Nizar KHEIR
Nizar KHEIR
Groupe Renault
Adresse e-mail validée de renault.com
TitreCitée parAnnée
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
European Symposium on Research in Computer Security, 626-642, 2010
1172010
Internet of Things: a definition & taxonomy
B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien
2015 9th International Conference on Next Generation Mobile Applications …, 2015
692015
Cost evaluation for intrusion response using dependency graphs
N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka
2009 International Conference on Network and Service Security, 1-6, 2009
462009
Phisheye: Live monitoring of sandboxed phishing kits
X Han, N Kheir, D Balzarotti
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
402016
Botsuer: Suing stealthy p2p bots in network traffic through netflow analysis
N Kheir, C Wolley
International Conference on Cryptology and Network Security, 162-178, 2013
272013
Response policies and counter-measure: management of service dependencies and intrusion and reaction impacts
N Kheir
Télécom Bretagne, 2010
252010
Strategies for network resilience: Capitalising on policies
P Smith, A Schaeffer-Filho, A Ali, M Schöller, N Kheir, A Mauthe, ...
IFIP International Conference on Autonomous Infrastructure, Management and …, 2010
182010
Analyzing http user agent anomalies for malware detection
N Kheir
Data Privacy Management and Autonomous Spontaneous Security, 187-200, 2012
162012
Behavioral classification and detection of malware through http user agent anomalies
N Kheir
Journal of Information Security and Applications 18 (1), 2-13, 2013
152013
Evaluation of Deception-Based Web Attacks Detection.
X Han, N Kheir, D Balzarotti
MTD@ CCS, 65-73, 2017
122017
A new approach to investigate IoT threats based on a four layer model
B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien
2016 13th International Conference on New Technologies for Distributed …, 2016
122016
Behavioral fine-grained detection and classification of P2P bots
N Kheir, X Han, C Wolley
Journal of Computer Virology and Hacking Techniques 11 (4), 217-233, 2015
122015
Mentor: positive DNS reputation to skim-off benign domains in botnet C&C blacklists
N Kheir, F Tran, P Caron, N Deschamps
IFIP International Information Security Conference, 1-14, 2014
122014
A service dependency modeling framework for policy-based response enforcement
N Kheir, H Debar, F Cuppens, N Cuppens-Boulahia, J Viinikka
International Conference on Detection of Intrusions and Malware, and …, 2009
122009
Blindids: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic
S Canard, A Diop, N Kheir, M Paindavoine, M Sabt
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
112017
The role of cloud services in malicious software: Trends and insights
X Han, N Kheir, D Balzarotti
International Conference on Detection of Intrusions and Malware, and …, 2015
112015
Automated classification of C&C connections through malware URL clustering
N Kheir, G Blanc, H Debar, J Garcia-Alfaro, D Yang
IFIP International Information Security and Privacy Conference, 252-266, 2015
102015
A new risk assessment framework using graph theory for complex ICT systems
MY Naghmouchi, N Perrot, N Kheir, AR Mahjoub, JP Wary
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
92016
Deception Techniques in Computer Security: A Research Perspective
X Han, N Kheir, D Balzarotti
ACM Computing Surveys (CSUR) 51 (4), 80, 2018
82018
Service dependencies in information systems security
H Debar, N Kheir, N Cuppens-Boulahia, F Cuppens
International Conference on Mathematical Methods, Models, and Architectures …, 2010
72010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20