default search action
Marc Dacier
Person information
- affiliation: King Abdullah University of Science and Technology (KAUST), Saudi Arabia
- affiliation (former): Qatar Computing Research Institute
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Elyssa Boulila, Marc Dacier:
WPAD: Waiting Patiently for an Announced Disaster. ACM Comput. Surv. 55(10): 217:1-217:29 (2023) - [c42]Iliès Benhabbour, Yérom-David Bromberg, Marc Dacier, Sven Dietrich, Rodrigo Seromenho Miragaia Rodrigues, Paulo Esteves Veríssimo:
Attacks on tomorrow's virtual world. DSN-S 2023: 105-110 - [c41]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns. EuroS&P Workshops 2023: 501-512 - [c40]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Poster: The Impact of the Client Environment on Residential IP Proxies Detection. IMC 2023: 712-713 - [c39]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements. TMA 2023: 1-4 - 2022
- [c38]Mathieu Champion, Marc Dacier, Elisa Chiapponi:
ImMuNE: Improved Multilateration in Noisy Environments. CloudNet 2022: 1-6 - [c37]Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Mattias Mattsson, Vincent Rigal:
An industrial perspective on web scraping characteristics and open issues. DSN (Supplements) 2022: 5-8 - [c36]Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Vincent Rigal:
BADPASS: Bots Taking ADvantage of Proxy as a Service. ISPEC 2022: 327-344 - 2021
- [c35]Dhia Farrah, Marc Dacier:
Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks. SP (Workshops) 2021: 410-421 - 2020
- [c34]Elisa Chiapponi, Marc Dacier, Massimiliano Todisco, Onur Catakoglu, Olivier Thonnard:
Botnet Sizes: When Maths Meet Myths. ICSOC Workshops 2020: 596-611
2010 – 2019
- 2018
- [j13]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Comput. Surv. 51(4): 67:1-67:36 (2018) - [i8]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. CoRR abs/1805.08426 (2018) - 2017
- [j12]Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich:
Security Challenges and Opportunities of Software-Defined Networking. IEEE Secur. Priv. 15(2): 96-100 (2017) - [e3]Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis:
Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. Lecture Notes in Computer Science 10453, Springer 2017, ISBN 978-3-319-66331-9 [contents] - 2016
- [j11]Olivier Thonnard, Pierre-Antoine Vervier, Marc Dacier:
Spammers operations: a multifaceted strategic analysis. Secur. Commun. Networks 9(4): 336-356 (2016) - [c33]Michaël Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, Yazan Boshmaf:
Visualization of actionable knowledge to mitigate DRDoS attacks. VizSEC 2016: 1-8 - [e2]Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro:
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings. Lecture Notes in Computer Science 9854, Springer 2016, ISBN 978-3-319-45718-5 [contents] - [i7]Marc Dacier, Sven Dietrich, Frank Kargl, Hartmut König:
Network Attack Detection and Defense (Dagstuhl Seminar 16361). Dagstuhl Reports 6(9): 1-28 (2016) - 2015
- [c32]Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier:
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. NDSS 2015 - [c31]Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas:
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. USENIX Security Symposium 2015: 287-302 - 2014
- [j10]Frank Kargl, Rens W. van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier:
Insights on the Security and Dependability of Industrial Control Systems. IEEE Secur. Priv. 12(6): 75-78 (2014) - [c30]Pierre-Antoine Vervier, Quentin Jacquemart, Johann Schlamp, Olivier Thonnard, Georg Carle, Guillaume Urvoy-Keller, Ernst W. Biersack, Marc Dacier:
Malicious BGP hijacks: Appearances can be deceiving. ICC 2014: 884-889 - [i6]Marc Dacier, Frank Kargl, Hartmut König, Alfonso Valdes:
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports 4(7): 62-79 (2014) - 2012
- [c29]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [i5]Marc Dacier, Frank Kargl, Alfonso Valdes:
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502). Dagstuhl Reports 2(12): 49-63 (2012) - 2011
- [j9]Van-Hau Pham, Marc Dacier:
Honeypot trace forensics: The observation viewpoint matters. Future Gener. Comput. Syst. 27(5): 539-546 (2011) - [c28]Marc Dacier:
On the Resilience of the Dependability Framework to the Intrusion of New Security Threats. Dependable and Historic Computing 2011: 238-250 - [c27]Olivier Thonnard, Marc Dacier:
A strategic analysis of spam botnets operations. CEAS 2011: 162-171 - [c26]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - 2010
- [j8]Olivier Thonnard, Wim Mees, Marc Dacier:
On a multicriteria clustering approach for attack attribution. SIGKDD Explor. 12(1): 11-20 (2010) - [c25]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. RAID 2010: 442-463 - [p3]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p2]Marc Dacier, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda:
Assessing Cybercrime Through the Eyes of the WOMBAT. Cyber Situational Awareness 2010: 103-136
2000 – 2009
- 2009
- [j7]Marc Dacier:
Technical perspective - They do click, don't they? Commun. ACM 52(9): 98 (2009) - [c24]Marc Dacier, Van-Hau Pham, Olivier Thonnard:
The WOMBAT Attack Attribution Method: Some Results. ICISS 2009: 19-37 - [c23]Olivier Thonnard, Wim Mees, Marc Dacier:
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 11-21 - [c22]Van-Hau Pham, Marc Dacier:
Honeypot Traces Forensics: The Observation Viewpoint Matters. NSS 2009: 365-372 - [e1]Hsinchun Chen, Marc Dacier, Marie-Francine Moens, Gerhard Paass, Christopher C. Yang:
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009. ACM 2009, ISBN 978-1-60558-669-4 [contents] - 2008
- [j6]Olivier Thonnard, Marc Dacier:
A framework for attack patterns' discovery in honeynet data. Digit. Investig. 5(Supplement): S128-S139 (2008) - [j5]Fabien Pouget, Marc Dacier, Van-Hau Pham:
Understanding threats: a prerequisite to enhance survivability of computing systems. Int. J. Crit. Infrastructures 4(1/2): 153-171 (2008) - [c21]Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary:
The Quest for Multi-headed Worms. DIMVA 2008: 247-266 - [c20]Corrado Leita, Marc Dacier:
SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. EDCC 2008: 99-109 - [c19]Olivier Thonnard, Marc Dacier:
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology. ICDM Workshops 2008: 154-163 - [c18]Corrado Leita, Marc Dacier:
SGNET: Implementation insights. NOMS 2008: 1075-1078 - [c17]Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier:
Automating the Analysis of Honeypot Data (Extended Abstract). RAID 2008: 406-407 - [i4]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 - [i3]Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger:
08102 Working Group -- Intrusion and Fraud Detection for Web Services. Network Attack Detection and Defense 2008 - 2007
- [c16]E. Ramirez-Silva, Marc Dacier:
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. ASIAN 2007: 198-211 - [i2]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot. CoRR abs/0704.0858 (2007) - [i1]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - 2006
- [c15]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46 - [c14]Corrado Leita, Marc Dacier, Frédéric Massicotte:
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. RAID 2006: 185-205 - [p1]Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget:
Collection and analysis of attack data based on honeypots deployed on the Internet. Quality of Protection 2006: 79-91 - 2005
- [c13]Corrado Leita, Ken Mermoud, Marc Dacier:
ScriptGen: an automated script generation tool for honeyd. ACSAC 2005: 203-214 - [c12]Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier:
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. SADFE 2005: 89-104 - [c11]Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier:
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. SADFE 2005: 120-134 - 2004
- [c10]Marc Dacier, Fabien Pouget, Hervé Debar:
Honeypots: Practical Means to Validate Malicious Fault Assumptions. PRDC 2004: 383-388 - 2002
- [c9]Klaus Julisch, Marc Dacier:
Mining intrusion detection alarms for actionable knowledge. KDD 2002: 366-375 - 2000
- [j4]Hervé Debar, Marc Dacier, Andreas Wespi:
A revised taxonomy for intrusion-detection systems. Ann. des Télécommunications 55(7-8): 361-378 (2000) - [j3]Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. J. Comput. Secur. 8(2/3) (2000) - [c8]Magnus Almgren, Hervé Debar, Marc Dacier:
A Lightweight Tool for Detecting Web Server Attacks. NDSS 2000 - [c7]Andreas Wespi, Marc Dacier, Hervé Debar:
Intrusion Detection Using Variable-Length Audit Trail Patterns. Recent Advances in Intrusion Detection 2000: 110-129
1990 – 1999
- 1999
- [j2]Hervé Debar, Marc Dacier, Andreas Wespi:
Towards a taxonomy of intrusion-detection systems. Comput. Networks 31(8): 805-822 (1999) - [j1]Marc Dacier, Kathleen Jackson:
Intrusion detection. Comput. Networks 31(23-24): 2433-2434 (1999) - [c6]Marc Dacier, O. Sami Saydjari:
Special Seminar: Intrusion Detection. FTCS 1999: 238 - [c5]Yves Cosendai, Marc Dacier, Paolo Scotton:
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. Recent Advances in Intrusion Detection 1999 - 1998
- [c4]Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. ESORICS 1998: 1-15 - 1996
- [c3]Marc Dacier, Yves Deswarte, Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 - 1994
- [b1]Marc Dacier:
Vers une évaluation quantitative de la sécurité informatique. (Towards a quantitative evaluation of computer security). National Polytechnic Institute of Toulouse, France, 1994 - [c2]Marc Dacier, Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334 - 1993
- [c1]Marc Dacier:
A Petri Net Representation of the Take-Grant Model. CSFW 1993: 99-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint