correlation E Totel, B Vivinis, L Mé IFIP International Information Security Conference, 209-224, 2004 | 51 | 2004 |
An improved reference flow control model for policy-based intrusion detection J Zimmermann, L Mé, C Bidan European Symposium on Research in Computer Security, 291-308, 2003 | 48 | 2003 |
Intrusion detection: A bibliography L Mé, C Michel Supélec, Rennes, France, Tech. Rep. SSIR-2001-01, 2001 | 40 | 2001 |
Analysis of computer infection risk factors based on customer network usage Y Carlinet, L Mé, H Debar, Y Gourhant 2008 Second International Conference on Emerging Security Information …, 2008 | 37 | 2008 |
An efficient distributed PKI for structured P2P networks F Lesueur, L Mé, VVT Tong 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009 | 33 | 2009 |
Policy-based intrusion detection in web applications by monitoring java information flows G Hiet, VVT Tong, L Me, B Morin 2008 Third International Conference on Risks and Security of Internet and …, 2008 | 32 | 2008 |