Efficient intrusion detection using principal component analysis Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault 3éme conférence sur la sécurité et architectures réseaux (SAR), La Londe …, 2004 | 131 | 2004 |
Attribute normalization in network intrusion detection W Wang, X Zhang, S Gombault, SJ Knapskog 2009 10th international symposium on pervasive systems, algorithms, and …, 2009 | 124 | 2009 |
A full bandwidth ATM Firewall O Paul, M Laurent, S Gombault Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000 | 99 | 2000 |
Constructing attribute weights from computer audit data for effective intrusion detection W Wang, X Zhang, S Gombault Journal of Systems and Software 82 (12), 1974-1981, 2009 | 63 | 2009 |
Constructing important features from massive network traffic for lightweight intrusion detection W Wang, Y He, J Liu, S Gombault IET Information Security 9 (6), 374-379, 2015 | 60 | 2015 |
Towards fast detecting intrusions: using key attributes of network traffic W Wang, S Gombault, T Guyet 2008 the third international conference on internet monitoring and …, 2008 | 54 | 2008 |
Efficient detection of DDoS attacks with important attributes W Wang, S Gombault 2008 third international conference on risks and security of internet and …, 2008 | 53 | 2008 |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network F Cuppens, F Autrel, Y Bouzida, J Garcia‐alfaro, S Gombault, T Sans Annals of Telecommunications-annales des télécommunications 61 (1-2), 197-217, 2006 | 44 | 2006 |
Eigenconnections to intrusion detection Y Bouzida, S Gombault IFIP International Information Security Conference, 241-258, 2004 | 34 | 2004 |
Selecting appropriate counter-measures in an intrusion detection framework F Cuppens, S Gombault, T Sans Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 78-87, 2004 | 32 | 2004 |
Detecting and reacting against distributed denial of service attacks Y Bouzida, F Cuppens, S Gombault 2006 IEEE International Conference on Communications 5, 2394-2400, 2006 | 28 | 2006 |
Intrusion detection using principal component analysis Y Bouzida, S Gombault Proceedings of the 7th World Multiconference on Systemics, Cybernetics and …, 2003 | 24 | 2003 |
A training-resistant anomaly detection system S Muller, J Lancrenon, C Harpes, Y Le Traon, S Gombault, JM Bonnin Computers & Security 76, 1-11, 2018 | 23 | 2018 |
Network security probe P Rolin, L Toutain, S Gombault Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994 | 22 | 1994 |
Device for controlling access between atm networks JL Simon, P Rolin, O Paul, ML Maknavicius, S Gombault US Patent App. 10/333,862, 2004 | 21 | 2004 |
Method for configuring a trie memory for the processing of data packets, and packet-processing device implementing such a method O Paul, S Gombault, ML Maknavicius, J Lattmann, C Duret, H Guesdon US Patent 7,023,859, 2006 | 19* | 2006 |
Efficiently computing the likelihoods of cyclically interdependent risk scenarios S Muller, C Harpes, Y Le Traon, S Gombault, JM Bonnin Computers & Security 64, 59-68, 2017 | 12 | 2017 |
XSS-FP: Browser fingerprinting using HTML parser quirks E Abgrall, YL Traon, M Monperrus, S Gombault, M Heiderich, A Ribault arXiv preprint arXiv:1211.4812, 2012 | 12 | 2012 |
Tailored shielding and bypass testing of web applications T Mouelhi, Y Le Traon, E Abgrall, B Baudry, S Gombault 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 12 | 2011 |
La sécurité dans les réseaux sans fil ad hoc V Gayraud, L Nuaymi, F Dupont, S Gombault, B Tharon SSTIC03, Symposium sur la sécurité des technologies de l'information et de …, 2003 | 12 | 2003 |