Follow
Sylvain P. Leblanc
Sylvain P. Leblanc
Chair for Cyber Security & Professor of Computer Engineering, Royal Military College
Verified email at rmc.ca - Homepage
Title
Cited by
Cited by
Year
Anomaly detection in automobile control network data with long short-term memory networks
A Taylor, S Leblanc, N Japkowicz
2016 IEEE international conference on data science and advanced analytics …, 2016
4602016
Frequency-based anomaly detection for the automotive CAN bus
A Taylor, N Japkowicz, S Leblanc
2015 World Congress on Industrial Control Systems Security (WCICSS), 45-49, 2015
3342015
Risks associated with usb hardware trojan devices used by insiders
J Clark, S Leblanc, S Knight
2011 IEEE International Systems Conference, 201-208, 2011
1572011
Taxonomy of cyber attacks and simulation of their effects
IM Chapman, SP Leblanc, A Partington
Proceedings of the 2011 Military Modeling & Simulation Symposium, 73-80, 2011
502011
Compromise through usb-based hardware trojan horse device
J Clark, S Leblanc, S Knight
Future Generation Computer Systems 27 (5), 555-563, 2011
432011
An overview of cyber attack and computer network operations simulation
SP Leblanc, A Partington, I Chapman, M Bernier
Proceedings of the 2011 Military Modeling & Simulation Symposium, 92-100, 2011
432011
Probing the limits of anomaly detectors for automobiles with a cyberattack framework
A Taylor, S Leblanc, N Japkowicz
IEEE Intelligent Systems 33 (2), 54-62, 2018
332018
Attacking OMG data distribution service (DDS) based real-time mission critical distributed systems
MJ Michaud, T Dean, SP Leblanc
2018 13th International conference on malicious and unwanted software …, 2018
262018
Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives.
WJ Adams, E Gavas, TH Lacey, SP Leblanc
CSET, 2009
252009
Hardware trojan horse device based on unintended usb channels
J Clark, S Leblanc, S Knight
2009 Third International Conference on Network and System Security, 1-8, 2009
242009
Using clone detection to find malware in acrobat files
S Karademir, T Dean, S Leblanc
Proceedings of the 2013 Conference of the Center for Advanced Studies on …, 2013
202013
A constraint-based intrusion detection system
MDS Hasan, T Dean, FT Imam, F Garcia, SP Leblanc, M Zulkernine
Proceedings of the Fifth European Conference on the Engineering of Computer …, 2017
162017
Metrics framework of cyber operations on command and control
M Bernier, S Leblanc, B Morton, E Filiol, R Erra
Proceedings of the 11th European Conference on Information Warfare and …, 2012
152012
Reliability estimation of hierarchical software systems
SP Leblanc, PA Roman
Annual Reliability and Maintainability Symposium. 2002 Proceedings (Cat. No …, 2002
152002
Cognitive biases in cyber decision-making
A Lemay, S Leblanc
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
142018
When not to pull the plug–the need for network counter-surveillance operations
S Knight, S Leblanc
Cryptology and information security series 3, 226-237, 2009
92009
Is eval () Evil: A study of JavaScript in PDF malware
A Lemay, SP Leblanc
2018 13th International Conference on Malicious and Unwanted Software …, 2018
62018
Lessons from the strategic corporal: Implications of cyber incident response
A Lemay, SP Leblanc, T De Jesus
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
52015
Project Management: An Engineering Economics Perspective
S Leblanc, P Roman
Pearson Custom Publishing, 2005
42005
An application of network security monitoring to the MIL-STD-1553B data bus
CA Bernard
32019
The system can't perform the operation now. Try again later.
Articles 1–20