Monitoring user authenticity V Amar, J Barlet, M Campora, J El Hayek, R Peicle, O Thonnard, ... US Patent 9,876,825, 2018 | 179 | 2018 |
A framework for attack patterns' discovery in honeynet data O Thonnard, M Dacier digital investigation 5, S128-S139, 2008 | 117 | 2008 |
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 110 | 2012 |
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks PA Vervier, O Thonnard, M Dacier Network and Distributed System Security Symposium (NDSS), 2015 | 109 | 2015 |
Contribution à la surveillance des systèmes de production à l'aide des réseaux de neurones dynamiques: Application à la e-maintenance R Zemouri Université de Franche-Comté, 2003 | 106 | 2003 |
Monitoring user authenticity in distributed system V Amar, J Barlet, R Peicle, O Thonnard, J Zouaoui US Patent 10,110,634, 2018 | 94 | 2018 |
An analysis of rogue AV campaigns M Cova, C Leita, O Thonnard, AD Keromytis, M Dacier International Workshop on Recent Advances in Intrusion Detection, 442-463, 2010 | 89 | 2010 |
That Ain’t You: Blocking Spearphishing Through Behavioral Modelling G Stringhini, O Thonnard DIMVA, 2015 | 80 | 2015 |
Inside the scam jungle: A closer look at 419 scam email operations J Isacenkova, O Thonnard, A Costin, A Francillon, D Balzarotti EURASIP Journal on Information Security 2014, 1-18, 2014 | 68 | 2014 |
An experimental study of diversity with off-the-shelf antivirus engines I Gashi, V Stankovic, C Leita, O Thonnard 2009 Eighth IEEE international symposium on network computing and …, 2009 | 64 | 2009 |
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology O Thonnard, M Dacier 2008 ieee international conference on data mining workshops, 154-163, 2008 | 63 | 2008 |
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 62 | 2008 |
Understanding user behaviour through action sequences: from the usual to the unusual PH Nguyen, C Turkay, G Andrienko, N Andrienko, O Thonnard, J Zouaoui IEEE transactions on visualization and computer graphics 25 (9), 2838-2852, 2018 | 51 | 2018 |
A strategic analysis of spam botnets operations O Thonnard, M Dacier Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011 | 50 | 2011 |
The WOMBAT Attack Attribution method: some results M Dacier, VH Pham, O Thonnard International Conference on Information Systems Security, 19-37, 2009 | 49 | 2009 |
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 45 | 2012 |
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks O Thonnard, L Bilge, A Kashyap, M Lee Financial Cryptography and Data Security, 2015 | 39 | 2015 |
On a multicriteria clustering approach for attack attribution O Thonnard, W Mees, M Dacier ACM SIGKDD Explorations Newsletter 12 (1), 11-20, 2010 | 37 | 2010 |
LDA ensembles for interactive exploration and categorization of behaviors S Chen, N Andrienko, G Andrienko, L Adilova, J Barlet, J Kindermann, ... IEEE transactions on visualization and computer graphics 26 (9), 2775-2792, 2019 | 35 | 2019 |
Visual analytics for BGP monitoring and prefix hijacking identification E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ... IEEE network 26 (6), 33-39, 2012 | 34 | 2012 |