Survey of publicly available reports on advanced persistent threat actors A Lemay, J Calvet, F Menet, JM Fernandez Computers & Security 72, 26-59, 2018 | 220 | 2018 |
Providing {SCADA} network data sets for intrusion detection research A Lemay, JM Fernandez 9th Workshop on Cyber Security Experimentation and Test (CSET 16), 2016 | 144 | 2016 |
Ontids: A highly flexible context-aware and ontology-based alert correlation framework A Sadighian, JM Fernandez, A Lemay, ST Zargar Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014 | 59 | 2014 |
An isolated virtual cluster for SCADA network security research A Lemay, J Fernandez, S Knight 1st International Symposium for ICS & SCADA Cyber Security Research 2013 …, 2013 | 40 | 2013 |
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems A Sadighian, ST Zargar, JM Fernandez, A Lemay 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 32 | 2013 |
A Modbus command and control channel A Lemay, JM Fernandez, S Knight IEEE Systems conference, 2016 | 26 | 2016 |
Follow the traffic: Stopping click fraud by disrupting the value chain M Faou, A Lemay, D Décary-Hétu, J Calvet, F Labrèche, M Jean, ... 2016 14th Annual Conference on Privacy, Security and Trust (PST), 464-476, 2016 | 19 | 2016 |
Cognitive biases in cyber decision-making A Lemay, S Leblanc Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 16 | 2018 |
Pinprick attacks, a lesser included case A Lemay, JM Fernandeza, S Knight Conference on Cyber Conflict Proceedings, 183-194, 2010 | 11 | 2010 |
Defending the SCADA network controlling the electrical grid from advanced persistent threats A Lemay École Polytechnique de Montréal, 2013 | 10 | 2013 |
Iterative analysis of competing hypotheses to overcome cognitive biases in cyber decision-making A Lemay, SP Leblanc Journal of Information Warfare 17 (2), 42-53, 2018 | 9 | 2018 |
Is eval () Evil: A study of JavaScript in PDF malware A Lemay, SP Leblanc 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 8 | 2018 |
A Practical flow white list approach for SCADA systems A Lemay, J Rochon, JM Fernandez 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016 | 8 | 2016 |
Preparation of the Cyber Environment (IPCE): Finding the High Ground in Cyberspace A Lemay, S Knight, JM Fernandez Leading issues in i-Warfare 2, 139-156, 2015 | 8* | 2015 |
Preparation of the Cyber Environment (IPCE): Finding the High Ground in Cyberspace A Lemay, S Knight, JM Fernandez Journal of Information Warfare 13 (3), 47-56, 2014 | 8* | 2014 |
Preparation of the Cyber Environment (IPCE): Finding the High Ground in Cyberspace A Lemay, S Knight, JM Fernandez 9th International Conference on Cyber Warfare & Security (ICCWS) 2014, 2014 | 8* | 2014 |
Modelling physical impact of cyber attacks A Lemay, J Fernandez, S Knight 2014 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems …, 2014 | 7 | 2014 |
Lessons from the Strategic Corporal - Implications of Cyber Incident Response A Lemay, SP Leblanc, T De Jesus Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 6 | 2015 |
A timing-based covert channel for SCADA networks A Lemay, S Knight 2017 International Conference on Cyber Conflict (CyCon US), 8-15, 2017 | 5 | 2017 |
Lightweight journaling for scada systems via event correlation A Lemay, A Sadighian, J Fernandez International Conference on Critical Infrastructure Protection, 99-115, 2016 | 3 | 2016 |