Misp: The design and implementation of a collaborative threat intelligence sharing platform C Wagner, A Dulaunoy, G Wagener, A Iklody Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 325 | 2016 |
Malware behaviour analysis G Wagener, R State, A Dulaunoy Journal in computer virology 4, 279-287, 2008 | 146 | 2008 |
Self adaptive high interaction honeypots driven by game theory G Wagener, R State, A Dulaunoy, T Engel Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009 | 71 | 2009 |
DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor 2012 IEEE Network Operations and Management Symposium, 988-993, 2012 | 28 | 2012 |
Heliza: talking dirty to the attackers G Wagener, R State, A Dulaunoy, T Engel Journal in computer virology 7, 221-232, 2011 | 27 | 2011 |
Adaptive and self-configurable honeypots G Wagener, R State, T Engel, A Dulaunoy 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 24 | 2011 |
Taxonomy driven indicator scoring in MISP threat intelligence platforms S Mokaddem, G Wagener, A Dulaunoy, A Iklody arXiv preprint arXiv:1902.03914, 2019 | 20 | 2019 |
Decaying indicators of compromise A Iklody, G Wagener, A Dulaunoy, S Mokaddem, C Wagner arXiv preprint arXiv:1803.11052, 2018 | 20 | 2018 |
Towards an estimation of the accuracy of TCP reassembly in network forensics G Wagener, A Dulaunoy, T Engel 2008 Second International Conference on Future Generation Communication and …, 2008 | 19 | 2008 |
An extended analysis of an IoT malware from a blackhole network A Dulaunoy, G Wagener, S Mokaddem, C Wagner Proceedings of the Networking Conference TNC 17, 2017 | 17 | 2017 |
ASMATRA: Ranking ASs providing transit service to malware hosters C Wagner, J François, R State, A Dulaunoy, T Engel, G Massen 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013 | 14 | 2013 |
Breaking Tor anonymity with game theory and data mining C Wagner, G Wagener, R State, A Dulaunoy, T Engel Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012 | 13 | 2012 |
AIL-The design and implementation of an Analysis Information Leak framework S Mokaddem, G Wagener, A Dulaunoy 2018 IEEE International Conference on Big Data (Big Data), 5049-5057, 2018 | 10 | 2018 |
An indicator scoring method for misp platforms A Dulaunoy, G Wagener, A Iklody, S Mokaddem, C Wagner The Networking Conference TNC 18, 2018 | 8 | 2018 |
MISP core format A Dulaunoy, A Iklody Internet Eng. Task Force (IETF), Fremont, CA, USA, Rep, 2020 | 7 | 2020 |
Game theory driven monitoring of spatial-aggregated IP-flow records C Wagner, G Wagener, R State, T Engel, A Dulaunoy 2010 International Conference on Network and Service Management, 463-468, 2010 | 7 | 2010 |
Passive DNS-Common output format A Dulaunoy, A Kaplan, P Vixie, H Stern Working Draft, IETF, Tech. Rep., June, 2017 | 5 | 2017 |
SDBF: Smart DNS brute-forcer C Wagner, J François, R State, T Engel, G Wagener, A Dulaunoy 2012 IEEE Network Operations and Management Symposium, 1001-1007, 2012 | 5 | 2012 |
PeekKernelFlows: Peeking into IP flows C Wagner, G Wagener, R State, A Dulaunoy, T Engel Proceedings of the Seventh International Symposium on Visualization for …, 2010 | 5 | 2010 |
An instrumented analysis of unknown software and malware driven by free libre open source software G Wagener, A Dulaunoy, T Engel 2008 IEEE International Conference on Signal Image Technology and Internet …, 2008 | 5 | 2008 |