dblp: Sofiane Lagraa https://dblp.org/pid/91/10009.html dblp person page RSS feed Thu, 07 Nov 2024 20:34:39 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Sofiane Lagraahttps://dblp.org/pid/91/10009.html14451 A review on graph-based approaches for network security monitoring and botnet detection.https://doi.org/10.1007/s10207-023-00742-7, , , , , :
A review on graph-based approaches for network security monitoring and botnet detection. Int. J. Inf. Sec. 23(1): 119-140 ()]]>
https://dblp.org/rec/journals/ijisec/LagraaHSVSO24Thu, 01 Feb 2024 00:00:00 +0100
Mobile Application Behaviour Anomaly Detection based on API Calls.https://doi.org/10.1109/BigData55660.2022.10021097, , , , , , :
Mobile Application Behaviour Anomaly Detection based on API Calls. IEEE Big Data : 1892-1899]]>
https://dblp.org/rec/conf/bigdataconf/OtaDLBAHS22Sat, 01 Jan 2022 00:00:00 +0100
A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs.https://doi.org/10.1016/j.patcog.2020.107746, , , :
A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs. Pattern Recognit. 112: 107746 ()]]>
https://dblp.org/rec/journals/pr/KioucheLAS21Fri, 01 Jan 2021 00:00:00 +0100
What database do you choose for heterogeneous security log events analysis?https://ieeexplore.ieee.org/document/9463953, :
What database do you choose for heterogeneous security log events analysis? IM : 812-817]]>
https://dblp.org/rec/conf/im/LagraaS21Fri, 01 Jan 2021 00:00:00 +0100
Event-Driven Interest Detection for Task-Oriented Mobile Apps.https://doi.org/10.1007/978-3-030-94822-1_38, , , , , , :
Event-Driven Interest Detection for Task-Oriented Mobile Apps. MobiQuitous : 582-598]]>
https://dblp.org/rec/conf/mobiquitous/OtaDLBAHS21Fri, 01 Jan 2021 00:00:00 +0100
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries.https://doi.org/10.1145/3407023.3407041, , , , :
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. ARES : 78:1-78:10]]>
https://dblp.org/rec/conf/IEEEares/RiveraGLIS20Wed, 01 Jan 2020 00:00:00 +0100
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection.https://doi.org/10.1109/ICDCS47774.2020.00171, , , :
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection. ICDCS : 1316-1321]]>
https://dblp.org/rec/conf/icdcs/KhramtsovaHLS20Wed, 01 Jan 2020 00:00:00 +0100
ROS-FM: Fast Monitoring for the Robotic Operating System(ROS).https://doi.org/10.1109/ICECCS51672.2020.00029, , , , :
ROS-FM: Fast Monitoring for the Robotic Operating System(ROS). ICECCS : 187-196]]>
https://dblp.org/rec/conf/iceccs/RiveraILJS20Wed, 01 Jan 2020 00:00:00 +0100
Process mining-based approach for investigating malicious login events.https://doi.org/10.1109/NOMS47738.2020.9110301, :
Process mining-based approach for investigating malicious login events. NOMS : 1-5]]>
https://dblp.org/rec/conf/noms/LagraaS20Wed, 01 Jan 2020 00:00:00 +0100
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application.https://doi.org/10.1109/VTC2020-Spring48590.2020.9129461, , , :
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application. VTC Spring : 1-5]]>
https://dblp.org/rec/conf/vtc/AmroucheLFS20Wed, 01 Jan 2020 00:00:00 +0100
Deep mining port scans from darknet.https://doi.org/10.1002/nem.2065, , :
Deep mining port scans from darknet. Int. J. Netw. Manag. 29(3) ()]]>
https://dblp.org/rec/journals/ijnm/LagraaCF19Tue, 01 Jan 2019 00:00:00 +0100
Une nouvelle approche pour la détection d'anomalies dans les flux de graphes hétérogènes.https://editions-rnti.fr/?inprocid=1002472, , , :
Une nouvelle approche pour la détection d'anomalies dans les flux de graphes hétérogènes. EGC : 93-104]]>
https://dblp.org/rec/conf/f-egc/KioucheASL19Tue, 01 Jan 2019 00:00:00 +0100
Graph-based malicious login events investigation.https://ieeexplore.ieee.org/document/8717788, , , :
Graph-based malicious login events investigation. IM : 63-66]]>
https://dblp.org/rec/conf/im/AmroucheLKS19Tue, 01 Jan 2019 00:00:00 +0100
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application.https://doi.org/10.1109/IRC.2019.00023, , , , :
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application. IRC : 102-109]]>
https://dblp.org/rec/conf/irc/LagraaCRBS19Tue, 01 Jan 2019 00:00:00 +0100
ROSploit: Cybersecurity Tool for ROS.https://doi.org/10.1109/IRC.2019.00077, , :
ROSploit: Cybersecurity Tool for ROS. IRC : 415-416]]>
https://dblp.org/rec/conf/irc/RiveraLS19Tue, 01 Jan 2019 00:00:00 +0100
Auto-Encoding Robot State Against Sensor Spoofing Attacks.https://doi.org/10.1109/ISSREW.2019.00080, , , :
Auto-Encoding Robot State Against Sensor Spoofing Attacks. ISSRE Workshops : 252-257]]>
https://dblp.org/rec/conf/issre/RiveraLIS19Tue, 01 Jan 2019 00:00:00 +0100
Auto Semi-supervised Outlier Detection for Malicious Authentication Events.https://doi.org/10.1007/978-3-030-43887-6_14, , , :
Auto Semi-supervised Outlier Detection for Malicious Authentication Events. PKDD/ECML Workshops (2) : 176-190]]>
https://dblp.org/rec/conf/pkdd/KaiafasHLS19Tue, 01 Jan 2019 00:00:00 +0100
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.https://doi.org/10.1109/SPW.2019.00030, , , , :
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. IEEE Symposium on Security and Privacy Workshops : 114-119]]>
https://dblp.org/rec/conf/sp/RiveraLNBS19Tue, 01 Jan 2019 00:00:00 +0100
Detecting malicious authentication events trustfully.https://doi.org/10.1109/NOMS.2018.8406295, , , , , , :
Detecting malicious authentication events trustfully. NOMS : 1-6]]>
https://dblp.org/rec/conf/noms/KaiafasVLSNRO18Mon, 01 Jan 2018 00:00:00 +0100
BotGM: Unsupervised graph mining to detect botnets in traffic flows.https://doi.org/10.1109/CSNET.2017.8241990, , , , , :
BotGM: Unsupervised graph mining to detect botnets in traffic flows. CSNet : 1-8]]>
https://dblp.org/rec/conf/csnet/LagraaFLMHS17Sun, 01 Jan 2017 00:00:00 +0100
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.https://doi.org/10.1007/978-3-319-75650-9_10, , , , , , , , , , , , :
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. FPS : 144-159]]>
https://dblp.org/rec/conf/fps/NavarroLLFLSFLH17Sun, 01 Jan 2017 00:00:00 +0100
Knowledge discovery of port scans from darknet.https://doi.org/10.23919/INM.2017.7987415, :
Knowledge discovery of port scans from darknet. IM : 935-940]]>
https://dblp.org/rec/conf/im/LagraaF17Sun, 01 Jan 2017 00:00:00 +0100
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.https://ceur-ws.org/Vol-1941/MIDAS2017_paper7.pdf, , , :
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining. MIDAS@PKDD/ECML : 31-42]]>
https://dblp.org/rec/conf/pkdd/CharlierLSF17Sun, 01 Jan 2017 00:00:00 +0100
An efficient exact algorithm for triangle listing in large graphs.https://doi.org/10.1007/s10618-016-0451-4, :
An efficient exact algorithm for triangle listing in large graphs. Data Min. Knowl. Discov. 30(5): 1350-1369 ()]]>
https://dblp.org/rec/journals/datamine/LagraaS16Fri, 01 Jan 2016 00:00:00 +0100
Comparison Issues in Large Graphs: State of the Art and Future Directions.http://arxiv.org/abs/1502.07576, , :
Comparison Issues in Large Graphs: State of the Art and Future Directions. CoRR abs/1502.07576 ()]]>
https://dblp.org/rec/journals/corr/SebaLR15Thu, 01 Jan 2015 00:00:00 +0100
New MP-SoC profiling tools based on data mining techniques. (Nouveaux outils de profilage de MP-SoC basés sur des techniques de fouille de données).https://tel.archives-ouvertes.fr/tel-01548913:
New MP-SoC profiling tools based on data mining techniques. (Nouveaux outils de profilage de MP-SoC basés sur des techniques de fouille de données). Grenoble Alpes University, France, ]]>
https://dblp.org/rec/phd/hal/Lagraa14Wed, 01 Jan 2014 00:00:00 +0100
A distance measure for large graphs based on prime graphs.https://doi.org/10.1016/j.patcog.2014.03.014, , , , :
A distance measure for large graphs based on prime graphs. Pattern Recognit. 47(9): 2993-3005 ()]]>
https://dblp.org/rec/journals/pr/LagraaSKMK14Wed, 01 Jan 2014 00:00:00 +0100
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces.https://doi.org/10.7873/DATE.2014.199, , :
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces. DATE : 1-6]]>
https://dblp.org/rec/conf/date/LagraaTP14Wed, 01 Jan 2014 00:00:00 +0100
Data mining MPSoC simulation traces to identify concurrent memory access patterns.https://doi.org/10.7873/DATE.2013.161, , :
Data mining MPSoC simulation traces to identify concurrent memory access patterns. DATE : 755-760]]>
https://dblp.org/rec/conf/date/LagraaTP13Tue, 01 Jan 2013 00:00:00 +0100
Alliance-based clustering scheme for group key management in mobile ad hoc networks.https://doi.org/10.1007/s11227-011-0607-3, , :
Alliance-based clustering scheme for group key management in mobile ad hoc networks. J. Supercomput. 61(3): 481-501 ()]]>
https://dblp.org/rec/journals/tjs/SebaLK12Sun, 01 Jan 2012 00:00:00 +0100
Automatic congestion detection in MPSoC programs using data mining on simulation traces.https://doi.org/10.1109/RSP.2012.6380692, , :
Automatic congestion detection in MPSoC programs using data mining on simulation traces. RSP : 64-70]]>
https://dblp.org/rec/conf/rsp/LagraaTP12Sun, 01 Jan 2012 00:00:00 +0100
Matchmaking OWL-S processes: an approach based on path signatures.https://doi.org/10.1145/2077489.2077521, , :
Matchmaking OWL-S processes: an approach based on path signatures. MEDES : 169-176]]>
https://dblp.org/rec/conf/medes/LagraaSK11Sat, 01 Jan 2011 00:00:00 +0100
A Graph Decomposition Approach to Web Service Matchmaking.https://dblp.org/pid/91/10009.html, , , :
A Graph Decomposition Approach to Web Service Matchmaking. WEBIST : 31-40]]>
https://dblp.org/rec/conf/webist/LagraaSKK11Sat, 01 Jan 2011 00:00:00 +0100
Web Service Matchmaking by Subgraph Matching.https://doi.org/10.1007/978-3-642-28082-5_4, , :
Web Service Matchmaking by Subgraph Matching. WEBIST (Selected Papers) : 43-56]]>
https://dblp.org/rec/conf/webist/SebaLK11Sat, 01 Jan 2011 00:00:00 +0100
  NODES