Misp: The design and implementation of a collaborative threat intelligence sharing platform C Wagner, A Dulaunoy, G Wagener, A Iklody Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 224 | 2016 |
Malware behaviour analysis G Wagener, R State, A Dulaunoy Journal in computer virology 4, 279-287, 2008 | 132 | 2008 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. G Wagener, DA Radu State, A Dulaunoy, T Engel SSS, 741-755, 2009 | 64 | 2009 |
DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor 2012 IEEE Network Operations and Management Symposium, 988-993, 2012 | 32 | 2012 |
Adaptive and self-configurable honeypots G Wagener, R State, T Engel, A Dulaunoy 12th IFIP/IEEE international symposium on integrated network management (IM …, 2011 | 22 | 2011 |
Towards an estimation of the accuracy of TCP reassembly in network forensics G Wagener, A Dulaunoy, T Engel 2008 Second International Conference on Future Generation Communication and …, 2008 | 21 | 2008 |
Heliza: talking dirty to the attackers G Wagener, R State, A Dulaunoy, T Engel Journal in computer virology 7, 221-232, 2011 | 18 | 2011 |
An extended analysis of an IoT malware from a blackhole network A Dulaunoy, G Wagener, S Mokaddem, C Wagner Proceedings of the Networking Conference TNC 17, 2017 | 15 | 2017 |
ASMATRA: Ranking ASs providing transit service to malware hosters C Wagner, J François, R State, A Dulaunoy, T Engel, G Massen 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013 | 15 | 2013 |
Breaking Tor anonymity with game theory and data mining C Wagner, G Wagener, R State, A Dulaunoy, T Engel Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012 | 13 | 2012 |
Taxonomy driven indicator scoring in MISP threat intelligence platforms S Mokaddem, G Wagener, A Dulaunoy, A Iklody arXiv preprint arXiv:1902.03914, 2019 | 12 | 2019 |
Decaying indicators of compromise A Iklody, G Wagener, A Dulaunoy, S Mokaddem, C Wagner arXiv preprint arXiv:1803.11052, 2018 | 9 | 2018 |
AIL-The design and implementation of an Analysis Information Leak framework S Mokaddem, G Wagener, A Dulaunoy 2018 IEEE International Conference on Big Data (Big Data), 5049-5057, 2018 | 8 | 2018 |
Game Theory driven monitoring of spatial-aggregated IP-Flow records C Wagner, G Wagener, R State, T Engel, A Dulaunoy 2010 International Conference on Network and Service Management, 463-468, 2010 | 7 | 2010 |
An indicator scoring method for misp platforms A Dulaunoy, G Wagener, A Iklody, S Mokaddem, C Wagner The Networking Conference TNC 18, 2018 | 5 | 2018 |
SDBF: Smart DNS brute-forcer C Wagner, J François, R State, T Engel, G Wagener, A Dulaunoy 2012 IEEE Network Operations and Management Symposium, 1001-1007, 2012 | 5 | 2012 |
PeekKernelFlows: Peeking into IP flows C Wagner, G Wagener, R State, A Dulaunoy, T Engel Proceedings of the Seventh International Symposium on Visualization for …, 2010 | 5 | 2010 |
OpenSST message format A Dulaunoy, T Fruru, S Stormacq Internet Drafts, December, 2002 | 5 | 2002 |
A XML Schema for the OpenSST message format A Alexandre Dulaunoy Internal Conostix document, 2002 | 5 | 2002 |
OpenSST: Open Simply Secure Transaction A Dulaunoy, S Stormacq URL: http://www. foo. be/current/opensst, 2002 | 5 | 2002 |