Follow
Alexandre Dulaunoy
Title
Cited by
Cited by
Year
Misp: The design and implementation of a collaborative threat intelligence sharing platform
C Wagner, A Dulaunoy, G Wagener, A Iklody
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
2912016
Malware behaviour analysis
G Wagener, R State, A Dulaunoy
Journal in computer virology 4, 279-287, 2008
1432008
Self adaptive high interaction honeypots driven by game theory
G Wagener, R State, A Dulaunoy, T Engel
Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009
702009
DNSSM: A large scale passive DNS security monitoring framework
S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor
2012 IEEE Network Operations and Management Symposium, 988-993, 2012
372012
Adaptive and self-configurable honeypots
G Wagener, R State, T Engel, A Dulaunoy
12th IFIP/IEEE international symposium on integrated network management (IM …, 2011
342011
Heliza: talking dirty to the attackers
G Wagener, R State, A Dulaunoy, T Engel
Journal in computer virology 7, 221-232, 2011
242011
Taxonomy driven indicator scoring in MISP threat intelligence platforms
S Mokaddem, G Wagener, A Dulaunoy, A Iklody
arXiv preprint arXiv:1902.03914, 2019
192019
Decaying indicators of compromise
A Iklody, G Wagener, A Dulaunoy, S Mokaddem, C Wagner
arXiv preprint arXiv:1803.11052, 2018
192018
Towards an estimation of the accuracy of TCP reassembly in network forensics
G Wagener, A Dulaunoy, T Engel
2008 Second International Conference on Future Generation Communication and …, 2008
192008
An extended analysis of an IoT malware from a blackhole network
A Dulaunoy, G Wagener, S Mokaddem, C Wagner
Proceedings of the Networking Conference TNC 17, 2017
182017
ASMATRA: Ranking ASs providing transit service to malware hosters
C Wagner, J François, R State, A Dulaunoy, T Engel, G Massen
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
142013
Breaking Tor anonymity with game theory and data mining
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012
122012
AIL-The design and implementation of an Analysis Information Leak framework
S Mokaddem, G Wagener, A Dulaunoy
2018 IEEE International Conference on Big Data (Big Data), 5049-5057, 2018
92018
An indicator scoring method for misp platforms
A Dulaunoy, G Wagener, A Iklody, S Mokaddem, C Wagner
The Networking Conference TNC 18, 2018
82018
MISP core format
A Dulaunoy, A Iklody
Internet Eng. Task Force (IETF), Fremont, CA, USA, Rep, 2020
72020
Game theory driven monitoring of spatial-aggregated IP-flow records
C Wagner, G Wagener, R State, T Engel, A Dulaunoy
2010 International Conference on Network and Service Management, 463-468, 2010
72010
SDBF: Smart DNS brute-forcer
C Wagner, J François, R State, T Engel, G Wagener, A Dulaunoy
2012 IEEE Network Operations and Management Symposium, 1001-1007, 2012
52012
PeekKernelFlows: Peeking into IP flows
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Proceedings of the Seventh International Symposium on Visualization for …, 2010
52010
An instrumented analysis of unknown software and malware driven by free libre open source software
G Wagener, A Dulaunoy, T Engel
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
52008
Passive DNS-Common output format
A Dulaunoy, A Kaplan, P Vixie, H Stern
Working Draft, IETF, Tech. Rep., June, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20