Alexandre Dulaunoy
Title
Cited by
Cited by
Year
Malware behaviour analysis
G Wagener, A Dulaunoy
Journal in computer virology 4 (4), 279-287, 2008
1202008
Misp: The design and implementation of a collaborative threat intelligence sharing platform
C Wagner, A Dulaunoy, G Wagener, A Iklody
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
1192016
Self adaptive high interaction honeypots driven by game theory
G Wagener, A Dulaunoy, T Engel
Symposium on Self-Stabilizing Systems, 741-755, 2009
582009
DNSSM: A large scale passive DNS security monitoring framework
S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor
2012 IEEE Network Operations and Management Symposium, 988-993, 2012
302012
Adaptive and self-configurable honeypots
G Wagener, R State, T Engel, A Dulaunoy
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
242011
Towards an estimation of the accuracy of TCP reassembly in network forensics
G Wagener, A Dulaunoy, T Engel
2008 Second International Conference on Future Generation Communication and …, 2008
202008
ASMATRA: Ranking ASs providing transit service to malware hosters
C Wagner, J François, R State, A Dulaunoy, T Engel, G Massen
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
152013
An extended analysis of an IoT malware from a blackhole network
A Dulaunoy, G Wagener, S Mokaddem, C Wagner
Proceedings of the Networking Conference TNC 17, 2017
132017
Heliza: talking dirty to the attackers
G Wagener, A Dulaunoy, T Engel
Journal in computer virology 7 (3), 221-232, 2011
132011
Breaking Tor anonymity with game theory and data mining
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Concurrency and Computation: Practice and Experience 24 (10), 1052-1065, 2012
82012
Game Theory driven monitoring of spatial-aggregated IP-Flow records
C Wagner, G Wagener, R State, T Engel, A Dulaunoy
2010 International Conference on Network and Service Management, 463-468, 2010
62010
OpenSST message format
A Dulaunoy, T Fruru, S Stormacq
Internet Drafts, December, 2002
52002
A XML Schema for the OpenSST message format
A Alexandre Dulaunoy
Internal Conostix document, 2002
52002
OpenSST: Open Simply Secure Transaction
A Dulaunoy, S Stormacq
URL: http://www. foo. be/current/opensst, 2002
52002
AIL-The design and implementation of an Analysis Information Leak framework
S Mokaddem, G Wagener, A Dulaunoy
2018 IEEE International Conference on Big Data (Big Data), 5049-5057, 2018
42018
SDBF: Smart DNS brute-forcer
C Wagner, J François, R State, T Engel, G Wagener, A Dulaunoy
2012 IEEE Network Operations and Management Symposium, 1001-1007, 2012
42012
PeekKernelFlows: Peeking into IP flows
C Wagner, G Wagener, R State, A Dulaunoy, T Engel
Proceedings of the Seventh International Symposium on Visualization for …, 2010
42010
An instrumented analysis of unknown software and malware driven by free libre open source software
G Wagener, A Dulaunoy, T Engel
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
42008
Development and design of a process and a piece of software to analyze unknown software
G Wagener, A Dulaunoy, T Engel
University of Luxembourg, Luxembourg, 2006
42006
Taxonomy driven indicator scoring in MISP threat intelligence platforms
S Mokaddem, G Wagener, A Dulaunoy, A Iklody
arXiv preprint arXiv:1902.03914, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20