Grégoire Jacob
Grégoire Jacob
Telecom SudParis / LastLine
Adresse e-mail validée de lastline.com
Titre
Citée par
Citée par
Année
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
8th International Symposium on Visualization for Cyber Security, 4, 2011
4632011
Behavioral detection of malware: from a survey towards an established taxonomy
G Jacob, H Debar, E Filiol
Journal in computer Virology 4 (3), 251-266, 2008
2352008
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic
G Jacob, R Hund, C Kruegel, T Holz
USENIX Security Symposium, 2011
1512011
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples
G Jacob, PM Comparetti, M Neugschwandtner, C Krügel, G Vigna
9th Conference on Detection of Intrusions and Malware and Vulnerability …, 2012
822012
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
E Filiol, G Jacob, M Le Liard
Journal in Computer Virology 3 (1), 23-37, 2007
662007
EVILCOHORT: detecting communities of malicious accounts on online services
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
24th USENIX Security Symposium (USENIX Security 15), 563-578, 2015
602015
Malware behavioral detection by attribute-automata using abstraction from platform and language
G Jacob, H Debar, E Filiol
12th Symposium on Recent Advances in Intrusion Detection, 81-100, 2009
54*2009
PUBCRAWL: Protecting Users and Businesses from CRAWLers
G Jacob, E Kirda, C Kruegel, G Vigna
USENIX Security Symposium, 2012
492012
FORECAST: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
27th Annual Computer Security Applications Conference, 11-20, 2011
362011
Individual countermeasure selection based on the return on response investment index
G Gonzalez Granadillo, H Débar, G Jacob, C Gaber, M Achemlal
6th International Conference on Mathematical Methods, Models and …, 2012
352012
RORI-based countermeasure selection using the OrBAC formalism
GG Granadillo, M Belhaouane, H Debar, G Jacob
International Journal of Information Security 13 (1), 63-79, 2014
262014
Malware as interaction machines: a new framework for behavior modelling
G Jacob, E Filiol, H Debar
Journal in Computer Virology 4 (3), 235-250, 2008
242008
Formalization of viruses and malware through process algebras
G Jacob, E Filiol, H Debar
4th Workshop on Advances in Information Security, Satellite of ARES, 597-602, 2010
23*2010
Functional polymorphic engines: formalisation, implementation and use cases
G Jacob, E Filiol, H Debar
Journal in computer virology 5 (3), 247-261, 2009
182009
Combination approach to select optimal countermeasures based on the RORI Index
GDG GRANADILLO, G Jacob, H DEBAR, L COPPOLINO
INTECH'12: Second International Conference on Innovative Computing …, 2012
162012
Limitation of honeypot/honeynet databases to enhance alert correlation
Y Mustapha, H Débar, G Jacob
6th International Conference on Mathematical Methods, Models and …, 2012
122012
Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report VRL, ECE, 2010
72010
Attack Volume Model: Geometrical Approach and Application
GG Granadillo, G Jacob, H Debar
International Conference on Risks and Security of Internet and Systems, 242-257, 2015
42015
Malware Behavioral Models: Bridging Abstract and Operational Virology
G Jacob
PhD thesis, Université de Rennes, 2009
22009
ForeCast
MN Neugschwandtner, PM Comparek, G Jacob, C Kruegel
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20