A predictive framework for cyber security analytics using attack graphs, International Journal of Computer Networks & Communications, 2015. ,
A preliminary analysis of vulnerability scores for attacks in wild: The ekits and sym datasets, Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, vol.12, pp.17-24, 2012. ,
Time-dependent analysis of attacks, Principles of Security and Trust, vol.8414, pp.285-305, 2014. ,
Collaborative approach to automatic classification of heterogeneous information security, Emerging Security Information, Systems and Technologies, pp.294-299, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00383185
Modeling and detection of complex attacks, Se-cureComm Third International Conference on Security and Privacy in Communications Networks and the Workshops, pp.234-243, 2007. ,
Active event correlation in bro ids to detect multistage attacks, Fourth IEEE International Workshop on Information Assurance (IWIA'06), pp.16-50, 2006. ,
A study on advanced persistent threats, Communications and Multimedia Security, vol.8735, pp.63-72, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01404186
Lessons from stuxnet, Computer, vol.44, issue.4, pp.91-93, 2011. ,
Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study, International Workshop on Information Forensics and Security (WIFS), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01403950
Multi-stage attack modelling, Proceedings of Cyberpatterns 2013, pp.78-89, 2013. ,
Modeling of ip scanning activities with hidden markov models: Darknet case study, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01404127
How good are attack trees for modelling advanced cyber threats?, Norwegian Information Security Conference (NISK), vol.7, 2014. ,
Combating advanced persistent threats: From network event correlation to incident detection, Comput. Secur, vol.48, pp.35-57, 2015. ,
Using large scale distributed computing to unveil advanced persistent threats, SCIENCE, vol.1, issue.3, p.93, 2013. ,
Dag-based attack and defense modeling: Don't miss the forest for the attack trees, Computer science review 13-14, pp.1-38, 2014. ,
A cyber attack modeling and impact assessment framework, 2013 5th International Conference on Cyber Conflict, pp.1-24, 2013. ,
Behavioral change-based anomaly detection in computer networks using data mining, Int. J. Network Manage ,
Distributed representations of sentences and documents, Proceedings of the 31st International Conference on Machine Learning (ICML-14). pp. 1188-1196. JMLR Workshop and Conference Proceedings, 2014. ,
A dangerousness-based investigation model for security event management, Internet Monitoring and Protection, 2008. ICIMP'08. The Third International Conference on, pp.109-118, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00405369
Enriched diagnosis and investigation models for security event correlation, Internet Monitoring and Protection, pp.1-1, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00383174
Confiance et risque pour engager un ?change en milieu hostile, 2013. ,
Identification of correlated network intrusion alerts, Third International Workshop on Cyberspace Safety and Security (CSS), pp.15-20, 2011. ,
Attack scenario recognition through heterogeneous event stream analysis, IEEE Military Communications Conference (MILCOM), pp.1-7, 2009. ,
Morwilog: an ACO-based system for outlining multi-step attacks, IEEE Symposium Series on Computational Intelligence (SSCI), 2016. ,
Topological data analysis: A promising big data exploration tool in biology, analytical chemistry and physical chemistry, Analytica Chimica Acta, vol.910, pp.1-11, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01285628
, TDAmapper: Analyze High-Dimensional Data Using Discrete Morse Theory, 2015.
Software Framework for Topic Modelling with Large Corpora, Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp.45-50, 2010. ,
Mining known attack patterns from security-related events, PeerJ Computer Science, vol.1, p.25, 2015. ,
Attack trees. Dr. Dobb's, Journal, 1999. ,
Targeted cyberattacks: A superset of advanced persistent threats, IEEE Security & Privacy, vol.11, issue.1, pp.54-61, 2013. ,
Automatic multi-step attack pattern discovering, International Journal of Network Security (IJNS), vol.10, issue.2, pp.142-152, 2010. ,
Real-time attack scenario detection via intrusion detection alert correlation, 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp.95-102, 2012. ,
An empirical study on using the national vulnerability database to predict software vulnerabilities, Proceedings of the 22Nd International Conference on Database and Expert Systems Applications -Volume Part I, vol.11, pp.217-231, 2011. ,
Real-time intrusion alert correlation system based on prerequisites and consequence, 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM). pp. 1-5. IEEE, Chengdu City, 2010. ,