Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CORGI: combination, organization and reconstruction through graphical interactions., , , and . VizSEC, page 57-64. ACM, (2014)Imbalanced classification with tpg genetic programming: impact of problem imbalance and selection mechanisms., , , , , and . GECCO Companion, page 608-611. ACM, (2022)Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type « Fast Paxos »., , , and . Technique et Science Informatiques, 31 (8-10): 1301-1325 (2012)Cross-domain alert correlation methodology for industrial control systems., , , , and . Comput. Secur., (2022)Enhancing Collaboration Between Security Analysts in Security Operations Centers., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 136-142. Springer, (2018)COTS Diversity Based Intrusion Detection and Application to Web Servers., , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 43-62. Springer, (2005)VEGAS: Visualizing, exploring and grouping alerts., , , and . NOMS, page 1097-1100. IEEE, (2016)SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs., , , , , and . J. Signal Process. Syst., 94 (7): 753-770 (2022)ELVIS: Extensible Log VISualization., , , and . VizSEC, page 9-16. ACM, (2013)Détection d'intrusions comportementale par diversification de COTS : application au cas des serveurs web.. University of Rennes 1, France, (2008)