Calculated based on the number of publications stored in Pure and citations from PlumX
19982023

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Attacks on tomorrow's virtual world

    Benhabbour, I., Bromberg, Y. D., Dacier, M., Dietrich, S., Rodrigues, R. M. & Esteves-Verissimo, P., Aug 10 2023, 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE, p. 105-110 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns

    Chiapponi, E., Dacier, M. & Thonnard, O., 2023, 8th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2023) co-located with 8th IEEE European Symposium on Security and Privacy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Poster: The Impact of the Client Environment on Residential IP Proxies Detection

    Chiapponi, E., Dacier, M. & Thonnard, O., Oct 24 2023, IMC 2023 - Proceedings of the 2023 ACM on Internet Measurement Conference. Association for Computing Machinery, p. 712-713 2 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements

    Chiapponi, E., Dacier, M. & Thonnard, O., Jun 20 2023, 7th IFIP Network Traffic Measurement and Analysis Conference (TMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    An industrial perspective on web scraping characteristics and open issues

    Chiapponi, E., Dacier, M., Thonnard, O., Fangar, M., Mattsson, M. & Rigal, V., Jul 25 2022, 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • BADPASS: Bots taking ADvantage of Proxy AS a Service

    Chiapponi, E., Dacier, M., Thonnard, O., Fangar, M. & Rigal, V., 2022, 17th International Conference on Information Security Practice and Experience (ISPEC 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ImMuNE: Improved Multilateration in Noisy Environments

    Champion, M., Dacier, M. & Chiapponi, E., 2022, Proceedings of the 2022 IEEE Conference on Cloud Networking 2022, CloudNet 2022. Secci, S., Durairajan, R., Linguaglossa, L., Kamiyama, N., Nogueira, M. & Rovedakis, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 10-15 6 p. (Proceedings of the 2022 IEEE Conference on Cloud Networking 2022, CloudNet 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Botnet Sizes: When Maths Meet Myths

    Chiapponi, E., Dacier, M., Todisco, M., Catakoglu, O. & Thonnard, O., Jan 1 2021, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Science and Business Media Deutschland GmbH, p. 596-611 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks

    Farrah, D. & Dacier, M., May 1 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021. Institute of Electrical and Electronics Engineers Inc., p. 410-421 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2016

    Visualization of actionable knowledge to mitigate DRDoS attacks

    Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., Nov 8 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2015

    Circuit fingerprinting attacks: Passive deanonymization of tor hidden services

    Kwon, A., AlSabah, M., Lazar, D., Dacier, M. & Devadas, S., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 287-302 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    124 Scopus citations
  • 2014

    Malicious BGP hijacks: Appearances can be deceiving

    Vervier, P. A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy-Keller, G., Biersack, E. & Dacier, M., Jan 1 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer [email protected], p. 884-889 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2012

    The MEERKATS cloud security architecture

    Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Yang, J., Benameur, A., Dacier, M., Elder, M., Kienzle, D. & Stavrou, A., Sep 24 2012, Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012. p. 446-450 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2011

    A strategic analysis of spam botnets operations

    Thonnard, O. & Dacier, M., Oct 13 2011, ACM International Conference Proceeding Series. p. 162-171 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • On the resilience of the dependability framework to the intrusion of new security threats

    Dacier, M., Dec 1 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 238-250 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The MINESTRONE architecture combining static and dynamic analysis techniques for software security

    Keromytis, A. D., Stolfo, S. J., Yang, J., Stavrou, A., Ghosh, A., Engler, D., Dacier, M., Elder, M. & Kienzle, D., Dec 23 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 53-56 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2010

    An analysis of rogue AV campaigns

    Cova, M., Leita, C., Thonnard, O., Keromytis, A. D. & Dacier, M., Jan 1 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 442-463 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • 2009

    Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making

    Thonnard, O., Mees, W. & Dacier, M., Nov 23 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 11-21 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Behavioral analysis of zombie armies

    Thonnard, O., Mees, W. & Dacier, M., Jan 1 2009, Cryptology and Information Security Series. IOS PressNieuwe Hemweg 6BAmsterdam1013 BG, p. 191-210 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Gone rogue: An analysis of rogue security software campaigns

    Cova, M., Leita, C., Thonnard, O., Keromytis, A. & Dacier, M., Jan 1 2009, EC2ND 2009 - European Conference on Computer Network Defense. IEEE Computer [email protected], p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Honeypot traces forensics: The observation viewpoint matters

    Pham, V. H. & Dacier, M., Dec 1 2009, NSS 2009 - Network and System Security. p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • The WOMBAT attack attribution method: Some results

    Dacier, M., Pham, V. H. & Thonnard, O., Dec 14 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 19-37 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • 2008

    Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology

    Thonnard, O. & Dacier, M., Dec 1 2008, Proceedings - IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008. p. 154-163 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • A framework for attack patterns' discovery in honeynet data

    Thonnard, O. & Dacier, M., Jan 1 2008, DFRWS 2008 Annual Conference. Digital Forensic Research Workshop

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Automating the analysis of honeypot data

    Thonnard, O., Viinikka, J., Leita, C. & Dacier, M., Nov 27 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 406-407 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SGNET: A worldwide deployable framework to support the analysis of malware threat models

    Leita, C. & Dacier, M., Sep 17 2008, Proceedings - 7th European Dependable Computing Conference, EDCC-7. p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Scopus citations
  • SGNET: Implementation insights

    Leita, C. & Dacier, M., Sep 22 2008, NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services. p. 1075-1078 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • The Leurre.com Project: Collecting internet threats information using a worldwide distributed honeynet

    Leita, C., Pham, V. H., Thonnard, O., Ramirez-Silva, E., Pouget, F., Kirda, E. & Dacier, M., Nov 6 2008, Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. p. 40-57 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • The quest for multi-headed worms

    Pham, V. H., Dacier, M., Urvoy-Keller, G. & En-Najjary, T., Aug 27 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 247-266 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2007

    Empirical study of the impact of metasploit-related attacks in 4 years of attack traces

    Ramirez-Silva, E. & Dacier, M., Jan 1 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 198-211 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Extracting inter-arrival time based behaviour from honeypot traffic using cliques

    Almotairi, S., Clark, A., Dacier, M., Leita, C., Mohay, G., Pham, V. H., Thonnard, O. & Zimmermann, J., Dec 1 2007, Proceedings of the 5th Australian Digital Forensics Conference. p. 79-87 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2006

    Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots

    Leita, C., Dacier, M. & Massicotte, F., Jan 1 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 185-205 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • Lessons learned from the deployment of a high-interaction honeypot

    Alata, E., Nicomette, V., Kaâniche, M., Dacier, M. & Herrb, M., Dec 1 2006, Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. p. 39-44 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Scopus citations
  • 2005

    Comparative survey of local honeypot sensors to assist network forensics

    Chen, P. T., Laih, C. S., Pouget, F. & Dacier, M., Dec 1 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 120-132 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • ScriptGen: An automated script generation tool for honeyd

    Leita, C., Mermoud, K. & Dacier, M., Dec 1 2005, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 203-214 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    146 Scopus citations
  • Should we share honeypot information for security management?

    Wu, F., Dacier, M., Debar, H. & Chen, Y. M., Dec 1 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The use of packet inter-arrival times for investigating unsolicited internet traffic

    Zimmermann, J., Clark, A., Mohay, G., Pouget, F. & Dacier, M., Dec 1 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 89-104 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • 2004

    Honeypots: Practical means to validate malicious fault assumptions

    Dacier, M., Pouget, F. & Debar, H., Jun 15 2004, Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing. p. 383-388 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • 2002

    Mining intrusion detection alarms for actionable knowledge

    Julisch, K. & Dacier, M., Jan 1 2002, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery (ACM), p. 366-375 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    209 Scopus citations
  • 2000

    A Lightweight Tool for Detecting Web Server Attacks

    Almgren, M., Debar, H. & Dacier, M., 2000, Proceedings of the Symposium on Network and Distributed System Security, NDSS 2000. The Internet Society, (Proceedings of the Symposium on Network and Distributed System Security, NDSS 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    58 Scopus citations
  • Intrusion detection using variable-length audit trail patterns

    Wespi, A., Dacier, M. & Debar, H., Jan 1 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 110-129 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    116 Scopus citations
  • 1998

    Fixed vs. Variable-length patterns for detecting suspicious process behavior

    Debar, H., Dacier, M., Nassehi, M. & Wespi, A., Jan 1 1998, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer [email protected], p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations