What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ludovic Mé
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurosp
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation.
Adrien Schoen
Gregory Blanc
Pierre-François Gimenez
Yufei Han
Frédéric Majorczyk
Ludovic Mé
2020
conf/eurosp
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs.
Laetitia Leichtnam
Eric Totel
Nicolas Prigent
Ludovic Mé
2013
conf/iciss
Secure States versus Secure Executions - From Access Control to Flow Control.
Mathieu Jaume
Radoniaina Andriatsimandefitra
Valérie Viet Triem Tong
Ludovic Mé
2011
conf/iciss
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows.
Mathieu Jaume
Valérie Viet Triem Tong
Ludovic Mé
2008
conf/sec
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.
Frédéric Majorczyk
Eric Totel
Ludovic Mé
Ayda Saïdane
2006
conf/ccs
Time series modeling for IDS alert management.
Jouni Viinikka
Hervé Debar
Ludovic Mé
Renaud Séguier
2004
conf/sec
A Language Driven IDS for Event and Alert Correlation.
Eric Totel
Bernard Vivinis
Ludovic Mé
2004
conf/acsac
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic.
Elvis Tombini
Hervé Debar
Ludovic Mé
Mireille Ducassé
2003
conf/esorics
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.
Jacob Zimmermann
Ludovic Mé
Christophe Bidan
2003
conf/acsac
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model.
Jacob Zimmermann
Ludovic Mé
Christophe Bidan
2001
conf/sec
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.
Cédric Michel
Ludovic Mé
Coauthors
Adrien Schoen
(1)
Ayda Saïdane
(1)
Bernard Vivinis
(1)
Cédric Michel
(1)
Christophe Bidan
(2)
Elvis Tombini
(1)
Eric Totel
(3)
Frédéric Majorczyk
(2)
Gregory Blanc
(1)
Hervé Debar
(2)
Jacob Zimmermann
(2)
Jouni Viinikka
(1)
Laetitia Leichtnam
(1)
Ludovic Mé
(11)
Mathieu Jaume
(2)
Mireille Ducassé
(1)
Nicolas Prigent
(1)
Pierre-François Gimenez
(1)
Radoniaina Andriatsimandefitra
(1)
Renaud Séguier
(1)
Valérie Viet Triem Tong
(2)
Yufei Han
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to