URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures (English)
- New search for: Besson, Pierre-Victor
- New search for: Tong, Valérie Viet Triem
- New search for: Guette, Gilles
- New search for: Piolle, Guillaume
- New search for: Abgrall, Erwan
- New search for: Mosbah, Mohamed
- New search for: Sèdes, Florence
- New search for: Tawbi, Nadia
- New search for: Ahmed, Toufik
- New search for: Boulahia-Cuppens, Nora
- New search for: Garcia-Alfaro, Joaquin
- New search for: Besson, Pierre-Victor
- New search for: Tong, Valérie Viet Triem
- New search for: Guette, Gilles
- New search for: Piolle, Guillaume
- New search for: Abgrall, Erwan
In:
Foundations and Practice of Security
: 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I
;
Chapter: 8
;
123-138
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
-
Additional title:Lect.Notes Computer
-
Contributors:Mosbah, Mohamed ( editor ) / Sèdes, Florence ( editor ) / Tawbi, Nadia ( editor ) / Ahmed, Toufik ( editor ) / Boulahia-Cuppens, Nora ( editor ) / Garcia-Alfaro, Joaquin ( editor ) / Besson, Pierre-Victor ( author ) / Tong, Valérie Viet Triem ( author ) / Guette, Gilles ( author ) / Piolle, Guillaume ( author )
-
Conference:International Symposium on Foundations and Practice of Security ; 2023 ; Bordeaux, France
-
Published in:Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I ; Chapter: 8 ; 123-138Lecture Notes in Computer Science ; 14551 ; 123-138
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-04-25
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An Adversarial Robustness Benchmark for Enterprise Network Intrusion DetectionVitorino, João / Silva, Miguel / Maia, Eva / Praça, Isabel et al. | 2024
- 2
-
Securing Smart Vehicles Through Federated LearningHalim, Sadaf MD / Hossain, Md Delwar / Khan, Latifur / Singhal, Anoop / Inoue, Hiroyuki / Ochiai, Hideya / Hamlen, Kevin W. / Kadobayashi, Youki et al. | 2024
- 3
-
Using Reed-Muller Codes for Classification with Rejection and RecoveryFentham, Daniel / Parker, David / Ryan, Mark et al. | 2024
- 4
-
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet InspectionAurora, Victor / Neal, Christopher / Proulx, Alexandre / Boulahia Cuppens, Nora / Cuppens, Frédéric et al. | 2024
- 5
-
Practices for Assessing the Security Level of Solidity Smart ContractsMekkouri, Mohamed / Hennebert, Christine et al. | 2024
- 6
-
Effectiveness of Binary-Level CFI TechniquesVaidya, Ruturaj K. / Kulkarni, Prasad A. et al. | 2024
- 7
-
A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small DatasetsBar-on, Maxwel / Bezawada, Bruhadeshwar / Ray, Indrakshi / Ray, Indrajit et al. | 2024
- 8
-
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range ArchitecturesBesson, Pierre-Victor / Tong, Valérie Viet Triem / Guette, Gilles / Piolle, Guillaume / Abgrall, Erwan et al. | 2024
- 9
-
Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?Sawaya, Yukiko / Sano, Ayane / Isohara, Takamasa / Yamada, Akira / Komatsu, Ayako et al. | 2024
- 10
-
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious TweetsDzeha, Eric Edem / Jourdan, Guy-Vincent et al. | 2024
- 11
-
Web Scams Detection SystemBadawi, Emad / Jourdan, Guy-Vincent / Onut, Iosif-Viorel et al. | 2024
- 12
-
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary CodesZamani, Mahmoud / Irtiza, Saquib / Khan, Latifur / Hamlen, Kevin W. et al. | 2024
- 13
-
Analysis of Cryptographic CVEs: Lessons Learned and PerspectivesKhoury, Raphaël / Bolduc, Jérémy / Lafrenière-Nickopoulos, Jason / Odedele, Abdel-Gany et al. | 2024
- 14
-
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident ReportsBekhouche, Mohamed El Amine / Adi, Kamel et al. | 2024
- 15
-
Enhancing Code Security Through Open-Source Large Language Models: A Comparative StudyRidley, Norah / Branca, Enrico / Kimber, Jadyn / Stakhanova, Natalia et al. | 2024
- 16
-
Green-Fuzz: Efficient Fuzzing for Network Protocol ImplementationsAndarzian, Seyed Behnam / Daniele, Cristian / Poll, Erik et al. | 2024
- 17
-
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-RansomwareFaghihi, Farnood / Zulkernine, Mohammad / Ding, Steven et al. | 2024
- 18
-
Automated Attacker Behaviour Classification Using Threat Intelligence InsightsCrochelet, Pierre / Neal, Christopher / Boulahia Cuppens, Nora / Cuppens, Frédéric / Proulx, Alexandre et al. | 2024
- 19
-
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful FirewallsKoribeche, Wassim / Espes, David / Morin, Cédric et al. | 2024
- 20
-
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious CodeCassagne, Julien / Merlo, Ettore / Jourdan, Guy-Vincent / Onut, Iosif-Viorel et al. | 2024
- 21
-
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angrLucca, Serena / Crochet, Christophe / Bertrand Van Ouytsel, Charles-Henry / Legay, Axel et al. | 2024
- 22
-
Original Entry Point Detection Based on Graph SimilarityPham, Thanh-Hung / Ogawa, Mizuhito et al. | 2024
- 23
-
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack CountermeasureBrisfors, Martin / Moraitis, Michail / Landin, Gabriel Klasson / Jilborg, Truls et al. | 2024
- 24
-
Hardening Systems Against Data Corruption Attacks at Design TimeBreton, John / Jaskolka, Jason / Yee, George O. M. et al. | 2024
- 25
-
Design of an Efficient Distributed Delivery Service for Group Key Agreement ProtocolsPaillat, Ludovic / Ignat, Claudia-Lavinia / Frey, Davide / Turuani, Mathieu / Ismail, Amine et al. | 2024
- 26
-
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation AlgorithmWang, Ruize / Dubrova, Elena et al. | 2024
- 27
-
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized ResponseBiswas, Sayan / Jung, Kangsoo / Palamidessi, Catuscia et al. | 2024