Pierre-Antoine Vervier
Pierre-Antoine Vervier
Verifierad e-postadress på symantec.com
Titel
Citeras av
Citeras av
År
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
PA Vervier, O Thonnard, M Dacier
Network and Distributed System Security (NDSS) Symposium, 2015
522015
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
402018
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes
F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard
Proceedings of the ninth international symposium on visualization for cyber …, 2012
362012
Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
342019
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE Network 26 (6), 33-39, 2012
282012
Before toasters rise up: A view into the emerging iot threat landscape
PA Vervier, Y Shen
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
182018
SpamTracer: How Stealthy Are Spammers?
PA Vervier, O Thonnard
5th IEEE International Traffic Monitoring and Analysis (TMA) Workshop …, 2013
132013
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
102017
Malicious BGP Hijacks: Appearances Can Be Deceiving
PA Vervier, Q Jacquemart, J Schlamp, O Thonnard, G Carle, ...
ICC CISS 2014, IEEE International Conference on Communications, 10-14 June …, 2014
82014
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
P Kotzias, L Bilge, PA Vervier, J Caballero
NDSS, 2019
72019
Accurate real-time identification of malicious BGP hijacks
Y Shen, HAN Yufei, PA Vervier
US Patent 10,148,690, 2018
52018
IoT Security and Privacy Labels
Y Shen, PA Vervier
Annual Privacy Forum, 136-147, 2019
42019
Systems and methods for evaluating infection risks based on profiled user behaviors
HAN Yufei, L Yumer, PA Vervier, M Dell'Amico
US Patent 10,116,680, 2018
42018
Spammers operations: a multifaceted strategic analysis
O Thonnard, PA Vervier, M Dacier
Security and Communication Networks 9 (4), 336-356, 2016
42016
Detecting a hijacked network address
PA Vervier, M Dacier, O Thonnard
US Patent 9,654,504, 2017
32017
The Tangled Genealogy of IoT Malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Annual Computer Security Applications Conference, 1-16, 2020
2020
Security network devices by forecasting future security incidents for a network based on past security incidents
HAN Yufei, Y Shen, L Yumer, PA Vervier, P Efstathopoulos
US Patent 10,547,623, 2020
2020
Systems and methods for mapping services utilized by network domains
M Dell'Amico, PA Vervier, L Yumer
US Patent 10,547,633, 2020
2020
Systems and methods for assessing cyber risks using incident-origin information
PA Vervier, L Bilge, HAN Yufei, M Dell'Amico
US Patent 10,516,680, 2019
2019
Systems and methods for determining the reputations of unknown files
Y Shen, HAN Yufei, PA Vervier
US Patent 10,437,994, 2019
2019
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20