Search Results - "Thonnard, O."
-
1
Visual analytics for BGP monitoring and prefix hijacking identification
Published in IEEE network (01-11-2012)“…The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing information between large network…”
Get full text
Journal Article -
2
Spammers operations: a multifaceted strategic analysis
Published in Security and communication networks (10-03-2016)“…There is a consensus in the anti‐spam community regarding the prevalence of spam botnets and the significant role they play in the worldwide spam problem…”
Get full text
Journal Article -
3
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines
Published in 2009 Eighth IEEE International Symposium on Network Computing and Applications (01-07-2009)“…Fault tolerance in the form of diverse redundancy is well known to improve the detection rates for both malicious and non-malicious failures. What is of…”
Get full text
Conference Proceeding -
4
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology
Published in 2008 IEEE International Conference on Data Mining Workshops (01-12-2008)“…This paper describes a multi-dimensional knowledge discovery and data mining (KDD) methodology that aims at discovering actionable knowledge related to…”
Get full text
Conference Proceeding -
5
The Leurre.com Project: Collecting Internet Threats Information Using a Worldwide Distributed Honeynet
Published in 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (01-04-2008)“…This paper aims at presenting in some depth the Leurre.com project and its data collection infrastructure. Launched in 2003 by the Institut Eurecom, this…”
Get full text
Conference Proceeding