Login / Signup
Mario Couture
Publication Activity (10 Years)
Years Active: 2012-2018
Publications (10 Years): 2
Top Topics
Monitoring System
Anomalous Behavior
Detecting Anomalies
Anomaly Detection
Top Venues
SCAM
ISSRE (Supplemental Proceedings)
ICC
SAC
</>
Publications
</>
Jaouhar Fattahi
,
Mario Couture
,
Mohamed Mejri
SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
SoMeT
(2018)
Maroua Ben Attia
,
Chamseddine Talhi
,
Abdelwahab Hamou-Lhadj
,
Babak Khosravifar
,
Vincent Turpaud
,
Mario Couture
On-device anomaly detection for resource-limited systems.
SAC
(2015)
Syed Shariyar Murtaza
,
Abdelwahab Hamou-Lhadj
,
Wael Khreich
,
Mario Couture
Total ADS: Automated Software Anomaly Detection System.
SCAM
(2014)
Syed Shariyar Murtaza
,
Wael Khreich
,
Abdelwahab Hamou-Lhadj
,
Mario Couture
A host-based anomaly detection approach by representing system calls as states of kernel modules.
ISSRE
(2013)
Abdelwahab Hamou-Lhadj
,
Syed Shariyar Murtaza
,
Waseem Fadel
,
Ali Mehrabian
,
Mario Couture
,
Raphaël Khoury
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
RACS
(2013)
Shayan Eskandari
,
Wael Khreich
,
Syed Shariyar Murtaza
,
Abdelwahab Hamou-Lhadj
,
Mario Couture
Monitoring system calls for anomaly detection in modern operating systems.
ISSRE (Supplemental Proceedings)
(2013)
Syed Shariyar Murtaza
,
Afroza Sultana
,
Abdelwahab Hamou-Lhadj
,
Mario Couture
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies.
CSMR
(2012)
Alireza Shameli Sendi
,
Michel Dagenais
,
Masoume Jabbarifar
,
Mario Couture
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model.
J. Networks
7 (2) (2012)
Raphaël Khoury
,
Abdelwahab Hamou-Lhadj
,
Mario Couture
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security.
CISDA
(2012)
Afroza Sultana
,
Abdelwahab Hamou-Lhadj
,
Mario Couture
An improved Hidden Markov Model for anomaly detection using frequent common patterns.
ICC
(2012)