Seguir
Olivier Thonnard
Olivier Thonnard
Security Expert, Amadeus
Dirección de correo verificada de amadeus.com
Título
Citado por
Citado por
Año
A framework for attack patterns' discovery in honeynet data
O Thonnard, M Dacier
digital investigation 5, S128-S139, 2008
1152008
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
International workshop on recent advances in intrusion detection, 64-85, 2012
1042012
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, AD Keromytis, M Dacier
International Workshop on Recent Advances in Intrusion Detection, 442-463, 2010
822010
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
PA Vervier, O Thonnard, M Dacier
Network and Distributed System Security Symposium (NDSS), 2015
692015
That Ain’t You: Blocking Spearphishing Through Behavioral Modelling
G Stringhini, O Thonnard
DIMVA, 2015
582015
Monitoring user authenticity
V Amar, J Barlet, M Campora, J El Hayek, R Peicle, O Thonnard, ...
US Patent 9,876,825, 2018
572018
Inside the scam jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, A Francillon, D Balzarotti
EURASIP Journal on Information Security 2014 (1), 1-18, 2014
562014
An experimental study of diversity with off-the-shelf antivirus engines
I Gashi, V Stankovic, C Leita, O Thonnard
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
552009
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
542008
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
O Thonnard, M Dacier
2008 ieee international conference on data mining workshops, 154-163, 2008
502008
Monitoring user authenticity in distributed system
V Amar, J Barlet, R Peicle, O Thonnard, J Zouaoui
US Patent 10,110,634, 2018
482018
A strategic analysis of spam botnets operations
O Thonnard, M Dacier
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
482011
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
422009
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes
F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard
Proceedings of the ninth international symposium on visualization for cyber …, 2012
412012
Understanding user behaviour through action sequences: from the usual to the unusual
PH Nguyen, C Turkay, G Andrienko, N Andrienko, O Thonnard, J Zouaoui
IEEE transactions on visualization and computer graphics 25 (9), 2838-2852, 2018
372018
On a multicriteria clustering approach for attack attribution
O Thonnard, W Mees, M Dacier
ACM SIGKDD Explorations Newsletter 12 (1), 11-20, 2010
332010
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks
O Thonnard, L Bilge, A Kashyap, M Lee
Financial Cryptography and Data Security, 2015
322015
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE network 26 (6), 33-39, 2012
292012
Determining the k in k-means with MapReduce
T Debatty, P Michiardi, W Mees, O Thonnard
Algorithms for MapReduce and Beyond, 2014
282014
Visual spam campaigns analysis using abstract graphs representation
O Tsigkas, O Thonnard, D Tzovaras
Proceedings of the ninth international symposium on visualization for cyber …, 2012
252012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20