Search Results - "Thonnard, O."

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Visual analytics for BGP monitoring and prefix hijacking identification by Biersack, E., Jacquemart, Q., Fischer, F., Fuchs, J., Thonnard, O., Theodoridis, G., Tzovaras, D., Vervier, P.

    Published in IEEE network (01-11-2012)
    “…The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing information between large network…”
    Get full text
    Journal Article
  2. 2

    Spammers operations: a multifaceted strategic analysis by Thonnard, O., Vervier, Pierre‐Antoine, Dacier, M.

    Published in Security and communication networks (10-03-2016)
    “…There is a consensus in the anti‐spam community regarding the prevalence of spam botnets and the significant role they play in the worldwide spam problem…”
    Get full text
    Journal Article
  3. 3

    An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines by Gashi, I., Stankovic, V., Leita, C., Thonnard, O.

    “…Fault tolerance in the form of diverse redundancy is well known to improve the detection rates for both malicious and non-malicious failures. What is of…”
    Get full text
    Conference Proceeding
  4. 4

    Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology by Thonnard, O., Dacier, M.

    “…This paper describes a multi-dimensional knowledge discovery and data mining (KDD) methodology that aims at discovering actionable knowledge related to…”
    Get full text
    Conference Proceeding
  5. 5

    The Leurre.com Project: Collecting Internet Threats Information Using a Worldwide Distributed Honeynet by Leita, C., Pham, V.H., Thonnard, O., Ramirez-Silva, E., Pouget, F., Kirda, E., Dacier, M.

    “…This paper aims at presenting in some depth the Leurre.com project and its data collection infrastructure. Launched in 2003 by the Institut Eurecom, this…”
    Get full text
    Conference Proceeding