Seguir
Olivier Thonnard
Olivier Thonnard
Security Expert, Amadeus
Dirección de correo verificada de amadeus.com
Título
Citado por
Citado por
Año
Monitoring user authenticity
V Amar, J Barlet, M Campora, J El Hayek, R Peicle, O Thonnard, ...
US Patent 9,876,825, 2018
1752018
A framework for attack patterns' discovery in honeynet data
O Thonnard, M Dacier
digital investigation 5, S128-S139, 2008
1152008
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1112012
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
PA Vervier, O Thonnard, M Dacier
Network and Distributed System Security Symposium (NDSS), 2015
1072015
Contribution à la surveillance des systèmes de production à l'aide des réseaux de neurones dynamiques: Application à la e-maintenance
R Zemouri
Université de Franche-Comté, 2003
1062003
Monitoring user authenticity in distributed system
V Amar, J Barlet, R Peicle, O Thonnard, J Zouaoui
US Patent 10,110,634, 2018
922018
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, AD Keromytis, M Dacier
International Workshop on Recent Advances in Intrusion Detection, 442-463, 2010
872010
That Ain’t You: Blocking Spearphishing Through Behavioral Modelling
G Stringhini, O Thonnard
DIMVA, 2015
782015
Inside the scam jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, A Francillon, D Balzarotti
EURASIP Journal on Information Security 2014, 1-18, 2014
662014
An experimental study of diversity with off-the-shelf antivirus engines
I Gashi, V Stankovic, C Leita, O Thonnard
2009 Eighth IEEE international symposium on network computing and …, 2009
642009
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
O Thonnard, M Dacier
2008 ieee international conference on data mining workshops, 154-163, 2008
632008
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
612008
A strategic analysis of spam botnets operations
O Thonnard, M Dacier
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
502011
Understanding user behaviour through action sequences: From the usual to the unusual
PH Nguyen, C Turkay, G Andrienko, N Andrienko, O Thonnard, J Zouaoui
IEEE transactions on visualization and computer graphics 25 (9), 2838-2852, 2018
472018
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
472009
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes
F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard
Proceedings of the ninth international symposium on visualization for cyber …, 2012
452012
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks
O Thonnard, L Bilge, A Kashyap, M Lee
Financial Cryptography and Data Security, 2015
372015
On a multicriteria clustering approach for attack attribution
O Thonnard, W Mees, M Dacier
ACM SIGKDD Explorations Newsletter 12 (1), 11-20, 2010
362010
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE network 26 (6), 33-39, 2012
342012
Vasabi: Hierarchical user profiles for interactive visual user behaviour analytics
PH Nguyen, R Henkin, S Chen, N Andrienko, G Andrienko, O Thonnard, ...
IEEE transactions on visualization and computer graphics 26 (1), 77-86, 2019
332019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20