default search action
Ludovic Mé
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé:
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation. EuroS&P Workshops 2024: 273-286 - 2023
- [c39]Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. RAID 2023: 135-150 - 2022
- [c38]Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. CRiSIS 2022: 18-33 - 2020
- [c37]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. DIMVA 2020: 238-258 - [c36]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. EuroS&P Workshops 2020: 565-573
2010 – 2019
- 2017
- [c35]Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
STARLORD: Linked security data exploration in a 3D graph. VizSEC 2017: 1-4 - 2013
- [c34]Christophe Hauser, Frederic Tronel, Colin J. Fidge, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c33]Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé:
Secure States versus Secure Executions - From Access Control to Flow Control. ICISS 2013: 148-162 - 2012
- [i1]Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé:
User Data on Androïd Smartphone Must be Protected. ERCIM News 2012(90) (2012) - 2011
- [c32]Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong:
From SSIR to CIDre: A New Security Research Group in Rennes, France. SysSec@DIMVA 2011: 86-89 - [c31]Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé:
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. ICISS 2011: 72-86 - 2010
- [j12]Valérie Viet Triem Tong, Andrew J. Clark, Ludovic Mé:
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 56-71 (2010) - [j11]Jean-Marie Borello, Eric Filiol, Ludovic Mé:
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. J. Comput. Virol. 6(3): 277-287 (2010)
2000 – 2009
- 2009
- [j10]Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin:
Policy-based intrusion detection in web applications by monitoring Java information flows. Int. J. Inf. Comput. Secur. 3(3/4): 265-279 (2009) - [j9]Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
A logic-based model to support alert correlation in intrusion detection. Inf. Fusion 10(4): 285-299 (2009) - [j8]Jouni Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika P. Tarvainen:
Processing intrusion detection alert aggregates with time series modeling. Inf. Fusion 10(4): 312-324 (2009) - [j7]François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
Detecting and Excluding Misbehaving Nodes in a P2P Network. Stud. Inform. Univ. 7(3): 354-384 (2009) - [c30]François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
An Efficient Distributed PKI for Structured P2P Networks. Peer-to-Peer Computing 2009: 1-10 - [c29]Laurent George, Valérie Viet Triem Tong, Ludovic Mé:
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. RAID 2009: 355-356 - 2008
- [j6]Jean-Marie Borello, Ludovic Mé:
Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3): 211-220 (2008) - [c28]François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A Distributed Certification System for Structured P2P Networks. AIMS 2008: 40-52 - [c27]Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin:
Policy-based intrusion detection in Web applications by monitoring Java information flows. CRiSIS 2008: 53-60 - [c26]Dayse de Mello Benzi, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé:
Model for Trust within Information Technology Management. ICEIS (2) 2008: 513-518 - [c25]François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A sybilproof distributed identity management for P2P networks. ISCC 2008: 246-253 - [c24]Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Autonomic trust reasoning enables misbehavior detection in OLSR. SAC 2008: 2006-2013 - [c23]Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane:
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. SEC 2008: 301-315 - [c22]Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant:
Analysis of Computer Infection Risk Factors Based on Customer Network Usage. SECURWARE 2008: 317-325 - [c21]François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification. WETICE 2008: 105-110 - 2007
- [j5]Benjamin Morin, Ludovic Mé:
Intrusion detection and virology: an analysis of differences, similarities and complementariness. J. Comput. Virol. 3(1): 39-49 (2007) - [c20]Asmaa Adnane, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé:
Analysis of the implicit trust within the OLSR protocol. IFIPTM 2007: 75-90 - [c19]Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Integrating trust reasonings into node behavior in olsr. Q2SWinet 2007: 152-155 - 2006
- [c18]Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier:
Time series modeling for IDS alert management. AsiaCCS 2006: 102-113 - [c17]Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saïdane, Eric Totel, Frédéric Tronel:
A Dependable Intrusion Detection Architecture Based on Agreement Services. SSS 2006: 378-394 - 2005
- [c16]Eric Totel, Frédéric Majorczyk, Ludovic Mé:
COTS Diversity Based Intrusion Detection and Application to Web Servers. RAID 2005: 43-62 - 2004
- [j4]Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo:
Détection d'intrusions : corrélation d'alertes. Tech. Sci. Informatiques 23(3): 359-390 (2004) - [j3]Jean-Marc Percher, Ricardo Staciarini Puttini, Ludovic Mé, Olivier Camp, Bernard Jouga, Patrick Albers:
Un système de détection d'intrusions distribué pour réseaux ad hoc. Tech. Sci. Informatiques 23(3): 391-420 (2004) - [c15]Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé:
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. ACSAC 2004: 428-437 - [c14]Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior:
Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. WONS 2004: 213-226 - [c13]Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr.:
A fully distributed IDS for MANET. ISCC 2004: 331-338 - [c12]Eric Totel, Bernard Vivinis, Ludovic Mé:
A Language Driven IDS for Event and Alert Correlation. SEC 2004: 209-224 - 2003
- [b1]Ludovic Mé:
Détection des intrusions dans les systèmes d'information : la nécessaire prise en compte des caractéristiques du système surveillé. University of Rennes 1, France, 2003 - [j2]Josué Kuri, Gonzalo Navarro, Ludovic Mé:
Fast Multipattern Search Algorithms for Intrusion Detection. Fundam. Informaticae 56(1-2): 23-49 (2003) - [c11]Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. ACSAC 2003: 364-373 - [c10]Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. ESORICS 2003: 291-308 - [c9]Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba:
A Modular Architecture for Distributed IDS in MANET. ICCSA (3) 2003: 91-113 - [c8]Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Jr.:
Certification and Authentication Services for Securing MANET Routing Protocols. MWCN 2003 - 2002
- [c7]Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
M2D2: A Formal Data Model for IDS Alert Correlation. RAID 2002: 115-127 - [c6]Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. RAID 2002: 292-306 - [c5]Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic Mé, Ricardo Staciarini Puttini:
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Wireless Information Systems 2002: 1-12 - 2001
- [c4]Cédric Michel, Ludovic Mé:
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection. SEC 2001: 353-368 - [e2]Wenke Lee, Ludovic Mé, Andreas Wespi:
Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings. Lecture Notes in Computer Science 2212, Springer 2001, ISBN 3-540-42702-3 [contents] - 2000
- [c3]Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye:
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. Recent Advances in Intrusion Detection 2000: 17-27 - [c2]Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin:
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. Recent Advances in Intrusion Detection 2000: 130-144 - [e1]Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu:
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings. Lecture Notes in Computer Science 1907, Springer 2000, ISBN 3-540-41085-6 [contents]
1990 – 1999
- 1998
- [j1]Ludovic Mé, Renaud Chaillat:
Le commerce électronique: Un état de I'art. Ann. des Télécommunications 53(9-10): 361-376 (1998) - 1993
- [c1]Ludovic Mé:
Security Audit Trail Analysis Using Genetic Algorithms. SAFECOMP 1993: 329-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint