Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Détection des intrusions dans les systèmes d'information : la nécessaire prise en compte des caractéristiques du système surveillé.. (2003)Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 238-258. Springer, (2020)A Modular Architecture for Distributed IDS in MANET., , , , , , and . ICCSA (3), volume 2669 of Lecture Notes in Computer Science, page 91-113. Springer, (2003)Security Audit Trail Analysis Using Genetic Algorithms.. SAFECOMP, page 329-340. Springer, (1993)Le commerce électronique: Un état de I'art., and . Ann. des Télécommunications, 53 (9-10): 361-376 (1998)Integrating trust reasonings into node behavior in olsr., , , and . Q2SWinet, page 152-155. ACM, (2007)Model for Trust within Information Technology Management., , , and . ICEIS (2), page 513-518. (2008)Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes., , , , , and . CRiSIS, volume 13857 of Lecture Notes in Computer Science, page 18-33. Springer, (2022)Policy-based intrusion detection in Web applications by monitoring Java information flows., , , and . CRiSIS, page 53-60. IEEE, (2008)Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems., , , , , and . RAID, page 135-150. ACM, (2023)