logo EDITE Marc DACIER
Identité
Marc DACIER
État académique
Thèse soutenue le 1994-01-01
Titulaire d'une HDR (ou équivalent)
Laboratoire: personnel permanent
Direction de thèses (depuis 2007)
0
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
http://dx.doi.org/10.1007/978-3-642-10772-6_3
The WOMBAT attack attribution method : Some results
The WOMBAT attack attribution method : Some results, Lecture Notes in Computer Science, Volume 5905/2009, ISSN : 0302-9743 16/11/2009
http://dx.doi.org/10.1007/978-1-4419-0140-8_6
Assessing cybercrime through the eyes of the WOMBAT
Assessing cybercrime through the eyes of the WOMBAT, Book chapter N 6 in "Cyber Situational Awareness : Issues and Research", Springer International Series on Advances in Information Security, Part 3, 2009. ISBN: 98-1-4419-0139-2 01/11/2009
http://dx.doi.org/10.3233/978-1-60750-060-5-191
Behavioral analysis of zombie armies
Behavioral analysis of zombie armies, Book chapter in "The Virtual Battlefield : Perspectives on Cyber Warfare", Vol. 3 of Cryptology and Information Security Series, October 2009, C. Czosseck and K. Geers ED., ISBN: 978-1-60750-060-5 31/10/2009
http://dx.doi.org/10.1145/1599272.1599277
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making, KDD'09, 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Workshop on CyberSecurity and Intelligence Informatics, June 28th-July 1st, 2009, Paris, France 28/06/2009
http://dx.doi.org/10.1109/ICDMW.2008.78
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology, ICDM'08, 8th IEEE International Conference on Data Mining series, December 15-19, 2008, Pisa, Italy 15/12/2008
http://dx.doi.org/10.1007/978-3-540-87403-4_29
Automating the analysis of honeypot data
Automating the analysis of honeypot data, Book chapter in "Recent Advances in Intrusion Detection", published as LNCS, Volume 5230/2008, ISBN:978-3-540-87402-7 18/09/2008
http://dx.doi.org/10.1016/j.diin.2008.05.012
A framework for attack patterns' discovery in honeynet data
A framework for attack patterns' discovery in honeynet data, DFRWS 2008, 8th Digital Forensics Research Conference, August 11-13, 2008, Baltimore, USA / Also published in "Digital Investigation", Volume 5, Supplement 1, September 2008 12/06/2008
http://dx.doi.org/10.1109/WISTDCS.2008.8
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet, WISTDCS'08, 1st WOMBAT Workshop, April 21st-22nd, 2008, Amsterdam, The Netherlands 21/04/2008