Follow
Grégoire Jacob
Grégoire Jacob
Telecom SudParis / LastLine
Verified email at lastline.com
Title
Cited by
Cited by
Year
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
8th International Symposium on Visualization for Cyber Security, 4, 2011
13242011
Behavioral detection of malware: from a survey towards an established taxonomy
G Jacob, H Debar, E Filiol
Journal in computer Virology 4 (3), 251-266, 2008
3142008
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic
G Jacob, R Hund, C Kruegel, T Holz
USENIX Security Symposium, 2011
1992011
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples
G Jacob, PM Comparetti, M Neugschwandtner, C Krügel, G Vigna
9th Conference on Detection of Intrusions and Malware and Vulnerability …, 2012
1062012
EVILCOHORT: detecting communities of malicious accounts on online services
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
24th USENIX Security Symposium (USENIX Security 15), 563-578, 2015
1012015
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
E Filiol, G Jacob, M Le Liard
Journal in Computer Virology 3 (1), 23-37, 2007
762007
PUBCRAWL: Protecting Users and Businesses from CRAWLers
G Jacob, E Kirda, C Kruegel, G Vigna
USENIX Security Symposium, 2012
702012
Malware behavioral detection by attribute-automata using abstraction from platform and language
G Jacob, H Debar, E Filiol
12th Symposium on Recent Advances in Intrusion Detection, 81-100, 2009
58*2009
Individual countermeasure selection based on the return on response investment index
G Gonzalez Granadillo, H Débar, G Jacob, C Gaber, M Achemlal
6th International Conference on Mathematical Methods, Models and …, 2012
502012
FORECAST: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
27th Annual Computer Security Applications Conference, 11-20, 2011
442011
RORI-based countermeasure selection using the OrBAC formalism
GG Granadillo, M Belhaouane, H Debar, G Jacob
International Journal of Information Security 13 (1), 63-79, 2014
332014
Formalization of viruses and malware through process algebras
G Jacob, E Filiol, H Debar
4th Workshop on Advances in Information Security, Satellite of ARES, 597-602, 2010
26*2010
Malware as interaction machines: a new framework for behavior modelling
G Jacob, E Filiol, H Debar
Journal in Computer Virology 4 (3), 235-250, 2008
262008
Functional polymorphic engines: formalisation, implementation and use cases
G Jacob, E Filiol, H Debar
Journal in computer virology 5 (3), 247-261, 2009
232009
Combination approach to select optimal countermeasures based on the RORI Index
GDG GRANADILLO, G Jacob, H DEBAR, L COPPOLINO
INTECH'12: Second International Conference on Innovative Computing …, 2012
182012
Limitation of honeypot/honeynet databases to enhance alert correlation
Y Mustapha, H Débar, G Jacob
6th International Conference on Mathematical Methods, Models and …, 2012
152012
Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report VRL, ECE, 2010
132010
Attack Volume Model: Geometrical Approach and Application
GG Granadillo, G Jacob, H Debar
International Conference on Risks and Security of Internet and Systems, 242-257, 2015
42015
Malware Behavioral Models: Bridging Abstract and Operational Virology
G Jacob
PhD thesis, Université de Rennes, 2009
22009
ForeCast
MN Neugschwandtner, PM Comparek, G Jacob, C Kruegel
The system can't perform the operation now. Try again later.
Articles 1–20