Eric Totel
Cited by
Cited by
COTS diversity based intrusion detection and application to web servers
E Totel, F Majorczyk, L Me
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
Supporting multiple levels of criticality
E Totel, JP Blanquart, Y Deswarte, D Powell
Digest of Papers. Twenty-Eighth Annual International Symposium on Fault …, 1998
A language driven intrusion detection system for event and alert correlation
E Totel, B Vivinis, L Mé
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
Hypercollecting semantics and its application to static analysis of information flow
M Assaf, DA Naumann, J Signoles, E Totel, F Tronel
ACM SIGPLAN Notices 52 (1), 874-887, 2017
Sec2graph: Network attack detection based on novelty detection on graph structured data
L Leichtnam, E Totel, N Prigent, L Mé
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data
JC Demay, E Totel, F Tronel
2009 Fourth International Conference on Risks and Security of Internet and …, 2009
Detecting attacks against data in web applications
R Ludinard, E Totel, F Tronel, V Nicomette, M Kaâniche, E Alata, R Akrout, ...
2012 7th International Conference on Risks and Security of Internet and …, 2012
Starlord: Linked security data exploration in a 3d graph
L Leichtnam, E Totel, N Prigent, L Mé
2017 IEEE symposium on visualization for cyber security (VizSec), 1-4, 2017
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
F Majorczyk, E Totel, L Mé, A Saidane
SEC, 301-315, 2008
Program transformation for non-interference verification on programs with pointers
M Assaf, J Signoles, F Tronel, E Totel
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
Automatic generation of correlation rules to detect complex attack scenarios
E Godefroy, E Totel, M Hurfin, F Majorczyk
2014 10th International Conference on Information Assurance and Security, 23-28, 2014
A scalable and efficient correlation engine to detect multi-step attacks in distributed systems
D Lanoe, M Hurfin, E Totel
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 31-40, 2018
Inferring a distributed application behavior model for anomaly based intrusion detection
E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche
2016 12th European Dependable Computing Conference (EDCC), 53-64, 2016
Detecting illegal system calls using a data-oriented detection model
JC Demay, F Majorczyk, E Totel, F Tronel
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
Experiments on cots diversity as an intrusion detection and tolerance mechanism
F Majorczyk, É Totel, L Mé
Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant …, 2007
Politique d'intégrité multiniveau pour la protection en ligne de tâches critiques
E Totel
These de Doctorat, Institut National Polytechnique de Toulouse, 1998
Discovering correlations: A formal definition of causal dependency among heterogeneous events
C Xosanavongsa, E Totel, O Bettan
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 340-355, 2019
Forensic analysis of network attacks: restructuring security events as graphs and identifying strongly connected sub-graphs
L Leichtnam, E Totel, N Prigent, L Mé
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Application data consistency checking for anomaly based intrusion detection
O Sarrouy, E Totel, B Jouga
Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009
A dependable intrusion detection architecture based on agreement services
M Hurfin, JP Le Narzul, F Majorczyk, L Mé, A Saidane, E Totel, F Tronel
Lecture notes in computer science 4280, 378, 2006
The system can't perform the operation now. Try again later.
Articles 1–20