default search action
Olivier Thonnard
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c35]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns. EuroS&P Workshops 2023: 501-512 - [c34]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Poster: The Impact of the Client Environment on Residential IP Proxies Detection. IMC 2023: 712-713 - [c33]Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements. TMA 2023: 1-4 - 2022
- [c32]Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Mattias Mattsson, Vincent Rigal:
An industrial perspective on web scraping characteristics and open issues. DSN (Supplements) 2022: 5-8 - [c31]Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Vincent Rigal:
BADPASS: Bots Taking ADvantage of Proxy as a Service. ISPEC 2022: 327-344 - 2020
- [j9]Phong H. Nguyen, Rafael Henkin, Siming Chen, Natalia V. Andrienko, Gennady L. Andrienko, Olivier Thonnard, Cagatay Turkay:
VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics. IEEE Trans. Vis. Comput. Graph. 26(1): 77-86 (2020) - [j8]Siming Chen, Natalia V. Andrienko, Gennady L. Andrienko, Linara Adilova, Jérémie Barlet, Jörg Kindermann, Phong H. Nguyen, Olivier Thonnard, Cagatay Turkay:
LDA Ensembles for Interactive Exploration and Categorization of Behaviors. IEEE Trans. Vis. Comput. Graph. 26(9): 2775-2792 (2020) - [c30]Elisa Chiapponi, Marc Dacier, Massimiliano Todisco, Onur Catakoglu, Olivier Thonnard:
Botnet Sizes: When Maths Meet Myths. ICSOC Workshops 2020: 596-611
2010 – 2019
- 2019
- [j7]Phong H. Nguyen, Cagatay Turkay, Gennady L. Andrienko, Natalia V. Andrienko, Olivier Thonnard, Jihane Zouaoui:
Understanding User Behaviour through Action Sequences: From the Usual to the Unusual. IEEE Trans. Vis. Comput. Graph. 25(9): 2838-2852 (2019) - [c29]Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp:
System Misuse Detection Via Informed Behavior Clustering and Modeling. DSN Workshops 2019: 15-23 - [i2]Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp:
System Misuse Detection via Informed Behavior Clustering and Modeling. CoRR abs/1907.00874 (2019) - 2018
- [c28]Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Frances V. Buontempo, Ilir Gashi, Alysson Bessani:
Using Diverse Detectors for Detecting Malicious Web Scraping Activity. DSN Workshops 2018: 67-68 - [c27]Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Alysson Bessani, Frances V. Buontempo, Ilir Gashi:
Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors. PRDC 2018: 269-278 - [c26]Siming Chen, Shuai Chen, Natalia V. Andrienko, Gennady L. Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan:
User Behavior Map: Visual Exploration for Cyber Security Session Data. VizSEC 2018: 1-4 - 2017
- [c25]Phong H. Nguyen, Cagatay Turkay, Gennady L. Andrienko, Natalia V. Andrienko, Olivier Thonnard:
A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis. EuroVA@EuroVis 2017: 67-71 - 2016
- [j6]Olivier Thonnard, Pierre-Antoine Vervier, Marc Dacier:
Spammers operations: a multifaceted strategic analysis. Secur. Commun. Networks 9(4): 336-356 (2016) - [c24]Antonio Pecchia, Olivier Thonnard:
Introduction to RSDA 2016. DSN Workshops 2016: 47 - [c23]Remi Domingues, Francesco Buonora, Romain Senesi, Olivier Thonnard:
An Application of Unsupervised Fraud Detection to Passenger Name Records. DSN Workshops 2016: 54-59 - 2015
- [c22]Gianluca Stringhini, Olivier Thonnard:
That Ain't You: Blocking Spearphishing Through Behavioral Modelling. DIMVA 2015: 78-97 - [c21]Olivier Thonnard, Leyla Bilge, Anand Kashyap, Martin Lee:
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks. Financial Cryptography 2015: 13-31 - [c20]Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier:
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. NDSS 2015 - 2014
- [j5]Michael Behrisch, James Davey, Fabian Fischer, Olivier Thonnard, Tobias Schreck, Daniel A. Keim, Jörn Kohlhammer:
Visual Analysis of Sets of Heterogeneous Matrices Using Projection-Based Distance Functions and Semantic Zoom. Comput. Graph. Forum 33(3): 411-420 (2014) - [j4]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon, Davide Balzarotti:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. EURASIP J. Inf. Secur. 2014: 4 (2014) - [c19]Thibault Debatty, Pietro Michiardi, Olivier Thonnard, Wim Mees:
Building k-nn graphs from large text data. IEEE BigData 2014: 573-578 - [c18]Yun Shen, Olivier Thonnard:
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications. IEEE BigData 2014: 627-635 - [c17]Thibault Debatty, Pietro Michiardi, Wim Mees, Olivier Thonnard:
Determining the k in k-means with MapReduce. EDBT/ICDT Workshops 2014: 19-28 - [c16]Pierre-Antoine Vervier, Quentin Jacquemart, Johann Schlamp, Olivier Thonnard, Georg Carle, Guillaume Urvoy-Keller, Ernst W. Biersack, Marc Dacier:
Malicious BGP hijacks: Appearances can be deceiving. ICC 2014: 884-889 - [c15]Thibault Debatty, Pietro Michiardi, Olivier Thonnard, Wim Mees:
Scalable Graph Building from Text Data. BigMine 2014: 120-132 - [c14]Fabian Fischer, James Davey, Johannes Fuchs, Olivier Thonnard, Jörn Kohlhammer, Daniel A. Keim:
A Visual Analytics Field Experiment to Evaluate Alternative Visualizations for Cyber Security Applications. EuroVA@EuroVis 2014 - [i1]Gianluca Stringhini, Olivier Thonnard:
That Ain't You: Detecting Spearphishing Emails Before They Are Sent. CoRR abs/1410.6629 (2014) - 2013
- [c13]Pierre-Antoine Vervier, Olivier Thonnard:
SpamTracer: How stealthy are spammers? INFOCOM Workshops 2013: 453-458 - [c12]Pierre-Antoine Vervier, Olivier Thonnard:
SpamTracer: How stealthy are spammers? INFOCOM 2013: 3477-3482 - [c11]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. IEEE Symposium on Security and Privacy Workshops 2013: 143-150 - 2012
- [j3]Ernst W. Biersack, Quentin Jacquemart, Fabian Fischer, Johannes Fuchs, Olivier Thonnard, Georgios Theodoridis, Dimitrios Tzovaras, Pierre-Antoine Vervier:
Visual analytics for BGP monitoring and prefix hijacking identification. IEEE Netw. 26(6): 33-39 (2012) - [c10]Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee:
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. RAID 2012: 64-85 - [c9]Orestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras:
Visual spam campaigns analysis using abstract graphs representation. VizSEC 2012: 64-71 - [c8]Fabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard:
VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes. VizSEC 2012: 80-87 - 2011
- [c7]Olivier Thonnard, Marc Dacier:
A strategic analysis of spam botnets operations. CEAS 2011: 162-171 - 2010
- [b1]Olivier Thonnard:
Vers un regroupement multicritères comme outil d'aide à l'attribution d'attaque dans le cyber-espace. (A multi-criteria clustering approach to support attack attribution in cyberspace). Télécom ParisTech, France, 2010 - [j2]Olivier Thonnard, Wim Mees, Marc Dacier:
On a multicriteria clustering approach for attack attribution. SIGKDD Explor. 12(1): 11-20 (2010) - [c6]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. RAID 2010: 442-463 - [p1]Marc Dacier, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda:
Assessing Cybercrime Through the Eyes of the WOMBAT. Cyber Situational Awareness 2010: 103-136
2000 – 2009
- 2009
- [c5]Marc Dacier, Van-Hau Pham, Olivier Thonnard:
The WOMBAT Attack Attribution Method: Some Results. ICISS 2009: 19-37 - [c4]Olivier Thonnard, Wim Mees, Marc Dacier:
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 11-21 - [c3]Ilir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard:
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. NCA 2009: 4-11 - 2008
- [j1]Olivier Thonnard, Marc Dacier:
A framework for attack patterns' discovery in honeynet data. Digit. Investig. 5(Supplement): S128-S139 (2008) - [c2]Olivier Thonnard, Marc Dacier:
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology. ICDM Workshops 2008: 154-163 - [c1]Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier:
Automating the Analysis of Honeypot Data (Extended Abstract). RAID 2008: 406-407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint