M2D2: A formal data model for IDS alert correlation B Morin, L Mé, H Debar, M Ducassé International Workshop on Recent Advances in Intrusion Detection, 115-137, 2002 | 379 | 2002 |
Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. P Albers, O Camp, JM Percher, B Jouga, L Mé, RS Puttini Wireless Information Systems, 1-12, 2002 | 327 | 2002 |
Code obfuscation techniques for metamorphic viruses JM Borello, L Mé Journal in Computer Virology 4 (3), 211-220, 2008 | 238 | 2008 |
A serial combination of anomaly and misuse IDSes applied to HTTP traffic E Tombini, H Debar, L Mé, M Ducassé 20th annual computer security applications conference, 428-437, 2004 | 180 | 2004 |
Gassata, a genetic algorithm as an alternative tool for security audit trails analysis SUP ELEC First international workshop on the recent advances in intrusion detection …, 1998 | 157 | 1998 |
Adele: An attack description language for knowledge-based intrusion detection C Michel, L Mé Trusted Information: The New Decade Challenge 16, 353-368, 2001 | 147 | 2001 |
Processing intrusion detection alert aggregates with time series modeling J Viinikka, H Debar, L Mé, A Lehikoinen, M Tarvainen Information Fusion 10 (4), 312-324, 2009 | 133 | 2009 |
A logic-based model to support alert correlation in intrusion detection B Morin, L Mé, H Debar, M Ducassé Information Fusion 10 (4), 285-299, 2009 | 133 | 2009 |
Time series modeling for IDS alert management J Viinikka, H Debar, L Mé, R Séguier Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 109 | 2006 |
A fully distributed IDS for MANET R Puttini, JM Percher, L Mé, R de Sousa Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004 | 105 | 2004 |
COTS diversity based intrusion detection and application to web servers E Totel, F Majorczyk, L Me Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 91 | 2006 |
A Bayesian Classification Model for Real‐Time Intrusion Detection RS Puttini, Z Marrakchi, L Mé AIP Conference Proceedings 659 (1), 150-162, 2003 | 80 | 2003 |
A language driven intrusion detection system for event and alert correlation E Totel, B Vivinis, L Mé Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004 | 57 | 2004 |
A modular architecture for distributed IDS in MANET RS Puttini, JM Percher, L Mé, O Camp, R De Sousa, CJ Barenco Abbas, ... Computational Science and Its Applications—ICCSA 2003: International …, 2003 | 55 | 2003 |
Autonomic trust reasoning enables misbehavior detection in OLSR A Adnane, RT de Sousa Jr, C Bidan, L Mé Proceedings of the 2008 ACM symposium on Applied computing, 2006-2013, 2008 | 54 | 2008 |
An improved reference flow control model for policy-based intrusion detection J Zimmermann, L Mé, C Bidan Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003 | 50 | 2003 |
Analysis of computer infection risk factors based on customer network usage Y Carlinet, L Mé, H Debar, Y Gourhant 2008 Second International Conference on Emerging Security Information …, 2008 | 44 | 2008 |
An efficient distributed PKI for structured P2P networks F Lesueur, L Mé, VVT Tong 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 1-10, 2009 | 43 | 2009 |
Intrusion detection: A bibliography L Mé, C Michel Supélec, Rennes, France, Tech. Rep. SSIR-2001-01, 2001 | 41 | 2001 |
Sec2graph: Network attack detection based on novelty detection on graph structured data L Leichtnam, E Totel, N Prigent, L Mé Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020 | 37 | 2020 |