default search action
Olivier Festor
Person information
- affiliation: INRIA, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. J. Netw. Syst. Manag. 32(1): 21 (2024) - [c159]Enzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor:
Vulnet: Learning Navigation in an Attack Graph. NetSoft 2024: 393-398 - [c158]Philippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Stéphane Tuffin, Olivier Festor:
Improving Cloud Gaming Traffic QoS: A Comparison Between Class-Based Queuing Policy and L4S. TMA 2024: 1-10 - 2023
- [j38]Xavier Marchal, Philippe Graff, Joël Roman Ky, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor:
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions. J. Netw. Syst. Manag. 31(2): 39 (2023) - [j37]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions. IEEE Trans. Netw. Serv. Manag. 20(1): 830-845 (2023) - [c157]Philippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Olivier Festor:
Efficient Identification of Cloud Gaming Traffic at the Edge. NOMS 2023: 1-10 - [c156]Pierre-Marie Junges, Jérôme François, Olivier Festor:
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. NOMS 2023: 1-9 - [c155]Enzo d'Andréa, Jérôme François, Olivier Festor, Mehdi Zakroum:
Multi-label Classification of Hosts Observed through a Darknet. NOMS 2023: 1-6 - 2022
- [c154]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services. CloudNet 2022: 267-271 - [c153]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
NetREC: Network-wide in-network REal-value Computation. NetSoft 2022: 189-197 - 2021
- [c152]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge. CNSM 2021: 437-445 - [c151]Philippe Graff, Xavier Marchal, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor:
An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints. CNSM 2021: 551-557 - [c150]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
InREC: In-network REal Number Computation. IM 2021: 358-366 - [c149]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Software-based Analysis of the Security by Design in Embedded Devices. IM 2021: 558-564 - [c148]Mohamed Oulaaffart, Remi Badonnel, Olivier Festor:
Towards Automating Security Enhancement for Cloud Services. IM 2021: 692-696 - [c147]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
Leveraging in-network real-value computation for home network device recognition. IM 2021: 734-735 - [e4]Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer Filho, Abdelkader Lahmadi, Edmundo R. M. Madeira:
17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021. IEEE 2021, ISBN 978-3-903176-32-4 [contents] - 2020
- [j36]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He:
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput. Secur. 97: 101905 (2020)
2010 – 2019
- 2019
- [j35]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j34]Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 14(9): 2470-2485 (2019) - [c146]Hoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. CNSM 2019: 1-9 - [c145]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis. IM 2019: 7-12 - [c144]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. IM 2019: 594-598 - [c143]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He:
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds. NetSoft 2019: 151-159 - [e3]Christian Jacquenet, Filip De Turck, Prosper Chemouil, Flavio Esposito, Olivier Festor, Walter Cerroni, Stefano Secci:
5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019. IEEE 2019, ISBN 978-1-5386-9376-6 [contents] - 2018
- [j33]Tan N. Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
A Security Monitoring Plane for Named Data Networking Deployment. IEEE Commun. Mag. 56(11): 88-94 (2018) - [c142]Xavier Marchal, Thibault Cholez, Olivier Festor:
μNDN: an orchestrated microservice architecture for named data networking. ICN 2018: 12-23 - [c141]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He:
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. NOMS 2018: 1-2 - [c140]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
Unikernel-based approach for software-defined security in cloud infrastructures. NOMS 2018: 1-7 - [c139]Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. NOMS 2018: 1-9 - [c138]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. NOMS 2018: 1-5 - [c137]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models. NTMS 2018: 1-5 - [c136]Paul Chaignon, Diane Adjavon, Kahina Lazri, Jérôme François, Olivier Festor:
Offloading Security Services to the Cloud Infrastructure. SecSoN@SIGCOMM 2018: 27-32 - [c135]Paul Chaignon, Kahina Lazri, Jérôme François, Thibault Delmas, Olivier Festor:
Oko: Extending Open vSwitch with Stateful Filters. SOSR 2018: 13:1-13:13 - 2017
- [c134]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
Towards a Software-Defined Security Framework for Supporting Distributed Cloud. AIMS 2017: 47-61 - [c133]Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis, Olivier Festor, Nadira Lammari, Fayçal Hamdi, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend:
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. FPS 2017: 144-159 - [c132]Salvatore Signorello, Samuel Marchal, Jérôme François, Olivier Festor, Radu State:
Advanced interest flooding attacks in named-data networking. NCA 2017: 1-10 - [c131]Paul Chaignon, Kahina Lazri, Jérôme François, Olivier Festor:
Understanding disruptive monitoring capabilities of programmable networks. NetSoft 2017: 1-6 - 2016
- [c130]Xavier Marchal, Thibault Cholez, Olivier Festor:
Server-side performance evaluation of NDN. ICN 2016: 148-153 - [c129]Xavier Marchal, Thibault Cholez, Olivier Festor:
PIT matching from unregistered remote faces: a critical NDN vulnerability. ICN 2016: 211-212 - [c128]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud. CloudCom 2016: 464-467 - [c127]Salvatore Signorello, Radu State, Jérôme François, Olivier Festor:
NDN.p4: Programming information-centric data-planes. NetSoft 2016: 384-389 - [c126]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. NTMS 2016: 1-5 - 2015
- [j32]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
An Online Risk Management Strategy for VoIP Enterprise Infrastructures. J. Netw. Syst. Manag. 23(1): 137-162 (2015) - [c125]Salvatore Signorello, Radu State, Olivier Festor:
Exploring IoT Protocols Through the Information-Centric Networking's Lens. AIMS 2015: 56-60 - [c124]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Behavioral and dynamic security functions chaining for Android devices. CNSM 2015: 57-63 - [c123]César Bernardini, Thomas Silverston, Olivier Festor:
A Comparison of Caching Strategies for Content Centric Networking. GLOBECOM 2015: 1-6 - [c122]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. ICISSP 2015: 46-55 - [c121]Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli:
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. FCA4AI@IJCAI 2015: 75-86 - [c120]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Towards cloud-based compositions of security functions for mobile devices. IM 2015: 578-584 - [c119]Abdelkader Lahmadi, Frédéric Beck, Eric Finickel, Olivier Festor:
A platform for the analysis and visualization of network flow data of android environments. IM 2015: 1129-1130 - 2014
- [j31]Martín Barrère, Remi Badonnel, Olivier Festor:
Vulnerability Assessment in Autonomic Networks and Services: A Survey. IEEE Commun. Surv. Tutorials 16(2): 988-1004 (2014) - [j30]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Leveraging countermeasures as a service for VoIP security in the cloud. Int. J. Netw. Manag. 24(1): 70-84 (2014) - [c118]Gaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Outsourcing Mobile Security in the Cloud. AIMS 2014: 69-73 - [c117]Eric Finickel, Abdelkader Lahmadi, Frédéric Beck, Olivier Festor:
Empirical analysis of Android logs using self-organizing maps. ICC 2014: 1802-1807 - [c116]César Bernardini, Thomas Silverston, Olivier Festor:
SONETOR: A social network traffic generator. ICC 2014: 3734-3739 - [c115]Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel:
Network security through software defined networking: a survey. IPTComm 2014: 6:1-6:8 - [c114]César Bernardini, Thomas Silverston, Olivier Festor:
A Pin is worth a thousand words: Characterization of publications in Pinterest. IWCMC 2014: 322-327 - [c113]César Bernardini, Thomas Silverston, Olivier Festor:
Socially-aware caching strategy for content centric networking. Networking 2014: 1-9 - [c112]Younes Abid, Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor:
Named data aggregation in wireless sensor networks. NOMS 2014: 1-8 - [c111]Martín Barrère, Remi Badonnel, Olivier Festor:
A SAT-based autonomous strategy for security vulnerability management. NOMS 2014: 1-9 - [c110]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Group-Based Characterization for the I2P Anonymous File-Sharing Environment. NTMS 2014: 1-5 - [c109]Elian Aubry, Thomas Silverston, Abdelkader Lahmadi, Olivier Festor:
CrowdOut: A mobile crowdsourcing service for road safety in digital cities. PerCom Workshops 2014: 86-91 - [c108]Jérôme François, Olivier Festor:
Anomaly traceback using software defined networking. WIFS 2014: 203-208 - 2013
- [j29]Thibault Cholez, Isabelle Chrisment, Olivier Festor, Guillaume Doyen:
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Netw. Appl. 6(2): 155-174 (2013) - [c107]César Bernardini, Thomas Silverston, Olivier Festor:
Cache Management Strategy for CCN Based on Content Popularity. AIMS 2013: 92-95 - [c106]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
A probabilistic cost-efficient approach for mobile security assessment. CNSM 2013: 235-242 - [c105]Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor:
Efficient distributed monitoring in 6LoWPAN networks. CNSM 2013: 268-276 - [c104]César Bernardini, Thomas Silverston, Olivier Festor:
MPC: Popularity-based caching strategy for content centric networks. ICC 2013: 3619-3623 - [c103]Martín Barrère, Remi Badonnel, Olivier Festor:
Improving present security through the detection of past hidden vulnerable states. IM 2013: 471-477 - [c102]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Ovaldroid: An OVAL-based vulnerability assessment framework for Android. IM 2013: 1074-1075 - [c101]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Monitoring anonymous P2P file-sharing systems. P2P 2013: 1-2 - [c100]Emmanuel Nataf, Olivier Festor:
Accurate Online Estimation of Battery Lifetime for Wireless Sensors Network. SENSORNETS 2013: 59-64 - [c99]Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Ndié Djotio, Olivier Festor:
Energy-based Metric for the Routing Protocol in Low-power and Lossy Network. SENSORNETS 2013: 145-148 - [i8]Vijay K. Gurbani, Eric William Burger, Tricha Anjali, Humberto J. Abdelnur, Olivier Festor:
The Common Log Format (CLF) for the Session Initiation Protocol (SIP): Framework and Information Model. RFC 6872: 1-39 (2013) - 2012
- [j28]Abdelkader Lahmadi, Olivier Festor:
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services. IEEE Trans. Netw. Serv. Manag. 9(2): 114-127 (2012) - [c98]Martín Barrère, Remi Badonnel, Olivier Festor:
Collaborative remediation of configuration vulnerabilities in autonomic networks and systems. CNSM 2012: 357-363 - [c97]Abdelkader Lahmadi, Laurent Ciarletta, Alexandre Boeglin, Olivier Festor:
Routing based roles assignment for monitoring 6LowPAN networks. COMNET 2012: 1-8 - [c96]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Improving Content Availability in the I2P Anonymous File-Sharing Environment. CSS 2012: 77-92 - [c95]Abdelkader Lahmadi, César Brandin, Olivier Festor:
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks. DCOSS 2012: 335-340 - [c94]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A trust-based strategy for addressing residual attacks in the RELOAD architecture. ICC 2012: 1053-1058 - [c93]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Dynamic exposure control in P2PSIP networks. NOMS 2012: 261-268 - [c92]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. NOMS 2012: 335-342 - [c91]Samuel Marchal, Jérôme François, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor:
DNSSM: A large scale passive DNS security monitoring framework. NOMS 2012: 988-993 - [c90]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
A Bird's Eye View on the I2P Anonymous File-Sharing Environment. NSS 2012: 135-148 - [c89]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. SafeConfig 2012: 41-58 - [c88]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
I2P's Usage Characterization. TMA 2012: 48-51 - [i7]Raphaël Fournier, Thibault Cholez, Matthieu Latapy, Clémence Magnien, Isabelle Chrisment, Ivan Daniloff, Olivier Festor:
Comparing paedophile activity in different P2P systems. CoRR abs/1206.4167 (2012) - [i6]Emmanuel Nataf, Olivier Festor:
Online Estimation of Battery Lifetime for Wireless Sensors Network. CoRR abs/1209.2234 (2012) - 2011
- [j27]Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, Olivier Festor:
A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep. 16(1): 12-19 (2011) - [c87]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Econometric Feedback for Runtime Risk Management in VoIP Architectures. AIMS 2011: 26-37 - [c86]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards Vulnerability Prevention in Autonomic Networks and Systems. AIMS 2011: 65-68 - [c85]Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. CNSM 2011: 1-8 - [c84]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Enforcing security with behavioral fingerprinting. CNSM 2011: 1-9 - [c83]Abdelkader Lahmadi, Laurent Delosières, Olivier Festor:
Hinky: Defending against Text-Based Message Spam on Smartphones. ICC 2011: 1-5 - [c82]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
PTF: Passive Temporal Fingerprinting. Integrated Network Management 2011: 289-296 - [c81]Rodrigo do Carmo, Mohamed Nassar, Olivier Festor:
Artemisa: An open-source honeypot back-end to support security in VoIP domains. Integrated Network Management 2011: 361-368 - [c80]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures. Integrated Network Management 2011: 478-484 - [c79]Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor:
YANG-based configuration modeling - The SecSIP IPS case study -. Integrated Network Management 2011: 800-811 - [c78]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
When KAD Meets BitTorrent - Building a Stronger P2P Network. IPDPS Workshops 2011: 1635-1642 - [c77]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
BitTorrent's Mainline DHT Security Assessment. NTMS 2011: 1-5 - [c76]Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33 - [c75]Mohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor:
Using decision trees for generating adaptive SPIT signatures. SIN 2011: 13-20 - 2010
- [j26]Frédéric Beck, Isabelle Chrisment, Ralph E. Droms, Olivier Festor:
Autonomic renumbering in the future iInternet. IEEE Commun. Mag. 48(7): 86-92 (2010) - [j25]Omar Cherkaoui, Olivier Festor, Lisandro Zambenedetti Granville:
Special issue on virtualization. Int. J. Netw. Manag. 20(3): 109 (2010) - [j24]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Machine Learning Techniques for Passive Network Inventory. IEEE Trans. Netw. Serv. Manag. 7(4): 244-257 (2010) - [j23]Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced fuzzing in the VoIP space. J. Comput. Virol. 6(1): 57-64 (2010) - [c74]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Managing Risks at Runtime in VoIP Networks and Services. AIMS 2010: 89-92 - [c73]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Semi-supervised Fingerprinting of Protocol Messages. CISIS 2010: 107-115 - [c72]Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. CNSM 2010: 48-55 - [c71]Frédéric Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms:
Automated and secure IPv6 configuration in enterprise networks. CNSM 2010: 64-71 - [c70]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Monitoring and Controlling Content Access in KAD. ICC 2010: 1-6 - [c69]Mohamed Nassar, Radu State, Olivier Festor:
Labeled VoIP Data-Set for Intrusion Detection Evaluation. EUNICE 2010: 97-106 - [c68]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Efficient DHT attack mitigation through peers' ID distribution. IPDPS Workshops 2010: 1-8 - [c67]Tom Leclerc, Julien Siebert, Vincent Chevrier, Laurent Ciarletta, Olivier Festor:
Multi-modeling and Co-simulation-Based Mobile Ubiquitous Protocols and Services Development and Assessment. MobiQuitous 2010: 273-284 - [c66]Cristian Popi, Olivier Festor:
WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks. NOMS 2010: 9-16 - [c65]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Automated runtime risk management for voice over IP networks and services. NOMS 2010: 57-64 - [c64]Abdelkader Lahmadi, Olivier Festor:
VeTo: An exploit prevention language from known vulnerabilities in SIP services. NOMS 2010: 216-223 - [c63]Emmanuel Nataf, Olivier Festor:
End-to-end YANG-based configuration management. NOMS 2010: 674-684 - [c62]Mohamed Nassar, Radu State, Olivier Festor:
A Framework for Monitoring SIP Enterprise Networks. NSS 2010: 1-8 - [c61]Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor:
Improving Fuzz Testing Using Game Theory. NSS 2010: 263-268 - [c60]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Digital forensics in VoIP networks. WIFS 2010: 1-6
2000 – 2009
- 2009
- [j22]Laurent Andrey, Olivier Festor, Abdelkader Lahmadi, Aiko Pras, Jürgen Schönwälder:
Survey of SNMP performance analysis studies. Int. J. Netw. Manag. 19(6): 527-548 (2009) - [j21]Jérôme François, Radu State, Olivier Festor:
Botnets IRC et P2P pour une supervision à large échelle. Tech. Sci. Informatiques 28(4): 433-458 (2009) - [j20]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Caractérisation des délais dans les applications de supervision de réseaux et de services. Tech. Sci. Informatiques 28(4): 479-502 (2009) - [c59]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Evaluation of Sybil Attacks Protection Schemes in KAD. AIMS 2009: 70-82 - [c58]Cristian Popi, Olivier Festor:
Flow Monitoring in Wireless MESH Networks. AIMS 2009: 134-146 - [c57]Mohamed Nassar, Radu State, Olivier Festor:
VoIP Malware: Attack Tool & Attack Scenarios. ICC 2009: 1-6 - [c56]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits. ICN 2009: 397-402 - [c55]Abdelkader Lahmadi, Olivier Festor:
SecSip: A stateful firewall for SIP-based networks. Integrated Network Management 2009: 172-179 - [c54]Remi Badonnel, Olivier Festor, Khaled Hamlaoui:
Monitoring and counter-profiling for Voice over IP networks and services. Integrated Network Management 2009: 267-274 - [c53]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Performance of network and service monitoring frameworks. Integrated Network Management 2009: 815-820 - [c52]Iván Díaz, Cristian Popi, Olivier Festor, Juan Touriño, Ramon Doallo:
Ontological Configuration Management for Wireless Mesh Routers. IPOM 2009: 116-129 - [c51]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Automated Behavioral Fingerprinting. RAID 2009: 182-201 - [e2]Olivier Festor, Aiko Pras, Burkhard Stiller:
Management of the Future Internet, 27.01. - 30.01.2009. Dagstuhl Seminar Proceedings 09052, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i5]Olivier Festor, Aiko Pras, Burkhard Stiller:
09052 Report - Management of the Future Internet. Management of the Future Internet 2009 - [i4]Abdelkader Lahmadi, Olivier Festor:
SecSip: A Stateful Firewall for SIP-based Networks. CoRR abs/0907.3045 (2009) - [i3]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Performance of Network and Service Monitoring Frameworks. CoRR abs/0907.3047 (2009) - [i2]Emmanuel Nataf, Olivier Festor:
jYang : A YANG parser in java. CoRR abs/0908.4005 (2009) - 2008
- [j19]Remi Badonnel, Radu State, Olivier Festor:
Self-configurable fault monitoring in ad-hoc networks. Ad Hoc Networks 6(3): 458-473 (2008) - [j18]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Group Key Management in MANETs. Int. J. Netw. Secur. 6(1): 67-79 (2008) - [c50]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
A Distributed and Adaptive Revocation Mechanism for P2P Networks. ICN 2008: 290-295 - [c49]Jérôme François, Radu State, Olivier Festor:
Towards malware inspired management frameworks. NOMS 2008: 105-112 - [c48]Cristian Popi, Olivier Festor:
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks. NOMS 2008: 759-762 - [c47]Mohamed Nassar, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. RAID 2008: 311-330 - [c46]Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced Network Fingerprinting. RAID 2008: 372-389 - 2007
- [j17]Mohamed Salah Bouassida, Najah Chridi, Isabelle Chrisment, Olivier Festor, Laurent Vigneron:
Automated verification of a key management architecture for hierarchical group protocols. Ann. des Télécommunications 62(11-12): 1365-1387 (2007) - [j16]Aiko Pras, Jürgen Schönwälder, Mark Burgess, Olivier Festor, Gregorio Martínez Pérez, Rolf Stadler, Burkhard Stiller:
Key research challenges in network management. IEEE Commun. Mag. 45(10): 104-110 (2007) - [j15]Remi Badonnel, Radu State, Olivier Festor:
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 4(1): 39-50 (2007) - [j14]Radu State, Olivier Festor:
Malware: a future framework for device, network and service management. J. Comput. Virol. 3(1): 51-60 (2007) - [c45]Abdelkader Lahmadi, Anca Ghitescu, Laurent Andrey, Olivier Festor:
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study. AIMS 2007: 1-12 - [c44]Mohamed Nassar, Radu State, Olivier Festor:
IBGP Confederation Provisioning. AIMS 2007: 25-34 - [c43]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Modeling and Performance Evaluation of the Network and Service Management Plane. AIMS 2007: 156-159 - [c42]Jérôme François, Radu State, Olivier Festor:
Malware Models for Network and Service Management. AIMS 2007: 192-195 - [c41]Jérôme François, Radu State, Olivier Festor:
Botnets for Scalable Management. DSOM 2007: 1-12 - [c40]Vincent Cridlig, Radu State, Olivier Festor:
A model for checking consistency in access control policies for network management. Integrated Network Management 2007: 11-19 - [c39]Mohamed Nassar, Radu State, Olivier Festor:
VoIP Honeypot Architecture. Integrated Network Management 2007: 109-118 - [c38]Humberto J. Abdelnur, Radu State, Olivier Festor:
KiF: a stateful SIP fuzzer. IPTComm 2007: 47-56 - 2006
- [j13]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Mobility-awareness in group key management protocols within MANETs. Ann. des Télécommunications 61(9-10): 1149-1171 (2006) - [j12]Vincent Cridlig, Humberto J. Abdelnur, Radu State, Olivier Festor:
XBGP-MAN: an XML management architecture for BGP. Int. J. Netw. Manag. 16(4): 295-309 (2006) - [j11]Vincent Cridlig, Radu State, Olivier Festor:
Role-Based Access Control for XML enabled multi-protocol management gateways. IEEE Trans. Netw. Serv. Manag. 3(1): 22-32 (2006) - [c37]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
On Delays in Management Frameworks: Metrics, Models and Analysis. DSOM 2006: 13-24 - [c36]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique. ICN/ICONS/MCL 2006: 64 - [c35]Remi Badonnel, Radu State, Olivier Festor:
Fault Monitoring in Ad-Hoc Networks Based on Information Theory. Networking 2006: 427-438 - [c34]Remi Badonnel, Radu State, Olivier Festor:
Probabilistic Management of Ad-Hoc Networks. NOMS 2006: 339-350 - [c33]Vincent Cridlig, Humberto J. Abdelnur, Radu State, Olivier Festor:
A VoIP Security Management Architecture. NOMS 2006 - [i1]Mohamed El Baker Nassar, Radu State, Olivier Festor:
Intrusion detection mechanisms for VoIP applications. CoRR abs/cs/0610109 (2006) - 2005
- [j10]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad hoc networks: information model and probe-based architecture. Int. J. Netw. Manag. 15(5): 335-347 (2005) - [j9]Alexander Clemm, Olivier Festor, Aiko Pras:
Managing New Networked Worlds - A Report on IM 2005. J. Netw. Syst. Manag. 13(3): 351-354 (2005) - [j8]Remi Badonnel, Radu State, Olivier Festor, André Schaff:
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. J. Netw. Syst. Manag. 13(4): 479-497 (2005) - [j7]Alexander Clemm, Olivier Festor, Aiko Pras:
Managing New Networked Worlds - A Report on IM 2005. J. Netw. Syst. Manag. 13(4): 499-502 (2005) - [j6]Remi Badonnel, Radu State, Olivier Festor:
Self-Organized Monitoring in Ad-Hoc Networks. Telecommun. Syst. 30(1-3): 143-160 (2005) - [c32]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study. DSOM 2005: 24-35 - [c31]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Hierarchical Architecture for a Distributed Management of P2P Networks and Services. DSOM 2005: 257-268 - [c30]Remi Badonnel, Radu State, Olivier Festor:
Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. ICN (2) 2005: 83-90 - [c29]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Performance Management of Peer-to-Peer Distributed Hash Tables. EUNICE 2005: 233-246 - [c28]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad-hoc networks: evaluating the network behavior. Integrated Network Management 2005: 17-30 - [c27]Vincent Cridlig, Radu State, Olivier Festor:
An integrated security framework for XML based management. Integrated Network Management 2005: 587-600 - [c26]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Efficient Clustering for Multicast Key Distribution in MANETs. NETWORKING 2005: 138-153 - 2004
- [j5]Aiko Pras, Jürgen Schönwälder, Olivier Festor:
Guest editorial - XML-based management of networks and services. IEEE Commun. Mag. 42(7): 56-57 (2004) - [c25]Vincent Cridlig, Olivier Festor, Radu State:
Role-Based Access Control for XML Enabled Management Gateways. DSOM 2004: 183-195 - [c24]Guillaume Doyen, Olivier Festor, Emmanuel Nataf:
A CIM Extension for Peer-to-Peer Network and Service Management. ICT 2004: 801-810 - [c23]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework. MMNS 2004: 200-212 - [c22]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. NETWORKING 2004: 725-742 - [c21]Radu State, Olivier Festor, Benjamin Zores:
An extensible agent toolkit for device management. NOMS (1) 2004: 845-858 - [c20]Claude Chaudet, Olivier Festor, Isabelle Guérin Lassous, Radu State:
A Managed Bandwidth Reservation Protocol for Ad Hoc Networks. SAPIR 2004: 13-20 - 2003
- [c19]Radu State, Olivier Festor, Isabelle Chrisment:
Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. DSOM 2003: 169-180 - [c18]Radu State, Emmanuel Nataf, Olivier Festor:
A SMIng Based Policy Access Control for SNMPv3. HSNMC 2003: 156-164 - [c17]Hassen Sallay, Olivier Festor:
A Highly Distributed Dynamic IP Multicast Accounting and Management Framework. Integrated Network Management 2003: 45-58 - [c16]Emmanuel Nataf, Olivier Festor, Guillaume Doyen:
An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning. Integrated Network Management 2003: 491-503 - [c15]Radu State, Olivier Festor:
Management of Wireless Dynamic Infrastructures. ISCC 2003: 1373-1378 - [c14]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Management of Peer-to-Peer Networks Applied to Instant Messaging. MMNS 2003: 449-461 - 2002
- [j4]Aiko Pras, Olivier Festor:
Internet Services: Management Beyond the ElementA Report on DSOM'2001. J. Netw. Syst. Manag. 10(1): 127-131 (2002) - [j3]Radu State, Olivier Festor, Emmanuel Nataf:
Managing Highly Dynamic Services Using Extended Temporal Information Models. J. Netw. Syst. Manag. 10(2): 195-209 (2002) - [c13]Hassen Sallay, Radu State, Olivier Festor:
A distributed management platform for integrated multicast monitoring. NOMS 2002: 483-495 - [c12]Isabelle Astic, Olivier Festor:
A hierarchical topology discovery service for IPv6 networks. NOMS 2002: 497-510 - 2001
- [c11]Radu State, Olivier Festor, Emmanuel Nataf:
Managing Highly Dynamic Services Using Extended Temporal Network Information Models. Integrated Network Management 2001: 705-718 - [e1]Olivier Festor, Aiko Pras:
Operations & Management, 12th International Workshop on Distributed Systems, DSOM 2001, Nancy, France, October 15-17, 2001. Proceedings. INRIA, Rocquencourt, France 2001, ISBN 2-7261-1190-4 [contents] - 2000
- [j2]Laurent Andrey, Olivier Festor, Emmanuel Nataf, Radu State:
JTMN: a Java-based TMN development and experimentation environment. IEEE J. Sel. Areas Commun. 18(5): 664-675 (2000) - [c10]Radu State, Emmanuel Nataf, Olivier Festor:
Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture. DSOM 2000: 181-192 - [c9]Laurent Andrey, Olivier Festor, Nizar Ben Youssef:
COJ: a free CMIS compliant Java API and its various implementations. NOMS 2000: 381-393 - [c8]Radu State, Emmanuel Nataf, Olivier Festor:
A Java based implementation of a network level information model for the ATM/frame relay interconnection. NOMS 2000: 965-966 - [c7]Radu State, Olivier Festor, Emmanuel Nataf:
A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks. PDPTA 2000
1990 – 1999
- 1999
- [c6]Olivier Festor, Paul Festor, Nizar Ben Youssef, Laurent Andrey:
Integration of WBEM-based Management Agents in the OSI Framework. Integrated Network Management 1999: 49-64 - 1998
- [j1]George Pavlou, Olivier Festor:
Management Information Model Engineering. J. Netw. Syst. Manag. 6(3): 239-243 (1998) - 1997
- [c5]Emmanuel Nataf, Olivier Festor, Laurent Andrey:
RelMan: A GRM-based Relationship Manager. Integrated Network Management 1997: 661-672 - [c4]Samir Tata, Laurent Andrey, Olivier Festor:
A practical experience on validating GDMO-based information models with SDL'88 and SDL'92. SDL Forum 1997: 367- - 1996
- [c3]Rolf Eberhardt, Dominique Sidou, Olivier Festor, Sandro Mazziotta, Jacques Labetoulle:
Executable TMN-specifications in TIMS. NOMS 1996: 266-269 - 1995
- [c2]Olivier Festor:
MODE: a development environment for managed objects based on formal methods. Integrated Network Management 1995: 616-628 - 1994
- [b1]Olivier Festor:
Formalisation du comportement des objets gérés dans le cadre du modele OSI. (Formal description of managed object behaviour in the osi management framework). Henri Poincaré University, Nancy, France, 1994 - 1993
- [c1]Olivier Festor, Georg Zörntlein:
Formal Description of Managed Object Behavior - A Rule Based Approach. Integrated Network Management 1993: 45-58
Coauthor Index
aka: Remi Badonnel
aka: Mohamed El Baker Nassar
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint