
Véronique Legrand
Professeur Cnam
Bureau : 2, Rue Conté, Bureau 35.1.59 - Accès 35. 75003 - Paris
2024
Non publié
2019
Articles de conférence
- An Ontology for cyber incident root cause analysis from event logs. In 34th IBIMA Conference, Madrid, Spain, 2019. www
2018
Articles de revue
- OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks. In EURASIP Journal on Information Security, 2018 (1): 144-159, 2018. doi www
2017
Articles de conférence
- HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. In 10th international symposium on foundations and practice of security, pages 144-159, Nancy, France, 2017. doi www
2013
Thèses et habilitations
2008
Articles de conférence
- Modeling of Information System Correlated Events Time Dependencies. In NOuvelles TEchnologies de la REpartition, Lyon, France, 2008. www
- A Dangerousness-Based Investigation Model for Security Event Management. In The Third International Conference on Internet Monitoring and Protection, pages 109-118, IEEE Computer Society, Bucharest, Romania, 2008. www
- Préparation des messages de sécurité pour la classification automatique de messages. In Ecol'IA, Hammamet, Tunisia, 2008. www
- Collaborative Approach to Automatic Classification of Heterogeneous Information Security. In International Conference on Emerging Security Information, Systems and Technologies, pages 294-299, Cap-Esterel, France, 2008. www
- Behavioral Intrusion Detection Indicators. In International Information Security Conference, Bertinoro, Italy, 2008. www
- Détection d'Anomalies Comportementales Appliquées `a la Vision Globale. In Inforsid - Integration, interrogation and analysis of LOgs, Fontainebleau, France, 2008. www
- Automatic Classification of Security Messages Based on Text Categorization. In NOuvelles TEchnologies de la REpartition, Lyon, France, 2008. www
2007
Articles de conférence
- Behavioral anomaly detection using Bayesian modelization based on a global vision of the system. In 7ème Conférence Internationale sur les NOuvelles TEchnologies de la REpartition, Marrakech, Morocco, 2007. www
- An Ontology for the Management of Heteregenous Alerts of Information System. In International Conference on Security and Management, Las Vegas, United States, 2007. www
- Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. In International Conference on Emerging Security Information, Systems and Technologies, valencia, Spain, 2007. www
- Enriched Diagnosis and Investigation Models for Security Event Correlation. In International Conference on Internet Monitoring and Protection, pages 1, Silicon Valley, United States, 2007. doi www
Rapports
2006
Articles de conférence
- Modelization and trust establishment in ambient networks. In International Symposium on Intelligent Environment, Cambridge, United Kingdom, 2006. www
- A History-Based Framework to Build Trust Management Systems. In Second International IEEE SECURECOMM Workshop on the Value of Security through Collaboration (SECOVAL 2006), pages 1-8, IEEE, United States, 2006. www
Rapports
- The KAA project: a trust policy point of view. Technical Report RR-5959, INRIA, 2006.
2004
Rapports
- L4.02 : Sécurité et Réseaux Ad Hoc. Technical Report A04-R-045 || bouassida04a, INRIA, 2004.
2003
Rapports
- Trusted Ambient community for self-securing hybrid networks. Technical Report RR-5027, INRIA, 2003.