Menu:
Cyber Defense
Members
Activities
Research projects
Publications
- Thibault Debatty.
Design and analysis of distributed k-nearest neighbors graph
algorithms.
PhD thesis, Royal Military Academy and Telecom ParisTech, October 2018.
- Wim Mees and Thibault
Debatty.
An attempt at defining cyberdefense situation awareness in the context of
command & control.
In 2015 International Conference on Military Communications and
Information Systems (ICMCIS), pages 1-9. IEEE, May 2015.
- T Debatty, W Mees,
P Michiardi, and O Thonnard.
Determining
the k in k-means with mapreduce.
In CEUR Workshop Proceedings, volume 1133, pages 19-28, 2014.
- Thibault Debatty,
Pietro Michiardi, Olivier Thonnard, and Wim Mees.
Building
k-nn graphs from large text data.
In IEEE International Conference on Big Data, pages 573-578.
IEEE, October 2014.
- Thibault Debatty,
Pietro Michiardi, Olivier Thonnard, and Wim Mees.
Scalable
Graph Building from Text Data.
In Proceedings of the 3rd International Workshop on Big Data, Streams and
Heterogeneous Source Mining: Algorithms, Systems, Programming Models and
Applications, 2014.
- Wim Mees and Thibault
Debatty.
Multi-agent
System for APT Detection.
In IEEE International Symposium on Software Reliability Engineering
Workshops, pages 401-406. IEEE, November 2014.
- Olivier Thonnard.
A multi-criteria clustering approach
to support attack attribution in cyberspace.
PhD thesis, Ecole Nationale Supérieure des
Télécommunications, 2010.
- O Thonnard, W Mees,
and M Dacier.
Addressing
the attack attribution problem using knowledge discovery and multi-criteria
fuzzy decision-making.
In Proceedings of the ACM SIGKDD Workshop on CyberSecurity and
Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09, pages
11-21, 2009.
- Olivier Thonnard,
Wim Mees, and Marc Dacier.
Behavioral Analysis of Zombie
Armies.
In The Virtual Battlefield: Perspectives on Cyber Warfare, pages
191-210. IOS Press, 2009.
- Wim Mees.
Risk
management in coalition networks.
In Third International Symposium on Information Assurance and
Security, pages 329-336. IEEE, August 2007.