| Malware behaviour analysis G Wagener, A Dulaunoy Journal in computer virology 4 (4), 279-287, 2008 | 94 | 2008 |
| Self adaptive high interaction honeypots driven by game theory G Wagener, A Dulaunoy, T Engel Symposium on Self-Stabilizing Systems, 741-755, 2009 | 35 | 2009 |
| Misp: The design and implementation of a collaborative threat intelligence sharing platform C Wagner, A Dulaunoy, G Wagener, A Iklody Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 22 | 2016 |
| Towards an estimation of the accuracy of TCP reassembly in network forensics G Wagener, A Dulaunoy, T Engel Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008 | 17 | 2008 |
| Adaptive and self-configurable honeypots G Wagener, T Engel, A Dulaunoy Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium …, 2011 | 16 | 2011 |
| DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, A Dulaunoy, T Engel, O Festor Network Operations and Management Symposium (NOMS), 2012 IEEE, 988-993, 2012 | 12 | 2012 |
| ASMATRA: Ranking ASs providing transit service to malware hosters C Wagner, J François, A Dulaunoy, T Engel, G Massen Integrated Network Management (IM 2013), 2013 IFIP/IEEE International …, 2013 | 10 | 2013 |
| Breaking Tor anonymity with game theory and data mining C Wagner, G Wagener, R State, A Dulaunoy, T Engel Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012 | 6 | 2012 |
| PeekKernelFlows: Peeking into IP flows C Wagner, G Wagener, A Dulaunoy, T Engel Proceedings of the Seventh International Symposium on Visualization for …, 2010 | 6 | 2010 |
| OpenSST message format A Dulaunoy, T Fruru, S Stormacq Internet Drafts, December, 2002 | 5 | 2002 |
| SDBF: Smart DNS brute-forcer C Wagner, J François, T Engel, G Wagener, A Dulaunoy Network Operations and Management Symposium (NOMS), 2012 IEEE, 1001-1007, 2012 | 4 | 2012 |
| Heliza: talking dirty to the attackers G Wagener, A Dulaunoy, T Engel Journal in computer virology 7 (3), 221-232, 2011 | 4 | 2011 |
| A XML Schema for the OpenSST message format A Alexandre Dulaunoy Internal Conostix document, 2002 | 4 | 2002 |
| OpenSST: Open Simply Secure Transaction A Dulaunoy, S Stormacq URL: http://www. foo. be/current/opensst, 2002 | 4 | 2002 |
| Game theory driven monitoring of spatial-aggregated IP-Flow records C Wagner, G Wagener, T Engel, A Dulaunoy Network and Service Management (CNSM), 2010 International Conference on, 463-468, 2010 | 3 | 2010 |
| An instrumented analysis of unknown software and malware driven by free libre open source software G Wagener, A Dulaunoy, T Engel Signal Image Technology and Internet Based Systems, 2008. SITIS'08. IEEE …, 2008 | 3 | 2008 |
| A security improved OpenSST prototype combining with smart card X Zhang, C Meinel, A Dulaunoy Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 …, 2003 | 3 | 2003 |
| The void–an interesting place for network security monitoring A Dulaunoy, G Wagener, M Stiefer, C Wagner Proceedings of the 30th TERENA networking conference (TNC'14). Dublin …, 2014 | 2 | 2014 |
| Breaking Tor Anonymity with Game Theory and Data Mining C Wagner, G Wagener, T Engel, A Dulaunoy 2010 Fourth International Conference on Network and System Security, 47-54, 2010 | 2 | 2010 |
| Development and design of a process and a piece of software to analyze unknown software G Wagener, A Dulaunoy, T Engel University of Luxembourg, Luxembourg, 2006 | 2 | 2006 |