Olivier Thonnard
Olivier Thonnard
Security Architect, Amadeus
Bestätigte E-Mail-Adresse bei amadeus.com
Titel
Zitiert von
Zitiert von
Jahr
A framework for attack patterns' discovery in honeynet data
O Thonnard, M Dacier
digital investigation 5, S128-S139, 2008
1082008
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
International workshop on recent advances in intrusion detection, 64-85, 2012
882012
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, AD Keromytis, M Dacier
International Workshop on Recent Advances in Intrusion Detection, 442-463, 2010
752010
Internet security threat report
P Wood, B Nahorney, K Chandrasekar, S Wallace, K Haley
2011 17, 2016
572016
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
PA Vervier, O Thonnard, M Dacier
Network and Distributed System Security Symposium (NDSS), 2015
492015
An experimental study of diversity with off-the-shelf antivirus engines
I Gashi, V Stankovic, C Leita, O Thonnard
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
462009
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
462008
Real-time visual analytics for event data streams
F Fischer, F Mansmann, DA Keim
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 801-806, 2012
432012
A strategic analysis of spam botnets operations
O Thonnard, M Dacier
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
432011
Inside the scam jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, A Francillon, D Balzarotti
EURASIP Journal on Information Security 2014 (1), 4, 2014
412014
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes
F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard
Proceedings of the ninth international symposium on visualization for cyber …, 2012
352012
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
O Thonnard, M Dacier
2008 IEEE International Conference on Data Mining Workshops, 154-163, 2008
352008
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
332009
That Ain’t You: Blocking Spearphishing Through Behavioral Modelling
G Stringhini, O Thonnard
DIMVA, 2015
322015
On a multicriteria clustering approach for attack attribution
O Thonnard, W Mees, M Dacier
ACM SIGKDD Explorations Newsletter 12 (1), 11-20, 2010
292010
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks
O Thonnard, L Bilge, A Kashyap, M Lee
Financial Cryptography and Data Security, 2015
272015
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE network 26 (6), 33-39, 2012
272012
Visual spam campaigns analysis using abstract graphs representation
O Tsigkas, O Thonnard, D Tzovaras
Proceedings of the ninth international symposium on visualization for cyber …, 2012
232012
A multi-criteria clustering approach to support attack attribution in cyberspace
O Thonnard
PhD thesis, École Doctorale d’Informatique, Télécommunications et …, 2010
232010
Determining the k in k-means with MapReduce
T Debatty, P Michiardi, W Mees, O Thonnard
Algorithms for MapReduce and Beyond, 2014
212014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20