Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots C Leita, M Dacier, F Massicotte Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 117 | 2006 |
Automatic evaluation of intrusion detection systems F Massicotte, F Gagnon, Y Labiche, L Briand, M Couture 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 361-370, 2006 | 84 | 2006 |
Didroid: Android malware classification and characterization using deep image learning A Rahali, AH Lashkari, G Kaur, L Taheri, F Gagnon, F Massicotte Proceedings of the 2020 10th International Conference on Communication and …, 2020 | 79 | 2020 |
EntropLyzer: Android malware classification and characterization using entropy analysis of dynamic characteristics DS Keyes, B Li, G Kaur, AH Lashkari, F Gagnon, F Massicotte 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big …, 2021 | 67 | 2021 |
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. F Massicotte, M Couture, Y Labiche, L Briand PST, 2005 | 41 | 2005 |
Passive network discovery for real time situation awareness A De Montigny-Leboeuf, F Massicotte Proceedings of the The RTO Information Systems Technology Panel (IST …, 2004 | 38 | 2004 |
Using contextual information for ids alarm classification F Gagnon, F Massicotte, B Esfandiari Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009 | 26 | 2009 |
Toward automatic generation of intrusion detection verification rules F Massicotte, Y Labiche, LC Briand 2008 Annual Computer Security Applications Conference (ACSAC), 279-288, 2008 | 16 | 2008 |
An analysis of signature overlaps in Intrusion Detection Systems F Massicotte, Y Labiche 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 14 | 2011 |
Specification-based testing of intrusion detection engines using logical expression testing criteria F Massicotte, Y Labiche 2010 10th International Conference on Quality Software, 102-111, 2010 | 11 | 2010 |
On the verification and validation of signature-based, network intrusion detection systems F Massicotte, Y Labiche 2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012 | 10 | 2012 |
Model-driven, network-context sensitive intrusion detection F Massicotte, M Couture, L Briand, Y Labiche Model Driven Engineering Languages and Systems: 10th International …, 2007 | 10 | 2007 |
Network Mapping Tool for Real-Time Security Analysis F Massicotte, T Whalen, C Bilodeau Proceeding of NATO/RTO Information Systems Technology Panel Symposium on …, 2002 | 10 | 2002 |
Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security F Massicotte, M Couture Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 9 | 2011 |
Revisiting static analysis of android malware F Gagnon, F Massicotte 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017 | 6 | 2017 |
A testing model for dynamic malware analysis systems F Massicotte, M Couture, H Normandin, F Michaud 2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012 | 6 | 2012 |
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. M Couture, B Ktari, M Mejri, F Massicotte PST, 175-179, 2004 | 6 | 2004 |
Using a vmware network infrastructure to collect traffic traces for intrusion detection evaluation F Massicotte, M Couture, A De Montigny-Leboeuf Proceedings of the 21st Annual Computer Security Applications Conference, 2005 | 5 | 2005 |
On the Effectiveness of Target Configuration as Contextual Information for IDS Alarm Classification F Gagnon, F Massicotte, B Esfandiari Technical Report SCE-08-08, Department of Systems and Computer Engineering …, 2008 | 4 | 2008 |
Using object-oriented modeling for specifying and designing a network-context sensitive intrusion detection system F Massicotte Carleton University, 2005 | 4 | 2005 |