Seguir
Alexandre Dulaunoy
Alexandre Dulaunoy
CIRCL
Dirección de correo verificada de circl.lu - Página principal
Título
Citado por
Citado por
Año
Misp: The design and implementation of a collaborative threat intelligence sharing platform
C Wagner, A Dulaunoy, G Wagener, A Iklody
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
2972016
Malware behaviour analysis
G Wagener, R State, A Dulaunoy
Journal in computer virology 4, 279-287, 2008
1432008
Self adaptive high interaction honeypots driven by game theory
G Wagener, R State, A Dulaunoy, T Engel
Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009
712009
DNSSM: A large scale passive DNS security monitoring framework
S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor
2012 IEEE Network Operations and Management Symposium, 988-993, 2012
372012
Adaptive and self-configurable honeypots
G Wagener, R State, T Engel, A Dulaunoy
12th IFIP/IEEE international symposium on integrated network management (IM …, 2011
342011
Heliza: talking dirty to the attackers
G Wagener, R State, A Dulaunoy, T Engel
Journal in computer virology 7, 221-232, 2011
262011
Decaying indicators of compromise
A Iklody, G Wagener, A Dulaunoy, S Mokaddem, C Wagner
arXiv preprint arXiv:1803.11052, 2018
202018
Taxonomy driven indicator scoring in MISP threat intelligence platforms
S Mokaddem, G Wagener, A Dulaunoy, A Iklody
arXiv preprint arXiv:1902.03914, 2019
192019
Towards an estimation of the accuracy of TCP reassembly in network forensics
G Wagener, A Dulaunoy, T Engel
2008 Second International Conference on Future Generation Communication and …, 2008
192008
An extended analysis of an IoT malware from a blackhole network
A Dulaunoy, G Wagener, S Mokaddem, C Wagner
Proceedings of the Networking Conference TNC 17, 2017
182017
ASMATRA: Ranking ASs providing transit service to malware hosters
C Wagner, J François, R State, A Dulaunoy, T Engel, G Massen
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
142013
Breaking Tor anonymity with game theory and data mining
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012
132012
AIL-The design and implementation of an Analysis Information Leak framework
S Mokaddem, G Wagener, A Dulaunoy
2018 IEEE International Conference on Big Data (Big Data), 5049-5057, 2018
102018
An indicator scoring method for misp platforms
A Dulaunoy, G Wagener, A Iklody, S Mokaddem, C Wagner
The Networking Conference TNC 18, 2018
82018
MISP core format
A Dulaunoy, A Iklody
Internet Eng. Task Force (IETF), Fremont, CA, USA, Rep, 2020
72020
Game theory driven monitoring of spatial-aggregated IP-flow records
C Wagner, G Wagener, R State, T Engel, A Dulaunoy
2010 International Conference on Network and Service Management, 463-468, 2010
72010
Passive DNS-Common output format
A Dulaunoy, A Kaplan, P Vixie, H Stern
Working Draft, IETF, Tech. Rep., June, 2017
52017
SDBF: Smart DNS brute-forcer
C Wagner, J François, R State, T Engel, G Wagener, A Dulaunoy
2012 IEEE Network Operations and Management Symposium, 1001-1007, 2012
52012
PeekKernelFlows: Peeking into IP flows
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Proceedings of the Seventh International Symposium on Visualization for …, 2010
52010
An instrumented analysis of unknown software and malware driven by free libre open source software
G Wagener, A Dulaunoy, T Engel
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
52008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20