Group r3s
r3s (networks, Systems, Services, Security)
Samovar, Telecom SudParis
Themes: digital trust; next generation digital infrastructure
The group works on network and services architectures, security of networks and systems
Contact person: Badii Jouaber, https://badiijouaber.wp.imtbs-tsp.eu/
Web site: https://samovar.telecom-sudparis.eu/spip.php?rubrique129
Journal articles
2023
- ref_biblio
- Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro. Widening Blockchain technology toward access control for service provisioning in cellular networks. Sensors, 2023, 23 (9), pp.4224. ⟨10.3390/s23094224⟩. ⟨hal-04080819⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Zhenjiao Liu, Zhikui Chen, Yue Li, Liang Zhao, Tao Yang, et al.. IMC-NLT: Incomplete multi-view clustering by NMF and low-rank tensor. Expert Systems with Applications, 2023, 221, pp.119742. ⟨10.1016/j.eswa.2023.119742⟩. ⟨hal-04006481⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Meroua Moussaoui, Emmanuel Bertin, Noel Crespi. Divide and Conquer: A business model agenda for Beyond-5G and 6G actors. IEEE Communications Magazine, In press. ⟨hal-04084160⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Wenhao Shao, Praboda Rajapaksha, Yanyan Wei, Dun Li, Noel Crespi, et al.. COVAD: Content-oriented video anomaly detection using a self-attention based deep learning model. Virtual Reality & Intelligent Hardware, 2023, 5 (1), pp.24-41. ⟨10.1016/j.vrih.2022.06.001⟩. ⟨hal-04029569⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Wenhao Shao, Yanyan Wei, Praboda Rajapaksha, Dun Li, Zhigang Luo, et al.. Low-latency dimensional expansion and anomaly detection empowered secure IoT network. IEEE Transactions on Network and Service Management, 2023. ⟨hal-04005539⟩
- Accès au texte intégral et bibtex
-
2022
- ref_biblio
- Ghulam Abro, Saiful Azrin B. M. Zulkifli, Rana Javed Masood, Vijanth Sagayan Asirvadam, Anis Laouti. Comprehensive review of UAV detection, security, and communication advancements to prevent threats. Drones, 2022, 6 (10), pp.284. ⟨10.3390/drones6100284⟩. ⟨hal-03968417⟩
- Accès au bibtex
-
- ref_biblio
- Bahram Alinia, Mohammad Hajiesmaili, Zachary J Lee, Noel Crespi, Enrique Mallada. Online EV scheduling algorithms for adaptive charging networks with global peak constraints. IEEE Transactions on Sustainable Computing, In press, pp.1-12. ⟨10.1109/TSUSC.2020.2979854⟩. ⟨hal-02472860⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Research trends in collaborative drones. Sensors, 2022, 22 (9), pp.3321:1-3321:17. ⟨10.3390/s22093321⟩. ⟨hal-03654021⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui, et al.. BTrust: a new blockchain-based trust management protocol for resource sharing. Journal of Network and Systems Management, 2022, 30 (4), pp.64. ⟨10.1007/s10922-022-09674-4⟩. ⟨hal-04003868⟩
- Accès au bibtex
-
- ref_biblio
- Abou-Bakr Djaker, Bouabdellah Kechar, Hossam Afifi, Hassine Moungla. Maximum concurrent floow solutions for improved routing in IoT future networks. Arabian Journal for Science and Engineering, 2022, ⟨10.1007/s13369-022-07479-w⟩. ⟨hal-03867409⟩
- Accès au bibtex
-
- ref_biblio
- Sophie Dramé-Maigné, Hervé Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Hossam Afifi, Hassine Moungla, Jordi Badosa. A novel deep reinforcement approach for IIoT microgrid energy management systems. IEEE Transactions on Green Communications and Networking, 2022, 6 (1), pp.148-159. ⟨10.1109/TGCN.2021.3112043⟩. ⟨hal-03414391⟩
- Accès au bibtex
-
- ref_biblio
- Maxime Elkael, Massinissa Ait Aba, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber. Monkey business: reinforcement learning meets neighborhood search for virtual network embedding.. Computer Networks, 2022, 216 (109204), ⟨10.1016/j.comnet.2022.109204⟩. ⟨hal-03876945⟩
- Accès au bibtex
-
- ref_biblio
- Hassan Fawaz, Julien Lesca, Pham Tran Anh Quang, Jeremie Leguay, Djamal Zeghlache, et al.. Graph convolutional reinforcement learning for collaborative queuing agents. IEEE Transactions on Network and Service Management, 2022, pp.1-9. ⟨10.1109/TNSM.2022.3226605⟩. ⟨hal-03973095⟩
- Accès au bibtex
-
- ref_biblio
- Fariba Ghaffari, Komal Gilani, Emmanuel Bertin, Noel Crespi. Identity and access management using distributed ledger technology: a survey. International Journal of Network Management, 2022, 32 (2), pp.e2180. ⟨10.1002/nem.2180⟩. ⟨hal-03315497⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Rémy Grünblatt, Isabelle Guérin-Lassous, Olivier Simonin. A distributed antenna orientation solution for optimizing communications in a fleet of UAVs. Computer Communications, 2022, 181, pp.102-115. ⟨10.1016/j.comcom.2021.09.020⟩. ⟨hal-03400498⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hatem Ibn-Khedher, Mohammed Laroui, Hassine Moungla, Hossam Afifi, Emad Abd-Elrahman. Next-generation edge computing assisted autonomous driving based artificial intelligence algorithms. IEEE Access, 2022, 10 (1), pp.53987-54001. ⟨10.1109/ACCESS.2022.3174548⟩. ⟨hal-03867413⟩
- Accès au bibtex
-
- ref_biblio
- Saleem Iqbal, Hira Maryam, Kashif Naseer Qureshi, Ibrahim Tariq Javed, Noel Crespi. Automised flow rule formation by using machine learning in software defined networks based edge computing. Egyptian Informatics Journal, 2022, 23 (1), pp.149-157. ⟨10.1016/j.eij.2021.10.001⟩. ⟨hal-03559491⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Gregory Blanc, Mustafizur Rahman Shahid, Marwan Lazrag. A survey of smart home IOT device classification using machine learning-based network traffic analysis. IEEE Access, 2022, 10, pp.97117-97141. ⟨10.1109/ACCESS.2022.3205023⟩. ⟨hal-03787447⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Houda Jmila, Mohamed Ibn Khedher. Adversarial machine learning for network intrusion detection: a comparative study. Computer Networks, 2022, 214, pp.109073:1-109073:14. ⟨10.1016/j.comnet.2022.109073⟩. ⟨hal-03726213⟩
- Accès au bibtex
-
- ref_biblio
- Dun Li, Dezhi Han, Noel Crespi, Roberto Minerva, Kuan-Ching Li. A blockchain-based secure storage and access control scheme for supply chain finance. Journal of Supercomputing, 2022, 79 (1), pp.109-138. ⟨10.1007/s11227-022-04655-5⟩. ⟨hal-04029559⟩
- Accès au bibtex
-
- ref_biblio
- Roberto Minerva, Faraz Malik Awan, Noel Crespi. Exploiting Digital Twin as enablers for Synthetic Sensing. IEEE Internet Computing, In press, ⟨10.1109/MIC.2021.3051674⟩. ⟨hal-03100719⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Cross-lingual few-shot hate speech and offensive language detection using meta learning. IEEE Access, 2022, 10, pp.14880-14896. ⟨10.1109/ACCESS.2022.3147588⟩. ⟨hal-03559484⟩
- Accès au bibtex
-
- ref_biblio
- Nattakorn Promwongsa, Amin Ebrahimzadeh, Roch Glitho, Noel Crespi. Joint VNF placement and scheduling for latency-sensitive services. IEEE Transactions on Network Science and Engineering, 2022, 9 (4), pp.2432-2449. ⟨10.1109/TNSE.2022.3163927⟩. ⟨hal-04003873⟩
- Accès au bibtex
-
- ref_biblio
- Kashif Naseer Qureshi, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, et al.. A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the Internet of vehicles. Applied Sciences, 2022, 12 (1), pp.476:1 - 476:19. ⟨10.3390/app12010476⟩. ⟨hal-03559485⟩
- Accès au bibtex
-
- ref_biblio
- Sara Rabhi, Frédéric Blanchard, Alpha Mamadou Diallo, Djamal Zeghlache, Céline Lukas, et al.. Temporal deep learning framework for retinopathy prediction in patients with type 1 diabetes. Artificial Intelligence in Medicine, 2022, 133 (C), pp.102408. ⟨10.1016/j.artmed.2022.102408⟩. ⟨hal-03889323⟩
- Accès au bibtex
-
- ref_biblio
- Yasir Saleem, Pablo Sotres, Samuel Fricker, Carmen Lopez de La Torre, Noel Crespi, et al.. IoTRec: the IoT Recommender for smart parking system. IEEE Transactions on Emerging Topics in Computing, 2022, 10 (1), pp.280-296. ⟨10.1109/TETC.2020.3014722⟩. ⟨hal-02963833⟩
- Accès au bibtex
-
- ref_biblio
- Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali, et al.. A comparative study of web application security parameters: current trends and future directions. Applied Sciences, 2022, 12 (8), pp.4077:1-4077:23. ⟨10.3390/app12084077⟩. ⟨hal-03656365⟩
- Accès au bibtex
-
- ref_biblio
- Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/TCC.2019.2931896⟩. ⟨hal-02315892⟩
- Accès au bibtex
-
2021
- ref_biblio
- Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Joaquin Garcia‐alfaro, et al.. DECA: a Dynamic Energy cost and Carbon emission-efficient Application placement method for Edge Clouds. IEEE Access, 2021, 9, pp.70192-70213. ⟨10.1109/ACCESS.2021.3075973⟩. ⟨hal-03208423v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hugo Alatrista-Salas, Vincent Gauthier, Miguel Nunez-Del-Prado, Monique Becker. Impact of natural disasters on consumer behavior: case of the 2017 El Niño phenomenon in Peru. PLoS ONE, 2021, 16 (1), pp.e0244409:1-e0244409:23. ⟨10.1371/journal.pone.0244409⟩. ⟨hal-03141616⟩
- Accès au bibtex
-
- ref_biblio
- Faraz Malik Awan, Roberto Minerva, Noel Crespi. Using noise pollution data for traffic prediction in smart cities: experiments based on LSTM recurrent neural networks. IEEE Sensors Journal, 2021, 21 (18), pp.20722-20729. ⟨10.1109/JSEN.2021.3100324⟩. ⟨hal-03311498⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Chérifa Boucetta, Seif Eddine Hammami, Hossam Afifi, Hassine Moungla. STAD: Spatio-Temporal Anomaly Detection mechanism for mobile network management. IEEE Transactions on Network and Service Management, 2021, 18 (1), pp.894-906. ⟨10.1109/TNSM.2020.3048131⟩. ⟨hal-03135739⟩
- Accès au bibtex
-
- ref_biblio
- Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle. Towards more secure EMV purchase transactions. Annals of Telecommunications - annales des télécommunications, 2021, 76 (3-4), pp.203-222. ⟨10.1007/s12243-020-00784-1⟩. ⟨hal-03981012⟩
- Accès au bibtex
-
- ref_biblio
- Fariba Ghaffari, Emmanuel Bertin, Noel Crespi, Shanay Behrad, Julien Hatin. A novel access control method via smart contracts for internet-based service provisioning. IEEE Access, 2021, 9, pp.81253-81273. ⟨10.1109/ACCESS.2021.3085831⟩. ⟨hal-03245473⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Fares Alharbi, Tiziana Margaria, Noel Crespi. Detecting nuisance calls over internet telephony using caller reputation. Electronics, 2021, 10 (3), pp.353:1-353:20. ⟨10.3390/electronics10030353⟩. ⟨hal-03126516⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Fares Alharbi, Tiziana Margaria, Noel Crespi, Kashif Naseer Qureshi. PETchain: a blockchain-based privacy enhancing technology. IEEE Access, 2021, 9, pp.41129-41143. ⟨10.1109/ACCESS.2021.3064896⟩. ⟨hal-03174749⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Gregory Blanc. Towards security-aware 5G slice embedding. Computers and Security, 2021, 100, pp.102075:1-102075:18. ⟨10.1016/j.cose.2020.102075⟩. ⟨hal-03123977⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
- Accès au bibtex
-
- ref_biblio
- Ines Khoufi, Anis Laouiti, Cedric Adjih, Mohamed Hadded. UAVs trajectory optimization for data pick up and delivery with time window. Drones, 2021, 5 (2), pp.27:1-27:22. ⟨10.3390/drones5020027⟩. ⟨hal-03591073⟩
- Accès au bibtex
-
- ref_biblio
- Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
- Accès au bibtex
-
- ref_biblio
- Mohammed Laroui, Boubakr Nour, Hassine Moungla, Moussa Ali Cherif, Hossam Afifi, et al.. Edge and fog computing for IoT: a survey on current research activities & future directions. Computer Communications, 2021, 180, pp.210-231. ⟨10.1016/j.comcom.2021.09.003⟩. ⟨hal-03414397⟩
- Accès au bibtex
-
- ref_biblio
- Yan Liu, Bin Guo, Daqing Zhang, Djamal Zeghlache, Jingmin Chen, et al.. MetaStore: a task-adaptative meta-learning model for optimal store placement with multi-city knowledge transfer. ACM Transactions on Intelligent Systems and Technology, 2021, 12 (3), pp.28:1-28:23. ⟨10.1145/3447271⟩. ⟨hal-03363389⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yan Liu, Bin Guo, Daqing Zhang, Djamal Zeghlache, Jingmin Chen, et al.. Knowledge transfer with weighted adversarial network for cold-start store site recommendation. ACM Transactions on Knowledge Discovery from Data (TKDD), 2021, 15 (3), 47, pp 1-27. ⟨10.1145/3442203⟩. ⟨hal-03363394⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
- Accès au bibtex
-
- ref_biblio
- Paul Marillonnet, Maryline Laurent, Mikaël Ates, Maryline Laurent. Personal information self-management: A survey of technologies supporting administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
- Accès au bibtex
-
- ref_biblio
- Roberto Minerva, Noel Crespi. Digital twins: properties, software frameworks, and application scenarios. IT Professional, 2021, 23 (1), pp.51 - 55. ⟨10.1109/mitp.2020.2982896⟩. ⟨hal-03210180⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. BERT, XLNet or RoBERTa: the best transfer learning model to detect clickbaits. IEEE Access, 2021, 9, pp.154704-154716. ⟨10.1109/ACCESS.2021.3128742⟩. ⟨hal-03559488⟩
- Accès au bibtex
-
- ref_biblio
- Adel Mounir Said, Ahmed Kamal, Hossam Afifi. An intelligent parking sharing system for green and smart cities based IoT. Computer Communications, 2021, 172, pp.10-18. ⟨10.1016/j.comcom.2021.02.017⟩. ⟨hal-03196973⟩
- Accès au bibtex
-
- ref_biblio
- Yasir Saleem, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva. Parking recommender system privacy preservation through anonymization and differential privacy. Engineering Reports, 2021, 3 (2), pp.e12297:1-e12297:30. ⟨10.1002/eng2.12297⟩. ⟨hal-02963830⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Fares Alharbi, Badr Bellaj, Tiziana Margaria, Noel Crespi, et al.. Health-ID: a blockchain-based decentralized identity management for remote healthcare. Healthcare, 2021, 9 (6), pp.712:1 - 712:21. ⟨10.3390/healthcare9060712⟩. ⟨hal-03263748⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. Dataset of coronavirus content from Instagram with an exploratory analysis. IEEE Access, 2021, 9, pp.157192-157202. ⟨10.1109/ACCESS.2021.3126552⟩. ⟨hal-03559489⟩
- Accès au bibtex
-
2020
- ref_biblio
- Faraz Malik Awan, Roberto Minerva, Noel Crespi. Improving road traffic forecasting using air pollution and atmospheric data: experiments based on LSTM recurrent neural networks. Sensors, 2020, 20 (13), pp.3749:1-3749:21. ⟨10.3390/s20133749⟩. ⟨hal-02963835⟩
- Accès au bibtex
-
- ref_biblio
- Faraz Malik Awan, Yasir Saleem, Roberto Minerva, Noel Crespi. A comparative analysis of machine/deep learning models for parking space availability prediction. Sensors, 2020, 20 (1), ⟨10.3390/s20010322⟩. ⟨hal-02429337⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Shanay Behrad, Emmanuel Bertin, Stéphane Tuffin, Noel Crespi. A new scalable authentication and access control mechanism for 5G-based IoT. Future Generation Computer Systems, 2020, 108, pp.46-61. ⟨10.1016/j.future.2020.02.014⟩. ⟨hal-02472852⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Lyes Bouali, Selma Khebbache, Samia Bouzefrane, Mehammed Daoui. A recommendation approach using forwarding graph to analyze mapping algorithms for Virtual Network Functions. Recent Advances in Computer Science and Communications, 2020, 13 (6), pp.1325 - 1337. ⟨10.2174/2213275912666190618114014⟩. ⟨hal-02162031⟩
- Accès au bibtex
-
- ref_biblio
- Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, et al.. Solving security constraints for 5G slice embedding: a proof-of-concept. Computers and Security, 2020, 89, pp.101662-1 - 101662-18. ⟨10.1016/j.cose.2019.101662⟩. ⟨hal-02387073⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Quyet Cao Huu, Giyyarpuram Madhusudan, Reza Farahbakhsh, Noel Crespi. Policy-based usage control for a trustworthy data sharing platform in smart cities. Future Generation Computer Systems, 2020, 107, pp.998-1010. ⟨10.1016/j.future.2017.05.039⟩. ⟨hal-01823631⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia‐alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs. Journal of information security and applications, 2020, 54, pp.102562:1-102562:14. ⟨10.1016/j.jisa.2020.102562⟩. ⟨hal-03125762⟩
- Accès au bibtex
-
- ref_biblio
- Matti Hamalainen, Lorenzo Mucchi, Marc Girod-Genet, Tuomas Paso, John Farserotu, et al.. ETSI SmartBAN architecture: the global vision for Smart Body Area Networks. IEEE Access, 2020, 8, pp.150611-150625. ⟨10.1109/ACCESS.2020.3016705⟩. ⟨hal-02937314⟩
- Accès au bibtex
-
- ref_biblio
- Hicham Hossayni, Imran Khan, Mohammad Aazam, Amin Taleghani-Isfahani, Noel Crespi. SemKoRe: improving machine maintenance in industrial IoT with semantic knowledge graphs. Applied Sciences, 2020, 10 (18), pp.6325:1-6325:19. ⟨10.3390/app10186325⟩. ⟨hal-02963831⟩
- Accès au bibtex
-
- ref_biblio
- Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache. Dynamic VNF Forwarding graph extension algorithms. IEEE Transactions on Network and Service Management, 2020, 17 (3), pp.1389-1402. ⟨10.1109/TNSM.2020.2990815⟩. ⟨hal-03119385⟩
- Accès au bibtex
-
- ref_biblio
- Mohamed Ibn Khedher, Houda Jmila, Mounim El Yacoubi. Automatic processing of Historical Arabic Documents: a comprehensive survey. Pattern Recognition, 2020, 100, pp.107144-1:107144-17. ⟨10.1016/j.patcog.2019.107144⟩. ⟨hal-02481354⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jia Liu, Mingchu Li, Yuanfang Chen, Sardar Islam, Noel Crespi. Variational channel estimation with tempering: an artificial intelligence algorithm for wireless intelligent networks. Sensors, 2020, 20 (20), pp.5939:1-5939:19. ⟨10.3390/s20205939⟩. ⟨hal-03126509⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Roberto Minerva, Gyu Myoung Lee, Noel Crespi. Digital twin in the IoT context: a survey on technical features, scenarios, and architectural models. Proceedings of the IEEE, 2020, 108 (10), pp.1785-1824. ⟨10.1109/JPROC.2020.2998530⟩. ⟨hal-02963834⟩
- Accès au bibtex
-
- ref_biblio
- Soheila Molaei, Reza Farahbakhsh, Mostafa Salehi, Noel Crespi. Identifying influential nodes in heterogeneous networks. Expert Systems with Applications, 2020, 160, pp.113580:1-113580:12. ⟨10.1016/j.eswa.2020.113580⟩. ⟨hal-02963837⟩
- Accès au bibtex
-
- ref_biblio
- João Moreira, Luís Ferreira Pires, Marten van Sinderen, Laura Daniele, Marc Girod-Genet. SAREF4health: towards IoT standard-based ontology-driven cardiac e-health systems. Applied Ontology, 2020, 15 (3), pp.385-410. ⟨10.3233/AO-200232⟩. ⟨hal-02937316⟩
- Accès au bibtex
-
- ref_biblio
- Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Hate speech detection and racial bias mitigation in social media based on BERT model. PLoS ONE, 2020, 15 (8), pp.e0237861:1-e0237861:26. ⟨10.1371/journal.pone.0237861⟩. ⟨hal-02963832⟩
- Accès au bibtex
-
- ref_biblio
- Boubakr Nour, Hatem Ibn Khedher, Hassine Moungla, Hossam Afifi, Fan Li, et al.. Internet of things mobility over information-centric/named-data networking. IEEE Internet Computing, 2020, 24 (1), pp.14-24. ⟨10.1109/MIC.2019.2963187⟩. ⟨hal-02460687⟩
- Accès au bibtex
-
- ref_biblio
- David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia‐alfaro. A real-time query log protection method for web search engines. IEEE Access, 2020, 8, pp.87393-87413. ⟨10.1109/ACCESS.2020.2992012⟩. ⟨hal-03125769⟩
- Accès au bibtex
-
- ref_biblio
- Nattakorn Promwongsa, Mohammad Abu-Lebdeh, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, et al.. Ensuring reliability and low cost when using a parallel VNF processing approach to embed delay-constrained slices. IEEE Transactions on Network and Service Management, 2020, 17 (4), pp.2226 - 2241. ⟨10.1109/TNSM.2020.3029108⟩. ⟨hal-02963829⟩
- Accès au bibtex
-
2019
- ref_biblio
- Danya Bachir, Ghazaleh Khodabandelou, Vincent Gauthier, Jakob Puchinger, Mounim El Yacoubi. Inferring dynamic origin-destination flows by transport mode using mobile phone data. Transportation research. Part C, Emerging technologies, 2019, 101, pp.254-275. ⟨10.1016/j.trc.2019.02.013⟩. ⟨hal-02043639⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aziza Ben Mosbah, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal. Enhancing Device-to-Device direct discovery based on predicted user density patterns. Computer Networks, 2019, 151, pp.245 - 259. ⟨10.1016/j.comnet.2019.01.015⟩. ⟨hal-02055714⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yuanfang Chen, Mohsen Guizani, Yan Zhang, Lei Wang, Noel Crespi, et al.. When traffic flow prediction and wireless big data analytics meet. IEEE Network, 2019, 33 (3), pp.161 - 167. ⟨10.1109/MNET.2018.1800134⟩. ⟨hal-01998637⟩
- Accès au bibtex
-
- ref_biblio
- Hwei-Ming Chung, Wen-Tai Li, Chau Yuen, Chao-Kai Wen, Noel Crespi. Electric vehicle charge scheduling mechanism to maximize cost efficiency and user convenience. IEEE Transactions on Smart Grid, 2019, 10 (3), pp.3020 - 3030. ⟨10.1109/TSG.2018.2817067⟩. ⟨hal-01998549⟩
- Accès au bibtex
-
- ref_biblio
- Rebecca Copeland, Michael Copeland, Shohreh Ahvar, Noel Crespi, Oyunchimeg Shagdar, et al.. Automotive virtual edge communicator (AVEC) with vehicular inter-agent service orchestration and resourcing (ViSOR). Annals of Telecommunications - annales des télécommunications, 2019, 74 (9-10), pp.655-662. ⟨10.1007/s12243-019-00719-5⟩. ⟨hal-02363336⟩
- Accès au bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. Misbehavior detection and efficient revocation within VANET. Journal of information security and applications, 2019, 46, pp.193-209. ⟨10.1016/j.jisa.2019.03.001⟩. ⟨hal-02448040⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. Trust model for secure group leader-based communications in VANET. Wireless Networks, 2019, 25 (8), pp.4639 - 4661. ⟨10.1007/s11276-018-1756-6⟩. ⟨hal-01994844⟩
- Accès au bibtex
-
- ref_biblio
- Ghazaleh Khodabandelou, Vincent Gauthier, Marco Fiore, Mounim El Yacoubi. Estimation of static and dynamic urban populations with mobile network metadata. IEEE Transactions on Mobile Computing, 2019, 18 (9), pp.2034-2047. ⟨10.1109/TMC.2018.2871156⟩. ⟨hal-02286129⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ines Khoufi, Anis Laouiti, Cédric Adjih. A survey of recent extended variants of the traveling salesman and vehicle routing problems for Unmanned Aerial Vehicles. Drones, 2019, 3 (3), pp.66:1-30. ⟨10.3390/drones3030066⟩. ⟨hal-02431644⟩
- Accès au bibtex
-
- ref_biblio
- Christophe Kiennert, Ismail Ziad, Hervé Debar, Jean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys, 2019, 51 (5), pp.article 90 -. ⟨10.1145/3232848⟩. ⟨hal-02009646⟩
- Accès au bibtex
-
- ref_biblio
- Christophe Kiennert, Nathan de Vos, Manon Knockaert, Joaquin Garcia-Alfaro. The influence of conception paradigms on data protection in e-learning platforms: a case study. IEEE Access, 2019, 7, pp.64110-64119. ⟨10.1109/ACCESS.2019.2915275⟩. ⟨hal-02281231⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Christophe Kiennert, Pierre-Marie Bajan, Hervé Debar. Evaluating security products: formal model and requirements of a new approach. International Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41. ⟨hal-02281230⟩
- Accès au bibtex
-
- ref_biblio
- Wenbin Liu, Leye Wang, En Wang, Yongjian Yang, Djamal Zeghlache, et al.. Reinforcement learning-based cell selection in sparse mobile crowdsensing. Computer Networks, 2019, 161, pp.102-114. ⟨10.1016/j.comnet.2019.06.010⟩. ⟨hal-02321018⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Wenbin Liu, Yongjian Yang, En Wang, Leye Wang, Djamal Zeghlache, et al.. Multi-dimensional urban sensing in sparse mobile crowdsensing. IEEE Access, 2019, 7, pp.82066-82079. ⟨10.1109/ACCESS.2019.2924184⟩. ⟨hal-02321016⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jorge Eleazar Lopez Coronado, Natalia Kushik, Djamal Zeghlache. Virtual machine placement quality estimation in cloud infrastructures using integer linear programming. Software Quality Journal, 2019, 27 (2), pp.731 - 755. ⟨10.1007/s11219-018-9420-z⟩. ⟨hal-01998560⟩
- Accès au bibtex
-
- ref_biblio
- Meysam Masoudi, Mohammad Galal Khafagy, Alberto Conte, Ali El-Amine, Brian Francoise, et al.. Green mobile networks for 5G and beyond. IEEE Access, 2019, 7, pp.107270-107299. ⟨10.1109/ACCESS.2019.2932777⟩. ⟨hal-03107206⟩
- Accès au bibtex
-
- ref_biblio
- Amir Mohammadinejad, Reza Farahbakhsh, Noel Crespi. Consensus opinion model in online social networks based on influential users. IEEE Access, 2019, 7, pp.28436 - 28451. ⟨10.1109/ACCESS.2019.2894954⟩. ⟨hal-02015221⟩
- Accès au bibtex
-
- ref_biblio
- Sebti Mouelhi, Mohamed-Emine Laarouchi, Daniela Cancila, Hakima Chaouchi. Predictive formal analysis of resilience in cyber-physical systems. IEEE Access, 2019, 7, pp.33741 - 33758. ⟨10.1109/ACCESS.2019.2903153⟩. ⟨hal-02077005⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, et al.. An empirical approach to phishing countermeasures through smart glasses and validation agents. IEEE Access, 2019, 7, pp.130758-130771. ⟨10.1109/access.2019.2940669⟩. ⟨hal-02438600⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Rogier Noldus, Noel Crespi. Global communications newsletter : ICIN 2018: Innovation in Clouds, Internet and Networks. IEEE Communications Magazine, 2019, 57 (1), pp.2 - 4. ⟨10.1109/MCOM.2019.8613265⟩. ⟨hal-02015832⟩
- Accès au bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Scrutinizing news media cooperation in Facebook and Twitter. IEEE Access, 2019, pp.1-14. ⟨10.1109/ACCESS.2019.2902491⟩. ⟨hal-02363341⟩
- Accès au bibtex
-
- ref_biblio
- Yasir Saleem, Noel Crespi, Mubashir Husain Rehmani, Rebecca Copeland. Internet of things-aided smart grid: technologies, architectures, applications, prototypes, and future research directions. IEEE Access, 2019, 7, pp.62962-63003. ⟨10.1109/ACCESS.2019.2913984⟩. ⟨hal-02339293⟩
- Accès au bibtex
-
- ref_biblio
- Abdallah Sobehy, Eric Renault, Paul Mühlethaler. Position certainty propagation: a localization service for Ad-Hoc Networks. Computers, 2019, 8 (1), pp.Article 6. ⟨10.3390/computers8010006⟩. ⟨hal-02178389⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. Online and batch algorithms for VNFs placement and chaining. Computer Networks, 2019, 158, pp.98-113. ⟨10.1016/j.comnet.2019.01.041⟩. ⟨hal-02355987⟩
- Accès au texte intégral et bibtex
-
2018
- ref_biblio
- Abdel-Mehsen Ahmad, Jamil Kassem, Michel Barbeau, Evangelos Kranakis, Steven Porretta, et al.. Doppler effect in the acoustic ultra low frequency band for wireless underwater networks. Mobile Networks and Applications, 2018, 23 (5), pp.1282 - 1292. ⟨10.1007/s11036-018-1036-9⟩. ⟨hal-02013724⟩
- Accès au bibtex
-
- ref_biblio
- Xavier Baró‐solé, Ana E. Guerrero‐roldan, Josep Prieto‐blázquez, Anna Rozeva, Orlin Marinov, et al.. Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experience. Internet technology letters, 2018, 1 (4), pp.e56-1 - e56-6. ⟨10.1002/itl2.56⟩. ⟨hal-02013504⟩
- Accès au bibtex
-
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leila Azouz Saidane. Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network. International Journal of Space-Based and Situated Computing, 2018, 8 (3), pp.169 - 178. ⟨10.1504/IJSSC.2018.097294⟩. ⟨hal-01994662⟩
- Accès au bibtex
-
- ref_biblio
- Holger Butscheidt, Joan Triay, Stefan Arntzen, Igor Faynberg, Bruno Chatras, et al.. Standards news. IEEE Communications Standards Magazine, 2018, 2 (2), pp.10 - 18. ⟨hal-01875376⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Thomas Bourgeau. Internet of Things: building the new digital society. IoT, 2018, 1 (1), pp.1 - 4. ⟨10.3390/iot1010001⟩. ⟨hal-01993717⟩
- Accès au bibtex
-
- ref_biblio
- Mouhamad Dieye, Shohreh Ahvar, Jagruti Sahoo, Ehsan Ahvar, Roch Glitho, et al.. CPVNF: Cost-Efficient Proactive VNF placement and chaining for value-added services in content delivery networks. IEEE Transactions on Network and Service Management, 2018, 15 (2), pp.774 - 786. ⟨10.1109/TNSM.2018.2815986⟩. ⟨hal-01879110⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security (third edition). Computers and Electrical Engineering, 2018, 71, pp.1040 - 1042. ⟨10.1016/j.compeleceng.2018.10.008⟩. ⟨hal-02013479⟩
- Accès au bibtex
-
- ref_biblio
- Nicolas Gensollen, Vincent Gauthier, Monique Becker, Michel Marot. Stability and performance of coalitions of prosumers through diversification in the smart grid. IEEE Transactions on Smart Grid, 2018, 9 (2), pp.963 - 970. ⟨10.1109/TSG.2016.2572302⟩. ⟨hal-01729373⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquin Garcia-Alfaro, Ender Yesid Alvarez Lopez, et al.. Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 2018, 83, pp.535 - 552. ⟨10.1016/j.future.2017.05.043⟩. ⟨hal-01745780⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Hypergraph-driven mitigation of cyber-attacks. Internet technology letters, 2018, 1 (3), pp.e38-1 - e38-6. ⟨10.1002/itl2.38⟩. ⟨hal-02013488⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Using an event data taxonomy to represent the impact of cyber events as geometrical instances. IEEE Access, 2018, 6, pp.8810 - 8828. ⟨10.1109/ACCESS.2017.2740402⟩. ⟨hal-01729364⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohamed Hadded, Anis Laouiti. A study on priority-based centralized TDMA slot scheduling algorithm for Vehicular Ad hoc NETworks. International journal of digital information and wireless communications (IJDIWC), 2018, 8 (2), pp.124 - 128. ⟨10.17781/P002418⟩. ⟨hal-01811257⟩
- Accès au bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. Trust model for group leader selection in VANET. International journal of digital information and wireless communications (IJDIWC), 2018, 8 (2), pp.139 - 143. ⟨10.17781/P002421⟩. ⟨hal-01811243⟩
- Accès au bibtex
-
- ref_biblio
- Sonia Ikken, Eric Renault, Abdelkamel Tari, M. Tahar Kechadi. Exact and heuristical data workflow placement algorithms for big data computing in cloud datacenters. Scalable Computing : Practice and Experience, 2018, 19 (3), pp.223 - 244. ⟨10.12694/scpe.v19i3.1365⟩. ⟨hal-01997451⟩
- Accès au bibtex
-
- ref_biblio
- Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, et al.. CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 2018, 19 (7), pp.2204 - 2220. ⟨10.1109/TITS.2017.2777990⟩. ⟨hal-01846911⟩
- Accès au bibtex
-
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
- Accès au bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on emerging telecommunications technologies, 2018, 29 (7), pp.e3209-1 - e3209-17. ⟨10.1002/ett.3209⟩. ⟨hal-01823618⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Rishikesh Sahay, Luca de Cicco, Joaquin Garcia-Alfaro. Cyber‐physical architecture assisted by programmable networking. Internet technology letters, 2018, 1 (4), pp.e44-1 - e44-8. ⟨10.1002/itl2.44⟩. ⟨hal-01869475⟩
- Accès au bibtex
-
- ref_biblio
- Lei Shu, Mithun Mukherjee, Michael Pecht, Noel Crespi, Son Han. Challenges and research issues of data management in IoT for large-scale petrochemical plants. IEEE Systems Journal, 2018, 12 (3), pp.2509 - 2523. ⟨10.1109/JSYST.2017.2700268⟩. ⟨hal-01681454⟩
- Accès au bibtex
-
- ref_biblio
- Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Viet Hai Ha, Xuan Huyen Do. Time-stamp incremental checkpointing and its application for an optimization of execution model to improve performance of CAPE. Informatica, 2018, 42 (3), pp.301 - 311. ⟨10.31449/inf.v42i3.2244⟩. ⟨hal-01997459⟩
- Accès au bibtex
-
2017
- ref_biblio
- Mayla Alimam, Emmanuel Bertin, Noel Crespi. ITIL perspective on enterprise social media. International Journal of Information Management, 2017, 37 (4), pp.317 - 326. ⟨10.1016/j.ijinfomgt.2017.03.005⟩. ⟨hal-01638376⟩
- Accès au bibtex
-
- ref_biblio
- Bahram Alinia, Mohammad Hajiesmaili, Ahmad Khonsari, Noel Crespi. Maximum-quality tree construction for deadline-constrained aggregation in WSNs. Sensors, 2017, 17 (12), pp.3930 - 3943. ⟨10.1109/JSEN.2017.2701552⟩. ⟨hal-01816340⟩
- Accès au bibtex
-
- ref_biblio
- Mohammad Rida Bahloul, Mohd Zuki Yusoff, Abdel-Haleem Abdel-Aty, Mohamad Naufal Mohamad Saad, Anis Laouiti. Efficient and reliable modulation classification for MIMO systems. Arabian Journal for Science and Engineering, 2017, 42 (12), pp.5201 - 5209. ⟨10.1007/s13369-017-2730-9⟩. ⟨hal-01643275⟩
- Accès au bibtex
-
- ref_biblio
- Yuanfang Chen, Noel Crespi, Antonio M. Ortiz, Lei Shu. Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Information Sciences, 2017, 379, pp.82 - 93. ⟨10.1016/j.ins.2016.07.075⟩. ⟨hal-01419516⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2017, 59, pp.73 - 75. ⟨10.1016/j.compeleceng.2017.05.027⟩. ⟨hal-02013472⟩
- Accès au bibtex
-
- ref_biblio
- Giovanni Giambene, van Anh Le, Thomas Bourgeau, Hakima Chaouchi. Iterative multi-level soft frequency reuse with load balancing for heterogeneous LTE-A systems. IEEE Transactions on Wireless Communications, 2017, 16 (2), pp.924 - 938. ⟨10.1109/TWC.2016.2634536⟩. ⟨hal-01646347⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences, 2017, 83 (1), pp.3 - 21. ⟨10.1016/j.jcss.2016.02.004⟩. ⟨hal-01453253⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Makhlouf Hadji, Djamal Zeghlache. Mathematical programming approach for revenue maximization in cloud federations. IEEE Transactions on Cloud Computing, 2017, 5 (1), pp.99 - 111. ⟨10.1109/TCC.2015.2402674⟩. ⟨hal-01462096⟩
- Accès au bibtex
-
- ref_biblio
- Son Han, Noel Crespi. Semantic service provisioning for smart objects: integrating IoT applications into the web. Future Generation Computer Systems, 2017, 76, pp.180 - 197. ⟨10.1016/j.future.2016.12.037⟩. ⟨hal-01586736⟩
- Accès au bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. VANET Security Challenges and Solutions: A Survey. Vehicular Communications, 2017, 7, pp.7-20. ⟨10.1016/j.vehcom.2017.01.002⟩. ⟨hal-01532780⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fatma Hrizi, Anis Laouiti. Scalable and adaptive overlay for efficient forwarding in volunteer clouds. International Journal of Space-Based and Situated Computing, 2017, 7 (4), pp.217 - 228. ⟨10.1504/IJSSC.2017.089884⟩. ⟨hal-01729389⟩
- Accès au bibtex
-
- ref_biblio
- Dina Hussein Ali, Son N. Han, Gyu Myoung Lee, Noel Crespi, Emmanuel Bertin. Towards a dynamic discovery of smart services in the social internet of things. Computers and Electrical Engineering, 2017, 58, pp.429 - 443. ⟨10.1016/j.compeleceng.2016.12.008⟩. ⟨hal-01820961⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Emad Abd-Elrahman, Ahmed E.Kamal, Hossam Afifi. OPAC: an optimal placement algorithm for virtual CDN. Computer Networks, 2017, 120, pp.12 - 27. ⟨10.1016/j.comnet.2017.04.009⟩. ⟨hal-01740216⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. TrustCall: a trust computation model for web conversational services. IEEE Access, 2017, 5, pp.24376 - 24388. ⟨10.1109/ACCESS.2017.2764955⟩. ⟨hal-01661101⟩
- Accès au bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
- Accès au bibtex
-
- ref_biblio
- Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. Virtualized network functions chaining and routing algorithms. Computer Networks, 2017, 114, pp.95 - 110. ⟨10.1016/j.comnet.2017.01.008⟩. ⟨hal-01471730⟩
- Accès au bibtex
-
- ref_biblio
- Ines Khoufi, Pascale Minet, Anis Laouiti, Saoucene Mahfoudh. Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges. International journal of autonomous and adaptive communications systems, 2017, 10 (4), pp.341-390. ⟨10.1504/IJAACS.2017.10009671⟩. ⟨hal-01095749⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent. Pare-feu: le couteau suisse de la sécurité informatique. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
- Accès au bibtex
-
- ref_biblio
- Marouen Mechtri, Makhlouf Hadji, Djamal Zeghlache. Exact and heuristic resource mapping algorithms for distributed and hybrid clouds. IEEE Transactions on Cloud Computing, 2017, 5 (4), pp.681 - 696. ⟨10.1109/TCC.2015.2427192⟩. ⟨hal-01462097⟩
- Accès au bibtex
-
- ref_biblio
- Marouen Mechtri, Chaima Ghribi, Oussama Soualah, Djamal Zeghlache. NFV orchestration framework addressing SFC challenges. IEEE Communications Magazine, 2017, 55 (6), pp.16 - 23. ⟨10.1109/MCOM.2017.1601055⟩. ⟨hal-01629431⟩
- Accès au bibtex
-
- ref_biblio
- Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
- Accès au bibtex
-
- ref_biblio
- Alexander Motzek, Gustavo Daniel Gonzalez Granadillo, Hervé Debar, Joaquin Garcia-Alfaro, Ralf Moller. Selection of Pareto-efficient response plans based on financial and operational assessments. EURASIP Journal on Information Security, 2017, 2017 (12), pp.1 - 22. ⟨10.1186/s13635-017-0063-6⟩. ⟨hal-01649965⟩
- Accès au bibtex
-
- ref_biblio
- Ayesha Naeem, Rehmani Mubashir Husain, Yasir Saleem, Imran Rashid, Noel Crespi. Network coding in cognitive radio networks : a comprehensive survey. Communications Surveys and Tutorials, IEEE Communications Society, 2017, 19 (3), pp.1945 - 1973. ⟨10.1109/COMST.2017.2661861⟩. ⟨hal-01634173⟩
- Accès au bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Eftihia Nathanail, Noel Crespi. iTrip, a framework to enhance urban mobility by leveraging various data sources. Transportation Research Procedia, 2017, 24, pp.113 - 122. ⟨10.1016/j.trpro.2017.05.076⟩. ⟨hal-01711101⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security, 2017, 2017, pp.8-1 - 8-25. ⟨10.1186/s13635-017-0060-9⟩. ⟨hal-01701167⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. ArOMA: an SDN based autonomic DDoS mitigation framework. Computers and Security, 2017, 70, pp.482 - 499. ⟨10.1016/j.cose.2017.07.008⟩. ⟨hal-01648031⟩
- Accès au bibtex
-
- ref_biblio
- Jose Manuel Sanchez Vilchez, Imen Grida Ben Yahia, Chidung Lac, Noel Crespi. Self-modeling based diagnosis of network services over programmable networks. International Journal of Network Management, 2017, 27 (2), pp.1 - 18. ⟨10.1002/nem.1964⟩. ⟨hal-01660651⟩
- Accès au bibtex
-
- ref_biblio
- Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh, Noel Crespi. NetSpam: a network-based spam detection framework for reviews in online social media. IEEE Transactions on Information Forensics and Security, 2017, 12 (7), pp.1585 - 1595. ⟨10.1109/TIFS.2017.2675361⟩. ⟨hal-01660695⟩
- Accès au bibtex
-
- ref_biblio
- Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquin Garcia-Alfaro, Meng Yao. Secure localization in the presence of colluders in WSNs. Sensors, 2017, 17 (8), pp.1892-1 - 1892-15. ⟨10.3390/s17081892⟩. ⟨hal-01701140⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des télécommunications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
- Accès au bibtex
-
- ref_biblio
- José Ignacio Tamayo Segarra, Bilal Al Jammal, Hakima Chaouchi. New IoT proximity service based heterogeneous RFID readers collision control. PSU research review, 2017, 1 (2), pp.127 - 149. ⟨10.1108/PRR-03-2017-0019⟩. ⟨hal-01646371⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Rebecca Copeland, Noel Crespi, Marc Emmelmann, Andreea Ancuta Corici, et al.. Cross-domain identity and discovery framework for web calling services. Annals of Telecommunications - annales des télécommunications, 2017, 72 (7-8), pp.459 - 468. ⟨10.1007/s12243-017-0587-2⟩. ⟨hal-01596116⟩
- Accès au bibtex
-
2016
- ref_biblio
- Ehsan Ahvar, Gyu Myoung Lee, Son Han, Noel Crespi, Imran Khan. Sensor network-based and user-friendly user location discovery for future smart homes. Sensors, 2016, 16 (7), pp.969-1 - 969-17. ⟨10.3390/s16070969⟩. ⟨hal-01419541⟩
- Accès au bibtex
-
- ref_biblio
- Fereshteh Asgari, Alexis Sultan, Haoyi Xiong, Vincent Gauthier, Mounim El Yacoubi. CT-Mapper: mapping sparse multimodal cellular trajectories using a multilayer transportation network. Computer Communications, 2016, 95, pp.69 - 81. ⟨10.1016/j.comcom.2016.04.014⟩. ⟨hal-01412950⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Michel Barbeau, Gimer Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis. Channel selection using a multiple radio model. Journal of Network and Computer Applications (JNCA), 2016, 64 (C), pp.113 - 123. ⟨10.1016/j.jnca.2016.01.021⟩. ⟨hal-01332350⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Asma Berriri, Natalia Kushik, Djamal Zeghlache. On using finite state models for optimizing and testing SDN controller components. Izvestiâ vysših učebnyh zavedenij. Fizika, 2016, 59 (8/2), pp.5 - 7. ⟨hal-01453257⟩
- Accès au bibtex
-
- ref_biblio
- Yuanfang Chen, Gyu Myoung Lee, Lei Shu, Noel Crespi. Industrial Internet of Things-based collaborative sensing intelligence: framework and research challenges. Sensors, 2016, 16 (215), pp.1 - 19. ⟨10.3390/s16020215⟩. ⟨hal-01275200⟩
- Accès au bibtex
-
- ref_biblio
- Reza Farahbakhsh, Angel Cuevas Rumin, Noel Crespi. Characterization of cross-posting activity for professional users across Facebook, Twitter and Google+. Social Network Analysis and Mining, 2016, 6 (1, article 33), ⟨10.1007/s13278-016-0336-y⟩. ⟨hal-01466243⟩
- Accès au bibtex
-
- ref_biblio
- Xiao Han, Leye Wang, Reza Farahbakhsh, Angel Cuevas Rumin, Rubén Cuevas Rumin, et al.. CSD: a multi-user similarity metric for community recommendation in online social networks. Expert Systems with Applications, 2016, 53, pp.14 - 26. ⟨10.1016/j.eswa.2016.01.003⟩. ⟨hal-01263772⟩
- Accès au bibtex
-
- ref_biblio
- Pinar Kirci, Hakima Chaouchi. Recursive and ad hoc routing based localization in wireless sensor networks. Computer Standards and Interfaces, 2016, 44, pp.258 - 263. ⟨10.1016/j.csi.2015.09.006⟩. ⟨hal-01272062⟩
- Accès au bibtex
-
- ref_biblio
- Antonio Manzalini, Noel Crespi. An edge operating system enabling anything-as-a-service. IEEE Communications Magazine, 2016, 54 (3), pp.62 - 67. ⟨10.1109/MCOM.2016.7432173⟩. ⟨hal-01331989⟩
- Accès au bibtex
-
- ref_biblio
- Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A scalable algorithm for the placement of service function chains. IEEE Transactions on Network and Service Management, 2016, 13 (3), pp.533 - 546. ⟨10.1109/TNSM.2016.2598068⟩. ⟨hal-01355234⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Warren Montgomery, Noel Crespi, Emmanuel Bertin. ICIN 2016 : innovations in clouds, internet, and networks. IEEE Communications Magazine, 2016, 54 (8), pp.8 - 8. ⟨10.1109/MCOM.2016.7537168⟩. ⟨hal-01445618⟩
- Accès au bibtex
-
- ref_biblio
- Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan. Semantic techniques for IoT data and service management: ONTOSMART system. International journal of wireless & mobile networks (IJWMN), 2016, 8 (4), pp.43 - 63. ⟨10.5121/ijwmn.2016.8403⟩. ⟨hal-01360124⟩
- Accès au bibtex
-
- ref_biblio
- Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Hala Salloum. Semantic Smart Home System: OntoSmart to monitor and Assist habitant. International Journal of Computers and Communications, 2016, 10 (16), pp.78 - 86. ⟨hal-01323094⟩
- Accès au bibtex
-
- ref_biblio
- Duy-Huy Nguyen, Hang Nguyen, Éric Renault. WE-MQS: A new LTE Downlink Scheduling Scheme for Voice Services based on User Perception. International Journal of Computer Applications, 2016, 142 (10), pp.28-36. ⟨10.5120/ijca2016909948⟩. ⟨hal-01319434⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Duy-Huy Nguyen, Hang Nguyen, Éric Renault. Predicting VoLTE Quality using Random Neural Network. International Journal of Applied Information Systems, 2016, 11 (3), pp.1-5. ⟨10.5120/ijais2016451587⟩. ⟨hal-01354061⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Adel Mounir Said, Michel Marot, Ashraf William Ibrahim, Hossam Afifi. Modeling interactive real-time applications in VANETs with performance evaluation. Computer Networks, 2016, 104, pp.66 - 78. ⟨10.1016/j.comnet.2016.04.021⟩. ⟨hal-01370160⟩
- Accès au bibtex
-
- ref_biblio
- Khalifa Toumi, Hela Sfar, Joaquin Garcia-Alfaro. Reputation trust mechanism under the organizational-based access control model. Security and communication networks, 2016, 9 (18), pp.5295 - 5310. ⟨10.1002/sec.1698⟩. ⟨hal-01453259⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Leye Wang, Daqing Zhang, Yasha Wang, Chao Chen, Xiao Han, et al.. Sparse mobile crowdsensing: challenges and opportunities. IEEE Communications Magazine, 2016, 54 (7), pp.161 - 167. ⟨10.1109/MCOM.2016.7509395⟩. ⟨hal-01346728⟩
- Accès au bibtex
-
- ref_biblio
- Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier, et al.. iCrowd: near-optimal task allocation for Piggyback Crowdsensing. IEEE Transactions on Mobile Computing, 2016, 15 (8), pp.2010 - 2022. ⟨10.1109/TMC.2015.2483505⟩. ⟨hal-01347999⟩
- Accès au bibtex
-
2015
- ref_biblio
- Joaquin Garcia-Alfaro, Francesco Longo, Gregorio Martinez-Perez. Introduction to the special section on critical systems modelling and security. Computers and Electrical Engineering, 2015, 47, pp.255 - 257. ⟨10.1016/j.compeleceng.2015.11.016⟩. ⟨hal-01332012⟩
- Accès au bibtex
-
- ref_biblio
- Jagadish Ghimire, Mehdi Mani, Noel Crespi, Teerapat Sanguankotchakorn. Delay and capacity analysis of structured P2P overlay for lookup service. Telecommunication Systems, 2015, 58 (1), pp.33 - 54. ⟨10.1007/s11235-014-9872-9⟩. ⟨hal-01285388⟩
- Accès au bibtex
-
- ref_biblio
- Ngoc Son Han, Soochang Park, Gyu Myoung Lee, Noel Crespi. Extending the Devices Profile for Web Services (DPWS) standard using a REST proxy. IEEE Internet Computing, 2015, 19 (1), pp.10 - 17. ⟨10.1109/MIC.2014.44⟩. ⟨hal-01255144v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Xiao Han, Leye Wang, Noel Crespi, Soochang Park, Angel Cuevas Rumin. Alike people, alike interests? Inferring interest similarity in online social networks. Decision Support Systems, 2015, 69, pp.92 - 106. ⟨10.1016/j.dss.2014.11.008⟩. ⟨hal-01285379⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Djamal Zeghlache. Exact multi-objective virtual network embedding in cloud environments. The Computer Journal, 2015, 58 (3), pp.403 - 415. ⟨10.1093/comjnl/bxu154⟩. ⟨hal-01281067⟩
- Accès au bibtex
-
- ref_biblio
- Dina Hussein Ali, Son Han, Gyu Myoung Lee, Noel Crespi. Social cloud-based cognitive reasoning for task-oriented recommendation. IEEE Cloud Computing, 2015, 2 (6), pp.10 - 19. ⟨10.1109/MCC.2015.117⟩. ⟨hal-01331993⟩
- Accès au bibtex
-
- ref_biblio
- Tien Anh Le, Hang Nguyen, Manh Cuong Nguyen. Application-Network Cross Layer Multi-variable Cost Function for Application Layer Multicast of Multimedia Delivery over Convergent Networks. Wireless Networks, 2015, 21 (8), pp.2677-2692. ⟨10.1007/s11276-015-0940-1⟩. ⟨hal-01271802⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Teresa Olivares, Fernando Royo, Noel Crespi, Luis Orozco Barbosa. Smart cross-layer protocol integration for efficient wireless communications. IJAHUC - International Journal of Ad Hoc and Ubiquitous Computing, 2015, 20 (3), pp.148 - 158. ⟨10.1504/IJAHUC.2015.073173⟩. ⟨hal-01344739⟩
- Accès au bibtex
-
- ref_biblio
- Mauro Sergio Pereira Fonseca, Anelise Munaretto, Christian Mendes, Hakima Chaouchi. A resource management framework for 802.11 wireless access networks. Wireless Networks, 2015, 21 (6), pp.1891 - 1898. ⟨10.1007/s11276-015-0893-4⟩. ⟨hal-01272105⟩
- Accès au bibtex
-
- ref_biblio
- Nisha Rani, Shiju Sathyadevan, Eric Renault, Viet Hai Ha. Comparison of checkpointed aided parallel execution against MapReduce. International Journal of Applied Engineering Research, 2015, 10 (11), pp.27513 - 27524. ⟨hal-01452289⟩
- Accès au bibtex
-
- ref_biblio
- Wendong Xiao, Apostolia Papapostolou, Hakima Chaouchi, Ming Wei. Self-organizing map for fingerprinting-based cooperative localization in dynamic indoor environments. Unmanned systems, 2015, 3 (3), pp.171 - 183. ⟨10.1142/S2301385015500119⟩. ⟨hal-01272356⟩
- Accès au bibtex
-
2014
- ref_biblio
- Maria Victoria Beltran Martinez, Emmanuel Bertin, Noel Crespi. User identity for WebRTC services: a matter of trust. IEEE Internet Computing, 2014, 18 (6), pp.18 - 25. ⟨10.1109/MIC.2014.128⟩. ⟨hal-01275214⟩
- Accès au bibtex
-
- ref_biblio
- Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
- Accès au bibtex
-
- ref_biblio
- Yuanfang Chen, Lei Shu, Antonio Ortiz, Noel Crespi, Lin Lv. Locating in crowdsourcing-based dataSpace: wireless indoor localization without special devices. Mobile Networks and Applications, 2014, 19 (4), pp.534-542. ⟨10.1007/s11036-014-0517-8⟩. ⟨hal-02284568⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yang Dingqi, Daqing Zhang, Zhiyong Yu, Zhiwen Yu, Djamal Zeghlache. SESAME: mining user digital footprints for fine-grained preference-aware social media search. ACM Transactions on Internet Technology, 2014, 14 (4), ⟨10.1145/2677209⟩. ⟨hal-01273645⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob. RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security, 2014, 13 (1), pp.63 - 79. ⟨10.1007/s10207-013-0207-8⟩. ⟨hal-01274857⟩
- Accès au bibtex
-
- ref_biblio
- Xiao Han, Angel Cuevas Rumin, Noel Crespi, Rubén Cuevas Rumin, Xiaodi Huang. On exploiting social relationship and personal background for content discovery in P2P networks. Future Generation Computer Systems, 2014, 40, pp.17 - 29. ⟨10.1016/j.future.2014.06.007⟩. ⟨hal-01275204⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti. On the similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on emerging telecommunications technologies, 2014, 25 (2), pp.151 - 154. ⟨10.1002/ett.2600⟩. ⟨hal-01286097⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Dina Hussein, Soochang Park, Son N.Han, Noel Crespi. The cluster between Internet of Things and social networks: review and research challenges. IEEE Internet of Things Journal, 2014, 1 (3), pp.206-215. ⟨10.1109/JIOT.2014.2318835⟩. ⟨hal-02284567⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Meriem Zerkouk, Paulo Armando Cavalcante Aguilar, Abdallah M'Hamed, Jérôme Boudy, Belhadri Messabih. Behavior and capability based access control model for personalized TeleHealthCare assistance. Mobile Networks and Applications, 2014, 19 (3), pp.392 - 403. ⟨10.1007/s11036-014-0516-9⟩. ⟨hal-01263236⟩
- Accès au bibtex
-
2013
- ref_biblio
- Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. Journal of Network and Computer Applications (JNCA), 2013, 36 (2), pp.744 - 755. ⟨10.1016/j.jnca.2012.12.013⟩. ⟨hal-00846121⟩
- Accès au bibtex
-
- ref_biblio
- Angel Cuevas Rumin, Manuel Uruena Pascual, Rubén Cuevas Rumin, Noel Crespi. Reduced overhead for intra-cluster and inter-cluster sensor-to-actor communications in IEEE 802.15.4 networks. IJAHUC - International Journal of Ad Hoc and Ubiquitous Computing, 2013, 14 (4), pp.215 - 225. ⟨10.1504/IJAHUC.2013.058502⟩. ⟨hal-01285950⟩
- Accès au bibtex
-
- ref_biblio
- Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Marechal. Context aware quality of experience for audio-visual service groups. IEEE Communications Letters, 2013, 8 (2), pp.9 - 11. ⟨hal-01299249⟩
- Accès au bibtex
-
- ref_biblio
- Inès Fakhfakh, Hongguang Zhang, Marc Girod-Genet. A P2P platform for collaborative aggregated multimedia sharing. Communications and Network, 2013, 5 (3C), pp.529 - 543. ⟨10.4236/cn.2013.53B2097⟩. ⟨hal-01269726⟩
- Accès au bibtex
-
- ref_biblio
- Reza Farahbakhsh, Noel Crespi, Angel Cuevas Rumin, Rubén Cuevas Rumin, Roberto Gonzalez Sanchez. Understanding the evolution of multimedia content in the Internet through BitTorrent glasses. IEEE Network, 2013, 27 (6), pp.80 - 88. ⟨10.1109/MNET.2013.6678931⟩. ⟨hal-01286029⟩
- Accès au bibtex
-
- ref_biblio
- Khalil Ur Rehman Laghari, Tiago H. Falk, Mansoor Hyder, Michael Haun, Christian Hoene, et al.. An investigation into the relationship between perceived quality-of-experience and virtual acoustic environments : the case of 3D audio telephony. Journal of Universal Computer Science, 2013, 19 (12), pp.1718 - 1735. ⟨10.3217/jucs-019-12-1718⟩. ⟨hal-01279195⟩
- Accès au bibtex
-
2012
- ref_biblio
- Ahmed Soua, Walid Ben-Ameur, Hossam Afifi. Enhancing Broadcast Vehicular Communications Using Beamforming Technique. International Workshop on Vehicular Communications and Networking (VECON), 2012, pp.565. ⟨hal-00761075⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Syue-Ju Syue, Chin-Liang Wang, Teck Aguilar, Vincent Gauthier, Hossam Afifi. Cooperative geographic routing with radio coverage extension for SER-constrained wireless relay networks. IEEE Journal on Selected Areas in Communications, 2012, 30 (2), pp.271 - 279. ⟨10.1109/JSAC.2012.120205⟩. ⟨hal-01306762⟩
- Accès au bibtex
-
2011
- ref_biblio
- Pierre Abi-Char, Bachar El Hassan, Abdallah M'Hamed. An enhanced authenticated key agreement protocol with a neural network-based model for joining-phase in mobile environments. International journal of engineering and industries (IJEI), 2011, 2 (2), pp.103 - 112. ⟨10.4156/ijei.vol2.issue2.11⟩. ⟨hal-01464417⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Walid Ben-Ameur, Djamal Zeghlache. Virtual network provisioning across multiple substrate networks. Computer Networks, 2011, 55 (4), pp.1011 - 1023. ⟨10.1016/j.comnet.2010.12.011⟩. ⟨hal-01354751⟩
- Accès au bibtex
-
2010
- ref_biblio
- Tara Ali Yahiya, Hakima Chaouchi. Fractional frequency reuse for hierarchical resource allocation in mobile WiMAX networks. EURASIP Journal on Wireless Communications and Networking, 2010, 2010, pp.1 - 7. ⟨10.1155/2010/363065⟩. ⟨hal-01306148⟩
- Accès au bibtex
-
- ref_biblio
- Ebtisam Amar, Selma Boumerdassi, Eric Renault. Hierarchical location service with prediction in mobile ad-hoc networks. International Journal of Computer Networks & Communications , 2010, 2 (2), pp.59 - 72. ⟨hal-01356188⟩
- Accès au bibtex
-
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. Sécurité dans les réseaux 802.11. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2010, TE7377. ⟨hal-01355251⟩
- Accès au bibtex
-
- ref_biblio
- Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers and Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers and Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Badii Jouaber, Djamal Zeghlache. Topology control and routing in large scale wireless sensor networks. Wireless Sensor Network, 2010, 2 (8), pp.584 - 598. ⟨10.4236/wsn.2010.28070⟩. ⟨hal-01355079⟩
- Accès au bibtex
-
2009
- ref_biblio
- Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Noel Crespi. Converging web 2.0 with telecommunications. eStrategies projects, 2009, 10, pp.108 - 109. ⟨hal-01357437⟩
- Accès au bibtex
-
- ref_biblio
- Khalil Ur Rehman Laghari, Imen Grida Ben Yahia, Noel Crespi. Analysis of telecommunication management technologies. MASAUM journal of reviews and surveys (MJRS), 2009, 1 (2), pp.152 - 166. ⟨hal-00434496⟩
- Accès au bibtex
-
2008
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 14. ⟨hal-01355033⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Making the most of mobile service architecture. eStrategies projects, 2008. ⟨hal-00435111⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, N. Boulahia-Cuppens, F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 2008, 7 (2), pp.103-122. ⟨10.1007/s10207-007-0045-7⟩. ⟨hal-03628752⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Hakima Chaouchi. Des réseaux ad hoc économiquement viables. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 11. ⟨hal-01355035⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent. Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent. Sécurité des systèmes P2P de sauvegarde distribuée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2008, 16. ⟨hal-01355031⟩
- Accès au bibtex
-
- ref_biblio
- Wajdi Louati, Ines Louati-Houidi, M. Kharrat, Djamal Zeghlache, Hormuzd M. Khosravi. Dynamic service deployment in a distributed heterogeneous cluster based router (DHCR). Cluster Computing, 2008, 11 (4), pp.355 - 372. ⟨10.1007/s10586-008-0056-9⟩. ⟨hal-01372423⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Mani, Noel Crespi. How IMS enables converged services for cable and 3G technologies : a survey. EURASIP Journal on Wireless Communications and Networking, 2008, 8 (3), pp.1 - 14. ⟨10.1155/2008/589623⟩. ⟨hal-00435065⟩
- Accès au bibtex
-
2007
- ref_biblio
- Maryline Laurent. Les architectures de fédération d'identité et la garantie de notre vie privée. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2007, 9. ⟨hal-01355037⟩
- Accès au bibtex
-
2006
- ref_biblio
- Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquin Garcia‐alfaro, Sylvain Gombault, et al.. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network. Annals of Telecommunications - annales des télécommunications, 2006, 61 (1-2), pp.197-217. ⟨10.1007/BF03219974⟩. ⟨hal-03646855⟩
- Accès au texte intégral et bibtex
-
2005
- ref_biblio
- Joaquin Garcia‐alfaro, Sergio Castillo, Guillermo Navarro-Arribas, Joan Borrell. ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System. International Journal of Computer Science and Network Security, 2005, 5 (11), pp.87-94. ⟨hal-03628711⟩
- Accès au bibtex
-
2003
- ref_biblio
- Maryline Laurent. Protocole IPsec. Techniques de l'Ingénieur. Sécurité des systèmes d'information, 2003, TE7545. ⟨hal-01331303⟩
- Accès au bibtex
-
Conference papers
2023
- ref_biblio
- Nischal Aryal, Emmanuel Bertin, Noel Crespi. Open Radio Access Network challenges for Next Generation Mobile Network. Conference on Innovation in Clouds, Internet and Networks, Mar 2023, Paris, France. ⟨hal-03967401⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Amirhesam Badeanlou, Andrea Araldo, Marco Diana, Vincent Gauthier. Equity Scores for Public Transit Lines from Open-Data and Accessibility Measures. Transportation Research Board (TRB) 102nd Annual Meeting, TRB, Jan 2023, Washington, United States. ⟨hal-03803816⟩
- Accès au bibtex
-
- ref_biblio
- Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquin Garcia‐alfaro, Reda Yaich. Exploring the quantitative resilience analysis of cyber-physical systems. IFIP Networking 2023 - IOCRCI, Jun 2023, Barcelone, France. ⟨hal-04083180⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. User profile and mobile number portability for beyond 5G: blockchain-based solution. 26th Conference on Innovation in Clouds, Internet and Networks (ICIN), Mar 2023, Paris, France. ⟨hal-04003862⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Omar Houidi, Sihem Bakri, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, et al.. AMAC: Attention-based Multi-Agent Cooperation for Smart Load Balancing. 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS 2023), May 2023, Miami, FL, United States. ⟨hal-03931985⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khouloud Mnassri, Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Hate speech and offensive language detection using an emotion-aware shared encoder. IEEE International Conference on Communications (ICC), May 2023, Roma, Italy, France. ⟨hal-04003849⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sara Ranjbaran, Amir Reza Jafari, Noel Crespi. Socially aware multi-resource tradingnfor IoT applications in smart cities using auction theory. Conference on Cloud and Internet of Things (CIoT), Mar 2023, Lisbon (Portugal), Portugal. ⟨hal-04012323⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Syed Mohsan Raza, Roberto Minerva, Noel Crespi, Mehdi Karech. Definition Of Digital Twin Network Data Model in The Context of Edge-Cloud Continuum. IEEE International Conference on Network Softwarization (NetSoft 2023), Jun 2023, Madrid, Spain. ⟨hal-04097541⟩
- Accès au texte intégral et bibtex
-
2022
- ref_biblio
- Andrea Araldo, André Depalma, Souhila Arib, Vincent Gauthier, Romain Sere, et al.. Pooling for first and last mile: integrating carpooling and transit. hEART 2022: 10th symposium of the European Association for Research in Transportation, Jun 2022, Leuven, Belgium. ⟨hal-03698443⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nischal Aryal, Fariba Ghaffari, Saeid Rezaei, Emmanuel Bertin, Noel Crespi. Private cellular network deployment: comparison of openAirInterface with magma core. 2022 18th International Conference on Network and Service Management (CNSM), Oct 2022, Thessaloniki, Greece. pp.364-366, ⟨10.23919/CNSM55787.2022.9964713⟩. ⟨hal-03959478⟩
- Accès au bibtex
-
- ref_biblio
- Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. Data-driven evaluation of intrusion detectors: a methodological framework. FPS 2022 - 15th International Symposium on Foundations & Practice of Security, Dec 2022, Ottawa, ON, Canada. pp.142-157, ⟨10.1007/978-3-031-30122-3_9⟩. ⟨hal-04055085⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fetia Bannour, Stefania Dumbrava, Damien Lu. A flexible GraphQL northbound API for intent-based SDN applications. 2022 IEEE/IFIP Network Operations and Management Symposium(NOMS), Apr 2022, Budapest, Hungary. pp.1-5, ⟨10.1109/NOMS54207.2022.9789785⟩. ⟨hal-03801341⟩
- Accès au bibtex
-
- ref_biblio
- Fetia Bannour, Stefania Dumbrava, Alex Danduran--Lembezat. GOX: towards a scalable graph database-driven SDN controller. 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), Politecnico di Milano, Jun 2022, Milan, Italy. pp.278-280, ⟨10.1109/NetSoft54395.2022.9844075⟩. ⟨hal-03801233⟩
- Accès au bibtex
-
- ref_biblio
- Sandrine Bayle, Joaquin Garcia‐alfaro. Plateforme de sécurisation des villes: le projet européen IMPETUS. Colloque IMT - Gestion de crise et numérique : nouvelles menaces et nouvelles solutions, Mar 2022, Palaiseau, France. ⟨emse-03624167⟩
- Accès au bibtex
-
- ref_biblio
- Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. SOK: a comprehensive survey on distributed ledger technologies. ICBC 2022 : IEEE International Conference on Blockchain and Cryptocurrency, May 2022, Shanghai, China. pp.1-16, ⟨10.1109/ICBC54727.2022.9805533⟩. ⟨hal-03609651⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. Untangling the overlap between Blockchain and DLTs. SAI 2022: Computing Conference, Jul 2022, London (online), United Kingdom. pp.483-505, ⟨10.1007/978-3-031-10467-1_30⟩. ⟨hal-03609510⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Najoua Benalaya, Cedric Adjih, Anis Laouiti, Ichrak Amdouni, Leila Saidane. UAV search path planning for livestock monitoring. 2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN), Nov 2022, Rome, Italy. pp.1-6, ⟨10.23919/PEMWN56085.2022.9963839⟩. ⟨hal-03935450⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Antoine Bernard, Mohammed Laroui, Michel Marot, Sandoche Balakrichenan, Hassine Moungla, et al.. Prefetching of mobile devices information: a DNS perspective. ICC2022: IEEE International Conference on Communications, IEEE, May 2022, Seoul, South Korea. pp.1-7, ⟨10.1109/ICC45855.2022.9838564⟩. ⟨hal-03431410v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. Blockchain-based user profile and mobile number portability for beyond 5G mobile communication networks. 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Sep 2022, Paris, France. pp.75-78, ⟨10.1109/BRAINS55737.2022.9908596⟩. ⟨hal-03959391⟩
- Accès au bibtex
-
- ref_biblio
- Komal Gilani, Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. Self-sovereign identity management framework using smart contracts. NOMS 2022: IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-7, ⟨10.1109/NOMS54207.2022.9789831⟩. ⟨hal-03563470⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jialin Hao, Rola Naja, Djamal Zeghlache. Drone-assisted lane change maneuver using reinforcement learning with dynamic reward function. IEEE 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2022, Thessaloniki, Greece. pp.314-320, ⟨10.1109/WiMob55322.2022.9941534⟩. ⟨hal-03887747⟩
- Accès au bibtex
-
- ref_biblio
- Omar Houidi, Sihem Bakri, Djamal Zeghlache. Multi-agent graph convolutional reinforcement learning for intelligent load balancing. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium(NOMS), Apr 2022, Budapest, Hungary. pp.1-6, ⟨10.1109/NOMS54207.2022.9789872⟩. ⟨hal-03887748⟩
- Accès au bibtex
-
- ref_biblio
- Omar Houidi, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, et al.. Constrained deep reinforcement learning for smart load balancing. 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Jan 2022, Las Vegas (Virtual), United States. pp.207-215, ⟨10.1109/CCNC49033.2022.9700657⟩. ⟨hal-03889321⟩
- Accès au bibtex
-
- ref_biblio
- Wei Huang, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber. Dimensioning resources of network slices for energy-performance trade-off. ISCC 2022 : 27th IEEE Symposium on Computers and Communications, Jun 2022, Rhodes Island, Greece. ⟨10.1109/ISCC55528.2022.9912821⟩. ⟨hal-03662552⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khouloud Hwerbi, Najoua Benalaya, Ichrak Amdouni, Anis Laouiti, Cédric Adjih, et al.. A Survey on the opportunities of blockchain and UAVs in agriculture. PEMWN 2022 - The 11th IFIP/IEEE international conference on performance evaluation and modeling in wired and wireless networks, Nov 2022, Rome, Italy. pp.1-6, ⟨10.23919/PEMWN56085.2022.9963871⟩. ⟨hal-03935440⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Imen Jerbi, Nour Assy, Mohamed Sellami, Sami Bhiri, Olivier Tirat, et al.. Enabling multi-provider cloud network service bundling. 2022 IEEE International Conference on Web Services (ICWS), Jul 2022, Barcelona, Spain. pp.405-414, ⟨10.1109/ICWS55610.2022.00067⟩. ⟨hal-03782791⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maya Kassis, Massinissa Ait Aba, Hind Castel-Taleb, Maxime Elkael, Andrea Araldo, et al.. Integrated deployment prototype for virtual network orchestration solution. NOMS 2022: IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-3, ⟨10.1109/NOMS54207.2022.9789812⟩. ⟨hal-03695139⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Detecting APT through graph anomaly detection. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675346⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khouloud Mnassri, Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. BERT-based ensemble approaches for hate speech detection. 2022 IEEE Global Communications Conference (GLOBECOM ), Dec 2022, Rio de Janeiro, Brazil. pp.4649-4654, ⟨10.1109/GLOBECOM48099.2022.10001325⟩. ⟨hal-04002300⟩
- Accès au bibtex
-
- ref_biblio
- Meroua Moussaoui, Emmanuel Bertin, Noel Crespi. Telecom business models for beyond 5G and 6G networks: towards disaggregation?. 2022 1st International Conference on 6G Networking (6GNet), Jul 2022, Paris, France. pp.1-8, ⟨10.1109/6GNet54646.2022.9830514⟩. ⟨hal-04005533⟩
- Accès au bibtex
-
- ref_biblio
- Meroua Moussaoui, Nischal Aryal, Emmanuel Bertin, Noel Crespi. Distributed ledger technologies for cellular networks and beyond 5G: a survey. 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Sep 2022, Paris, France. pp.37-44, ⟨10.1109/BRAINS55737.2022.9908598⟩. ⟨hal-04005544⟩
- Accès au bibtex
-
- ref_biblio
- Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache. Dynamic link network emulation: a model-based design. 17th International Conference on Evaluation of Novel Approaches to Software Engineering, Apr 2022, Online Streaming, France. pp.536-543, ⟨10.5220/0011091100003176⟩. ⟨hal-03953769⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Erick Petersen, Jorge Lopez, Natalia Kushik, Claude Poletti, Djamal Zeghlache. On using cellular automata for modeling the evolution of dynamic-link network parameters. 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA), Dec 2022, Boston, United States. pp.297-301, ⟨10.1109/NCA57778.2022.10013557⟩. ⟨hal-03953846⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Huy Tran Quang, Omar Houidi, Javier Errea-Moreno, Dominique Verchère, Djamal Zeghlache. MAGC-RSA: multi-agent graph convolutional reinforcement learning for distributed routing and spectrum assignment in elastic optical networks. 2022 European Conference on Optical Communication (ECOC), Sep 2022, Basel, Switzerland. pp.Mo4B.3. ⟨hal-03973109⟩
- Accès au bibtex
-
- ref_biblio
- Olivier Rioul, Hang Nguyen. Non-asymptotic bounds of point-to-point communication with or without perfect feedback using alpha-information theory. ICCE 2022: IEEE 9th International Conference on Communications and Electronics (ICCE 2022), Jul 2022, Nha Trang, Vietnam. ⟨10.1109/ICCE55644.2022.9852067⟩. ⟨hal-03718719⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. Towards generic quality assessment of synthetic traffic for evaluating intrusion detection systems. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675359⟩
- Accès au texte intégral et bibtex
-
2021
- ref_biblio
- Massinissa Ait Aba, Maxime Elkael, Badii Jouaber, Hind Castel-Taleb, Andrea Araldo, et al.. A two-stage algorithm for the Virtual Network Embedding problem. LCN 2021: 46th conference on Local Computer Networks, Oct 2021, Edmonton (online), Canada. pp.395-398, ⟨10.1109/LCN52139.2021.9524968⟩. ⟨hal-03524809⟩
- Accès au bibtex
-
- ref_biblio
- Reda Ayassi, Ahmed Triki, Maxime Laye, Esther Le Rouzic, Noel Crespi, et al.. Bayesian optimization-based algorithm to improve the quality of transmission estimation. Advanced Photonics Conference 2021, Jul 2021, Washington DC (virtual), United States. pp.NeF2B.3, ⟨10.1364/NETWORKS.2021.NeF2B.3⟩. ⟨hal-03254064⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sandoche Balakrichenan, Antoine Bernard, Michel Marot, Benoit Ampeau. IoTRoam: design and implementation of an open LoRaWAN roaming architecture. IEEE Global Communications Conference (GLOBECOM), Dec 2021, Madrid, Spain. ⟨hal-03100628v3⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui. DCEA: a reference model for distributed ledger technologies. ICBC 2021: IEEE International Conference on Blockchain and Cryptocurrency, May 2021, Sydney (online), Australia. pp.1-2, ⟨10.1109/ICBC51069.2021.9461129⟩. ⟨hal-03168829⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Antoine Bernard, Aicha Dridi, Michel Marot, Hossam Afifi, Sandoche Balakrichenan. Embedding ML algorithms onto LPWAN sensors for compressed communications. PIMRC 2021: 32nd International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2021, Helsinki (virtual), Finland. pp.1539-1545, ⟨10.1109/PIMRC50174.2021.9569714⟩. ⟨hal-03312481⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chérifa Boucetta, Boubakr Nour, Albéric Cusin, Hassine Moungla. QoS in IoT networks based on link quality prediction. IEEE International Conference on Communications (ICC), 2021, Montreal (virtual), Canada. pp.1-7, ⟨10.1109/ICC42927.2021.9500396⟩. ⟨hal-03162826⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Igor Burdonov, Alexandre Kossachev, Nina Yevtushenko, Jorge López, Natalia Kushik, et al.. Preventive model-based verification and repairing for SDN requests. ENASE 2021: 16th International Conference on Evaluation of Novel Approaches to Software Engineering, Apr 2021, Online, France. pp.421-428, ⟨10.5220/0010494504210428⟩. ⟨hal-03549088⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Hossam Afifi, Hassine Moungla, Chérifa Boucetta. Transfer learning for classification and prediction of time series for next generation networks. IEEE International Conference on Communications (ICC), 2021, Montreal (virtual), Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500507⟩. ⟨hal-03323896⟩
- Accès au bibtex
-
- ref_biblio
- Maxime Elkael, Hind Castel-Taleb, Badii Jouaber, Andrea Araldo, Massinissa Ait Aba. Improved Monte Carlo Tree Search for virtual network embedding. LCN 2021: 46th Conference on Local Computer Networks, Oct 2021, Edmonton (online), Canada. pp.605-612, ⟨10.1109/LCN52139.2021.9524975⟩. ⟨hal-03524805⟩
- Accès au bibtex
-
- ref_biblio
- Hassan Fawaz, Djamal Zeghlache, Quang Tran Anh Pham, Leguay Jérémie, Medagliani Paolo. Deep reinforcement learning for smart queue management. NETSYS 2021: Conference on Networked Systems 2021, TU Berlin, Sep 2021, Lübeck (online), Germany. pp.1-14, ⟨10.14279/tuj.eceasst.80.1139⟩. ⟨hal-03546621⟩
- Accès au bibtex
-
- ref_biblio
- Fariba Ghaffari, Emmanuel Bertin, Noel Crespi. A novel approach for network resource sharing via blockchain. SIGCOMM 2021: ACM Special Interest Group on Data Communication, Aug 2021, Virtual, Unknown Region. pp.50-52, ⟨10.1145/3472716.3472867⟩. ⟨hal-03277501⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based privacy aware distributed access management framework for industry 4.0. WETICE 2021: IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, Oct 2021, Bayonne (online), France. pp.51-56, ⟨10.1109/WETICE53228.2021.00021⟩. ⟨hal-03591078⟩
- Accès au bibtex
-
- ref_biblio
- Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
- Accès au bibtex
-
- ref_biblio
- Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia‐alfaro. Ontology-based attack graph enrichment. TIEMS 2021: 28th International Emergency Management Society annual conference, Dec 2021, Online, France. ⟨hal-03628443⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Oussama Serhane, Khadidja Yahyaoui, Boubakr Nour, Hassine Moungla. Energy-aware Cache Placement Scheme for IoT-based ICN Networks. ICC 2021: IEEE International Conference on Communications, Jun 2021, Montreal (virtual), Canada. pp.1-6, ⟨10.1109/ICC42927.2021.9500341⟩. ⟨hal-03161227⟩
- Accès au texte intégral et bibtex
-
2020
- ref_biblio
- Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar. Automated saturation mitigation controlled by deep reinforcement learning. ICNP 2020: IEEE 28th International Conference on Network Protocols, Oct 2020, Madrid (online), Spain. pp.1-6, ⟨10.1109/ICNP49622.2020.9259356⟩. ⟨hal-03124039⟩
- Accès au bibtex
-
- ref_biblio
- Reda Ayassi, Ahmed Triki, M Laye, Noel Crespi, Roberto Minerva, et al.. An overview on machine learning-based solutions to improve lightpath QoT estimation. ICTON 2020: 22nd International Conference on Transparent Optical Networks, Jul 2020, Bari (online), Italy. pp.1-4, ⟨10.1109/ICTON51198.2020.9203755⟩. ⟨hal-03161225⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Michel Barbeau, Frederic Cuppens, Nora Cuppens, Dagnas, Romain, Joaquin Garcia‐alfaro. Metrics to enhance the resilience of cyber-physical systems. TRUSTCOM 2020: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Dec 2020, Guangzhou (online), China. pp.1167-1172, ⟨10.1109/TrustCom50675.2020.00156⟩. ⟨hal-03125741⟩
- Accès au bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Capacity requirements in networks of quantum repeaters and terminals. QCE 2020: IEEE International Conference on Quantum Computing and Engineering, Oct 2020, Denver (online), United States. pp.148-157, ⟨10.1109/QCE49297.2020.00028⟩. ⟨hal-03125753⟩
- Accès au bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia‐alfaro, Evangelos Kranakis. Geocaching-inspired navigation for micro aerial vehicles with fallible place recognition. ADHOC-NOW 2020: 19th International Conference on Ad Hoc Networks and Wireless, Oct 2020, Bari (online), Italy. pp.55-70, ⟨10.1007/978-3-030-61746-2_5⟩. ⟨hal-03125760⟩
- Accès au bibtex
-
- ref_biblio
- Antoine Bernard, Sandoche Balakrichenan, Michel Marot, Benoit Ampeau. DNS-based dynamic context resolution for SCHC. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin (online), Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148910⟩. ⟨hal-03122177⟩
- Accès au bibtex
-
- ref_biblio
- Chérifa Boucetta, Aicha Dridi, Hossam Afifi, Ahmed Kamal, Hassine Moungla. Heuristic optimization algorithms for QoS management in UAV assisted cellular networks. IEEE Global Communications Conference (GLOBECOM), 2020, Taipei, Taiwan. pp.1-6, ⟨10.1109/GLOBECOM42002.2020.9322243⟩. ⟨hal-03135729⟩
- Accès au bibtex
-
- ref_biblio
- François Contat, Grégory Bénassy, Julien Buttin Le Meur, Olivier Levillain. Que faut-il attendre de DNS-over-HTTPS ?. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114209⟩
- Accès au bibtex
-
- ref_biblio
- Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aida Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
- Accès au bibtex
-
- ref_biblio
- Abou-Bakr Djaker, Bouabdellah Kechar, Hatem Ibn-Khedher, Hassine Moungla, Hossam Afifi. Scalable and cost efficient maximum concurrent flow over IoT using reinforcement learning. IWCMC 2020: 16th International Wireless Communications and Mobile Computing conference, Jun 2020, Limassol (online), Cyprus. pp.539-544, ⟨10.1109/IWCMC48107.2020.9148257⟩. ⟨hal-03119533⟩
- Accès au bibtex
-
- ref_biblio
- Abou-Bakr Djaker, Bouabdellah Kechar, Hossam Afifi, Hassine Moungla. A maximum concurrent flow technique for optimized data routing in IoT architectures. CCNC 2020: 17th annual Consumer Communications & Networking Conference, Jan 2020, Las Vegas, United States. pp.1-2, ⟨10.1109/CCNC46108.2020.9045575⟩. ⟨hal-03119535⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Hassine Moungla, Hossam Afifi, Jordi Badosa, Florence Ossart, et al.. Machine learning application to priority scheduling in smart microgrids. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (online), Cyprus. pp.1695-1700, ⟨10.1109/IWCMC48107.2020.9148096⟩. ⟨hal-03135745⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Hatem Khedher, Hassine Moungla, Hossam Afifi. An artificial intelligence approach for time series next generation applications. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin (online), Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148931⟩. ⟨hal-03135754⟩
- Accès au bibtex
-
- ref_biblio
- Omair Faraj, David Megias, Abdel-Mehsen Ahmad, Joaquin Garcia‐alfaro. Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. ARES 2020: 15th international conference on Availability, Reliability and Security, Aug 2020, Dubin (online), Ireland. pp.79:1-79:10, ⟨10.1145/3407023.3407048⟩. ⟨hal-03125767⟩
- Accès au bibtex
-
- ref_biblio
- Fariba Ghaffari, Emamnuel Bertin, Julien Hatin, Noel Crespi. Authentication and access control based on distributed ledger technology: A survey. BRAINS 2020: 2nd conference on Blockchain Research & Applications for Innovative Networks and Services, Sep 2020, Paris (online), France. pp.79-86, ⟨10.1109/BRAINS49436.2020.9223297⟩. ⟨hal-02963841⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi. A survey on blockchain-based identity management and decentralized privacy for personal data. BRAIN 2020: 2nd conference on Blockchain Research & Applications for Innovative Networks and Services, Sep 2020, Paris, France. pp.97-101, ⟨10.1109/BRAINS49436.2020.9223312⟩. ⟨hal-02650705⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache. An enhanced reinforcement learning approach for dynamic placement of virtual network functions. IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications(PIMRC), Aug 2020, London, United Kingdom. ⟨10.1109/PIMRC48278.2020.9217250⟩. ⟨hal-03973124⟩
- Accès au bibtex
-
- ref_biblio
- Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maxime Labonne, Alexis Olivereau, Baptiste Polve, Djamal Zeghlache. Unsupervised protocol-based intrusion detection for real-world networks. ICNC 2020: International Conference on Computing, Networking and Communications, Feb 2020, Big Island, United States. pp.299-303, ⟨10.1109/ICNC47757.2020.9049796⟩. ⟨cea-02555669⟩
- Accès au bibtex
-
- ref_biblio
- Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin. An Event-B based approach for formal modelling and verification of smart contracts. AINA 2020: 34th International Conference on Advanced Information Networking and Applications, Apr 2020, Caserta, Italy. pp.1303-1318, ⟨10.1007/978-3-030-44041-1_111⟩. ⟨hal-02928201⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohammed Laroui, Moussa Ali Cherif, Hatem Khedher, Hassine Moungla, Hossam Afifi. Scalable and cost efficient resource allocation algorithms using deep reinforcement learning. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (online), Cyprus. pp.946-951, ⟨10.1109/IWCMC48107.2020.9148286⟩. ⟨hal-03135751⟩
- Accès au bibtex
-
- ref_biblio
- Mohammed Laroui, Boubakr Nour, Hassine Moungla, Hossam Afifi, Moussa Ali Cherif. Mobile vehicular edge computing architecture using rideshare taxis as a mobile edge server. CCNC 2020: IEEE 17th Annual Consumer Communications & Networking Conference, Jan 2020, Las Vegas, United States. pp.1-2, ⟨10.1109/CCNC46108.2020.9045741⟩. ⟨hal-03163225⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohammed Laroui, Hatem Khedher, Hassine Moungla, Hossam Afifi, Ahmed Kamal. Virtual Mobile Edge Computing based on IoT devices resources in smart cities. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin, Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148982⟩. ⟨hal-03114379⟩
- Accès au bibtex
-
- ref_biblio
- Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services: an application to demand response protocols. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
- Accès au bibtex
-
- ref_biblio
- Olivier Levillain. GASP: a Generic Approach to Secure network Protocols. RESSI 2020: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Evry (online), France. ⟨hal-03114203⟩
- Accès au bibtex
-
- ref_biblio
- Olivier Levillain. Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits. CRiSIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris (en ligne), France. pp.87-104, ⟨10.1007/978-3-030-68887-5_5⟩. ⟨hal-03114218⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ingrid Moerman, Djamal Zeghlache, Adnan Shahid, Joao Santos, Luiz Dasilva, et al.. Mandate-driven networking eco-system: a paradigm shift in end-to-end communications. 6G SUMMIT: 2nd 6G wireless summit, Mar 2020, Levi (online), Finland. pp.1-6, ⟨10.1109/6GSUMMIT49458.2020.9083766⟩. ⟨hal-03119386⟩
- Accès au bibtex
-
- ref_biblio
- Naman Negi, Ons Jelassi, Hakima Chaouchi, Stéphan Clémençon. Distributed online Data Anomaly Detection for connected vehicles. ICAIIC 2020: 2nd International Conference on Artificial Intelligence in Information and Communication, Feb 2020, Fukuoka, Japan. pp.494-500, ⟨10.1109/ICAIIC48513.2020.9065280⟩. ⟨hal-03126876⟩
- Accès au bibtex
-
- ref_biblio
- Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. LockDown: balance availability attack against lightning network channels. FC 2020: 24th international conference on Financial Cryptography and Data Security, Feb 2020, Sabah, Malaysia. pp.245-263, ⟨10.1007/978-3-030-51280-4_14⟩. ⟨hal-03125777⟩
- Accès au bibtex
-
- ref_biblio
- Erick Petersen, Jorge Lopez, Natalia Kushik, Claude Poletti, Djamal Zeghlache. On using SMT-solvers for modeling and verifying dynamic network emulators: (work in progress). NCA 2020: IEEE 19th International Symposium on Network Computing and Applications, Nov 2020, Cambridge (online), United States. pp.1-3, ⟨10.1109/NCA51143.2020.9306731⟩. ⟨hal-03119384⟩
- Accès au bibtex
-
- ref_biblio
- Aina Toky Rasoamanana, Olivier Levillain. Wombat : one more Bleichenbacher toolkit. SSTIC 2020: Symposium sur la sécurité des technologies de l'information et des communications, Jun 2020, Rennes (en ligne), France. ⟨hal-03114212⟩
- Accès au bibtex
-
- ref_biblio
- Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩. ⟨hal-03115317⟩
- Accès au bibtex
-
- ref_biblio
- Abdallah Sobehy, Eric Renault, Paul Mühlethaler. CSI-MIMO: K-nearest neighbor applied to indoor localization. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin / Virtual, Ireland. pp.1-6. ⟨hal-02491175⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh. A new lower cost UL split option for ultra-low latency 5G fronthaul. IWCMC 2020: 16th International Wireless Communications and Mobile Computing, Jun 2020, Limassol (virtual), Cyprus. pp.1872-1878, ⟨10.1109/IWCMC48107.2020.9148420⟩. ⟨hal-03116112⟩
- Accès au bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sarah Akbarzadeh. Split analysis and fronthaul dimensioning in 5G C-RAN to guarantee ultra low latency. CCNC 2020: IEEE 17th Annual Consumer Communications Networking Conference, Jan 2020, Las Vegas, United States. pp.1-4, ⟨10.1109/CCNC46108.2020.9045398⟩. ⟨hal-03116035⟩
- Accès au bibtex
-
- ref_biblio
- Clement Weill, Alexis Olivereau, Djamal Zeghlache. Configuration of the detection function in a distributed IDS using game theory. ICIN 2020: 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris (online), France. pp.210-215, ⟨10.1109/ICIN48450.2020.9059373⟩. ⟨hal-03119389⟩
- Accès au bibtex
-
- ref_biblio
- Koosha Zarei, Damilola Ibosiola, Reza Farahbakhsh, Zafar Gilani, Kiran Garimella, et al.. Characterising and detecting sponsored influencer posts on Instagram. ASONAM 2020: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Dec 2020, The Hague (virtual), Netherlands. pp.327-331, ⟨10.1109/ASONAM49781.2020.9381309⟩. ⟨hal-03044105⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi. How impersonators exploit Instagram to generate fake engagement?. ICC 2020: IEEE International Conference on Communications, Jun 2020, Dublin, Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9149431⟩. ⟨hal-02459825⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. Impersonation on social media: a deep neural approach to identify ingenuine content. ASONAM 2020: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Dec 2020, The Hague (virtual), Netherlands. pp.11-15, ⟨10.1109/ASONAM49781.2020.9381437⟩. ⟨hal-02971399⟩
- Accès au texte intégral et bibtex
-
2019
- ref_biblio
- Oumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih. An IoT-blockchain architecture based on hyperledger framework for health care monitoring application. NTMS 2019 - 10th IFIP International Conference on New Technologies, Mobility and Security, Jun 2019, Canary islands, Spain. pp.1-5, ⟨10.1109/NTMS.2019.8763849⟩. ⟨hal-02434834⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar. Methodology of a network simulation in the context of an evaluation: application to an IDS. ICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩. ⟨hal-02176684⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamza Baqa, Nguyen B Truong, Noel Crespi, Gyu M. Lee, Franck Le Gall. Semantic smart contracts for blockchain-based services in the Internet of Things. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge (MA), United States. pp.1-5, ⟨10.1109/NCA.2019.8935016⟩. ⟨hal-02363549⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia-Alfaro. Faking and discriminating the navigation data of a micro aerial vehicle using quantum generative adversarial networks. GLOBECOM 2019: IEEE Global Communications Workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024550⟩. ⟨hal-03125799⟩
- Accès au bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Geocaching-inspired resilient path planning for drone swarms. MISARN 2019: Mission-Oriented Wireless Sensor, UAV and Robot Networking, Apr 2019, Paris, France. pp.620 - 625, ⟨10.1109/INFCOMW.2019.8845318⟩. ⟨hal-02127604⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos. Quality amplification of error prone navigation for swarms of micro aerial vehicles. GLOBECOM 2019: IEEE Global Communications workshops, Dec 2019, Waikoloa, United States. pp.1-6, ⟨10.1109/GCWkshps45667.2019.9024394⟩. ⟨hal-03125798⟩
- Accès au bibtex
-
- ref_biblio
- Shanay Behrad, Stéphane Tuffin, Emmanuel Bertin, Noel Crespi. Network access control for the IoT: a comparison between cellular, Wi-Fi and LoRaWAN. ICIN 2019 : 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2019, Paris, France. pp.195 - 200, ⟨10.1109/ICIN.2019.8685884⟩. ⟨hal-02125286⟩
- Accès au bibtex
-
- ref_biblio
- Shanay Behrad, Emmanuel Bertin, Sephane Tuffin, Noel Crespi. 5G-SSAAC: Slice-Specific Authentication and Access Control in 5G. NETSOFT 2019 : 5th International Conference on Network Softwarization, Jun 2019, Paris, France. pp.281-285, ⟨10.1109/NETSOFT.2019.8806667⟩. ⟨hal-02363468⟩
- Accès au bibtex
-
- ref_biblio
- Chérifa Boucetta, Boubakr Nour, Hassine Moungla, Laaziz Lahlou. An IoT scheduling and interference mitigation scheme in TSCH using latin rectangles. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. ⟨10.1109/GLOBECOM38437.2019.9013482⟩. ⟨hal-02266945⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chérifa Boucetta, Boubakr Nour, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi. Adaptive range-based anomaly detection in drone-assisted cellular networks. IWCMC 2019: 15th International Wireless Communications & Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.1239-1244, ⟨10.1109/IWCMC.2019.8766446⟩. ⟨hal-02196155v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E.Kamal. Optimizing drone deployment for cellular communication coverage during crowded events. Military Communications Conference for the 21st century (MILCOM), 2019, Norfolk, VA, United States. pp.622-627, ⟨10.1109/MILCOM47813.2019.9020748⟩. ⟨hal-02460719⟩
- Accès au bibtex
-
- ref_biblio
- Fabien Charmet, Gregory Blanc, Christophe Kiennert. Optimizing resource allocation for secure SDN-based virtual network migration. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-10, ⟨10.1109/nca.2019.8935027⟩. ⟨hal-02438632⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. Real-time dynamic security for ProSe in 5G. ICSPIS 2019: 2nd International Conference on Signal Processing and Information Security, Oct 2019, Dubai, United Arab Emirates. pp.1-4, ⟨10.1109/ICSPIS48135.2019.9045904⟩. ⟨hal-03119391⟩
- Accès au bibtex
-
- ref_biblio
- Aicha Dridi, Chérifa Boucetta, Abubakar Yau Alhassan, Hassine Moungla, Hossam Afifi, et al.. Deep learning approaches for electrical vehicular mobility management: invited paper. International Conference on Wireless Networks and Mobile Communications (WINCOM), 2019, Fez, Morocco. pp.1-6, ⟨10.1109/WINCOM47513.2019.8942569⟩. ⟨hal-02460694⟩
- Accès au bibtex
-
- ref_biblio
- Eva Gagliardi, Olivier Levillain. Analysis of QUIC session establishment and its implementations. 13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩. ⟨hal-02468596⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler. A trust framework for centralized TDMA scheduling mechanism in Vehicular Ad hoc Networks. WTS 2019: Wireless Telecommunications Symposium, Apr 2019, New York, United States. ⟨10.4018/IJITN.2020100106⟩. ⟨hal-02454384⟩
- Accès au bibtex
-
- ref_biblio
- Seif Eddine Hammami, Hossam Afifi, Hassine Moungla, Ahmed E. Kamel. Drone-assisted cellular networks: a multi-agent reinforcement learning approach. ICC 2019: 53rd International Conference on Communications, May 2019, Shanghai, China. pp.1-6, ⟨10.1109/ICC.2019.8762079⟩. ⟨hal-02101394⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti. A trusted group-based revocation process for Intelligent Transportation System. ICDEc 2019: 4th International Conference on Digital Economy. Emerging Technologies and Business Innovation, Apr 2019, Beyrouth, Lebanon. pp.133-146, ⟨10.1007/978-3-030-30874-2_10⟩. ⟨hal-02454367⟩
- Accès au bibtex
-
- ref_biblio
- Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. ASIACCS 2019: 14th ASIA Conference on Computer and Communications Security, Jul 2019, Auckland, New Zealand. pp.602-612, ⟨10.1145/3321705.3329812⟩. ⟨hal-02390275⟩
- Accès au bibtex
-
- ref_biblio
- Fatma Hrizi, Anis Laouiti. A RINA-based security architecture for vehicular networks. IWVSC 2019: 3rd International Workshop on Vehicular Adhoc Networks for Smart Cities, Nov 2019, Paris, France. pp.87-97, ⟨10.1007/978-981-15-3750-9_7⟩. ⟨hal-02454401⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Mohamed Ibn Khedher, Gregory Blanc, Mounim El Yacoubi. Siamese network based feature learning for improved intrusion detection. ICONIP 2019: International Conference on Neural Information Processing, Dec 2019, Sydney, Australia. pp.377-389, ⟨10.1007/978-3-030-36708-4_31⟩. ⟨hal-02421070⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Gregory Blanc. Designing security-aware service requests for NFV-enabled networks. ICCCN 2019: 28th International Conference on Computer Communication and Networks, Jul 2019, Valencia, Spain. pp.1-9, ⟨10.1109/icccn.2019.8847058⟩. ⟨hal-02438649⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. LQCC: a Link Quality-based Congestion Control scheme in named data networks. WCNC 2019: IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. pp.1-6, ⟨10.1109/WCNC.2019.8885909⟩. ⟨hal-02100494⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. A QoS-aware cache replacement policy for Vehicular Named Data Networks. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013461⟩. ⟨hal-02266946⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. A Name-to-Hash Encoding scheme for vehicular named data networks. IWCMC 2019: International Wireless Communications and Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.603-608, ⟨10.1109/IWCMC.2019.8766564⟩. ⟨hal-02100495v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maxime Labonne, Alexis Olivereau, Baptiste Polve, Djamal Zeghlache. A cascade-structured meta-specialists approach for neural network-based intrusion detection. CCNC 2019: 16th Annual Consumer Communications & Networking Conference, Jan 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CCNC.2019.8651856⟩. ⟨hal-02425973⟩
- Accès au bibtex
-
- ref_biblio
- Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. DRMF: a Distributed Resource Management Framework for industry 4.0 environments. NCA 2019: 18th IEEE International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-9, ⟨10.1109/NCA.2019.8935019⟩. ⟨hal-02434766⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Asma Lahbib, Khalifa Toumi, Anis Laouiti, Alexandre Laube, Steven Martin. Blockchain based trust management mechanism for IoT. WCNC 2019: IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. pp.1-8, ⟨10.1109/WCNC.2019.8885994⟩. ⟨hal-02454372⟩
- Accès au bibtex
-
- ref_biblio
- Mohammed Laroui, Aicha Dridi, Hossam Afifi, Hassine Moungla, Michel Marot, et al.. Energy management for electric vehicles in smart cities: a deep learning approach. IWCMC 2019: International Wireless Communications & Mobile Computing Conference, Jun 2019, Tanger, Morocco. pp.2080-2085, ⟨10.1109/IWCMC.2019.8766580⟩. ⟨hal-02101524⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent, Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, et al.. MOOC Sécurité des réseaux: un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-4. ⟨hal-02437172⟩
- Accès au bibtex
-
- ref_biblio
- Ruben Milocco, Pascale Minet, Eric Renault, Selma Boumerdassi. Cost reduction bounds of proactive management based on request prediction. HPCS 2019: 17th International Conference on High Performance Computing & Simulation, Jul 2019, Dublin, Ireland. pp.864-871, ⟨10.1109/HPCS48598.2019.9188199⟩. ⟨hal-02432652⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. A BERT-based transfer learning approach for hate speech detection in online social media. Complex Networks 2019: 8th International Conference on Complex Networks and their Applications, Dec 2019, Lisbonne, Portugal. pp.928-940, ⟨10.1007/978-3-030-36687-2_77⟩. ⟨hal-02344806⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Marzieh Mozafari, Reza Farahbakhsh, Noel Crespi. Content similarity analysis of written comments under posts in social media. SNAMS 2019: 6th International Conference on Social Networks Analysis, Management and Security, Oct 2019, Grenade, Spain. pp.158-165, ⟨10.1109/SNAMS.2019.8931726⟩. ⟨hal-02363538⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Charbel Nicolas, Abdel-Mehsen Ahmad, Jose Rubio-Hernan, Gilbert Habib. Hybrid duty cycle algorithm for industrial WSNs using machine learning. SoMMA 2019: 1st Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, Dec 2019, Trivandrum, India. pp.1-15, ⟨10.1007/978-981-15-4301-2_1⟩. ⟨hal-02962613⟩
- Accès au bibtex
-
- ref_biblio
- Boubakr Nour, Fan Li, Hakima Khelifi, Hassine Moungla, Adlen Ksentini. Coexistence of ICN and IP networks: an NFV as a service approach. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013881⟩. ⟨hal-02266947⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Olivier Paul, Grégory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Quan Pham Van, Huy Tran Quang, Dominique Verchere, Patricia Layec, Thieu Huu-Trung, et al.. Demonstration of container-based microservices SDN control platform for open optical networks. OFC 2019: Optical Fiber Communications Conference and Exhibition, Mar 2019, San Diego, United States. pp.1-3, ⟨10.1364/OFC.2019.M3Z.5⟩. ⟨hal-02446058⟩
- Accès au bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Roberto Minerva. Film factory losses: is BitTorrent a major responsible?. SNAMS 2019: 6th International Conference on Social Networks Analysis, Management and Security, Oct 2019, Grenade, Spain. pp.181-188, ⟨10.1109/SNAMS.2019.8931858⟩. ⟨hal-02363514⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Uncovering flaming events on news media in social media. IPCCC 2019: 38th International Performance Computing and Communications Conference, Oct 2019, Londres, United Kingdom. pp.1-9, ⟨10.1109/IPCCC47392.2019.8958759⟩. ⟨hal-02363443⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aina Toky Rasoamanana, Olivier Levillain. Wombat: one more Bleichenbacher attack toolkit. GreHack 2019, Nov 2019, Grenoble, France. ⟨hal-02468592⟩
- Accès au bibtex
-
- ref_biblio
- José Reyes, Jorge Lopez, Djamal Zeghlache. Identifying running data-paths in software defined networking driven data-planes. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-8, ⟨10.1109/NCA.2019.8935031⟩. ⟨hal-02425970⟩
- Accès au bibtex
-
- ref_biblio
- José Reyes, Jorge Lopez, Natalia Kushik, Djamal Zeghlache. On the assessment and debugging of QoE in SDN: work in progress. NCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-3, ⟨10.1109/NCA.2019.8935029⟩. ⟨hal-02448781⟩
- Accès au bibtex
-
- ref_biblio
- Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
- Accès au bibtex
-
- ref_biblio
- Mustafizur R Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. Machine learning for IoT network monitoring. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3. ⟨hal-02438733⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Abdallah Sobehy, Eric Renault, Paul Mühlethaler. CSI based indoor localization using Ensemble Neural Networks. MLN 2019 : 2nd IFIP International Conference on Machine Learning for Networking, Dec 2019, Paris, France. pp.367-378, ⟨10.1007/978-3-030-45778-5_25⟩. ⟨hal-02334588⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Abdallah Sobehy, Eric Renault, Paul Mühlethaler. NDR: Noise and Dimensionality Reduction of CSI for indoor positioning using deep learning. GLOBECOM 2019: IEEE Global Communications Conference, Dec 2019, Waikoloa, HI, United States. pp.1-6, ⟨10.1109/GLOBECOM38437.2019.9013195⟩. ⟨hal-02314929⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Vicenç Torra, Joaquin Garcia-Alfaro. Towards an adaptive defuzzification: using numerical Choquet integral. MDAI 2019: International Conference on Modeling Decisions for Artificial Intelligence, Sep 2019, Milan, Italy. pp.113-125, ⟨10.1007/978-3-030-26773-5_11⟩. ⟨hal-02393562⟩
- Accès au bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh. Queue-based model approximation for inter-cell coordination with service differentiation. ISCC 2019: 24th Symposium on Computers and Communications, IEEE, Jun 2019, Barcelona, Spain. pp.1-7, ⟨10.1109/ISCC47284.2019.8969691⟩. ⟨hal-02460827⟩
- Accès au bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sarah Akbarzadeh. Model-based optimization for JT CoMP in C-RAN. INFOCOM 2019: IEEE international conference on Computer Communications Workshops, Apr 2019, Paris, France. pp.403-409, ⟨10.1109/INFCOMW.2019.8845102⟩. ⟨hal-02460870⟩
- Accès au bibtex
-
- ref_biblio
- Quan Pham Van, Dominique Verchere, Huy Tran-Quang, Djamal Zeghlache. Container-based microservices SDN control plane for open disaggregated optical networks. ICTON 2019: 21st International Conference on Transparent Optical Networks, Jul 2019, Angers, France. pp.Sa.A3.1:1-4, ⟨10.1109/ICTON.2019.8840430⟩. ⟨hal-02425137⟩
- Accès au bibtex
-
- ref_biblio
- Evgenii Vinarskii, Jorge Lopez, Natalia Kushik, Nina Yevtushenko, Djamal Zeghlache. A model checking based approach for detecting SDN races. ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩. ⟨hal-02448964⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi. Deep dive on politician impersonating accounts in social media. ISCC 2019: 24th Symposium on Computers and Communications, Jun 2019, Barcelona, Spain. pp.1-6, ⟨10.1109/ISCC47284.2019.8969645⟩. ⟨hal-02363455⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi. Typification of impersonated accounts on Instagram. IPCCC 2019: 38th International Performance Computing and Communications Conference, Oct 2019, Londres, United Kingdom. pp.1-7, ⟨10.1109/IPCCC47392.2019.8958763⟩. ⟨hal-02363432⟩
- Accès au texte intégral et bibtex
-
2018
- ref_biblio
- Amar Abane, Mehammed Daoui, Paul Mühlethaler, Hossam Afifi. A down-to-earth integration of Named Data Networking in the real-world IoT. FiCloudW 2018 : 6th International Conference on Future Internet of Things and Cloud Workshops, Aug 2018, Barcelona, Spain. pp.243-249, ⟨10.1109/W-FiCloud.2018.00046⟩. ⟨hal-02333719⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassem, Evangelos Kranakis, et al.. Low frequency mobile communications in underwater networks. ADHOC-NOW 2018: 17th International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.239 - 251, ⟨10.1007/978-3-030-00247-3_22⟩. ⟨hal-02013548⟩
- Accès au bibtex
-
- ref_biblio
- Shohreh Ahvar, Mohammad Mirzaei, Jeremie Leguay, Ehsan Ahvar, Ahmed Medhat, et al.. SET: a Simple and Effective Technique to improve cost efficiency of VNF placement and chaining algorithms for network service provisioning. NetSoft 2018: 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.293-297, ⟨10.1109/NETSOFT.2018.8459908⟩. ⟨hal-01879107⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Shohreh Ahvar, Jagruti Sahoo, Ehsan Ahvar, Mouhamad Dieye, Roch Glitho, et al.. PCPV: Pattern-based Cost-efficient Proactive VNF placement and chaining for value-added services in content delivery networks. NETSOFT 2018: 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.313-317, ⟨10.1109/NETSOFT.2018.8459986⟩. ⟨hal-01879108⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fred Kwasi Mawufemor Aklamanu, Sabine Randriamasy, Eric Renault, Imran Latif, Abdelkrim Hebbar. Intent-based real-time 5G cloud service provisioning. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Abu Dhabi, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOMW.2018.8644457⟩. ⟨hal-02050580⟩
- Accès au bibtex
-
- ref_biblio
- Bahram Alinia, Mohammad Sadegh Talebi, Mohammad Hajiesmaili, Ali Yekkehkhany, Noel Crespi. Competitive online scheduling algorithms with applications in deadline-constrained EV charging. IWQoS 2018: IEEE/ACM 26th International Symposium on Quality of Service, Jun 2018, Banff, Ab, Canada. pp.1 - 10, ⟨10.1109/IWQoS.2018.8624184⟩. ⟨hal-01998511⟩
- Accès au bibtex
-
- ref_biblio
- Danya Bachir, Ghazaleh Khodabandelou, Vincent Gauthier, Mounim El Yacoubi, Eric Vachon. Combining Bayesian inference and clustering for transport mode detection from sparse and noisy geolocation data. ECML PKDD 2018: Machine Learning and Knowledge Discovery in Databases, Sep 2018, Dublin, Ireland. pp.569-584, ⟨10.1007/978-3-030-10997-4_35⟩. ⟨hal-01939608⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Pierre-Marie Bajan, Hervé Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamza Baqa, Nguyen Binh Truong, Noel Crespi, Gyu Myoung Lee, Franck Le Gall. Quality of information as an indicator of trust in the Internet of Things. TrustCom/BigDataSE 2018: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, Aug 2018, New York, United States. pp.204 - 211, ⟨10.1109/TrustCom/BigDataSE.2018.00040⟩. ⟨hal-01988367⟩
- Accès au bibtex
-
- ref_biblio
- Shanay Behrad, Emmanuel Bertin, Noel Crespi. Securing authentication for mobile networks, a survey on 4G issues and 5G answers. ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 8, ⟨10.1109/ICIN.2018.8401619⟩. ⟨hal-01864531⟩
- Accès au bibtex
-
- ref_biblio
- Jaafar Bendriss, Imen Grida Ben Yahia, Roberto Riggio, Djamal Zeghlache. Demo: a deep learning based SLA management for NFV-based services. ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 3, ⟨10.1109/ICIN.2018.8401592⟩. ⟨hal-01868882⟩
- Accès au bibtex
-
- ref_biblio
- Asma Berriri, Jorge Lopez, Natalia Kushik, Nina Yevtushenko, Djamal Zeghlache. Towards model based testing for Software Defined Networks. ENASE 2018: 13th International Conference on Evaluation of Novel Approaches to Software Engineering, Mar 2018, Funchal, Madeira, Portugal. pp.440 - 446, ⟨10.5220/0006805604400446⟩. ⟨hal-01868877⟩
- Accès au bibtex
-
- ref_biblio
- Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, et al.. Towards a 5G security architecture: articulating software-defined security and security as a service. 5G-NS 2018: Workshop on 5G Networks Security, Aug 2018, Hamburg, Germany. pp.47:1 - 47:8, ⟨10.1145/3230833.3233251⟩. ⟨hal-01988053⟩
- Accès au bibtex
-
- ref_biblio
- Amal Bouaziz, Ahlem Saddoud, Lamia Chaari Fourati., Hakima Chaouchi. Dynamic joint resource allocation and femtocell selection for 5G HetNet. ADHOC NOW 2018: International Conference on Ad-Hoc Networks and Wireless, Sep 2018, Saint Malo, France. pp.90 - 101, ⟨10.1007/978-3-030-00247-3_8⟩. ⟨hal-01999484⟩
- Accès au bibtex
-
- ref_biblio
- Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leila Azouz Saidane. QCH-MAC: A Qos-aware Centralized Hybrid MAC protocol for Vehicular Ad Hoc NETworks. AINA 2018: 32nd International Conference on Advanced Information Networking and Applications, May 2018, Krakow, Poland. pp.55 - 62, ⟨10.1109/AINA.2018.00021⟩. ⟨hal-01994055⟩
- Accès au bibtex
-
- ref_biblio
- François Boutigny, Stephane Betge-Brezetz, Hervé Debar, Gregory Blanc, Antoine Lavignotte, et al.. Multi-provider secure virtual network embedding. NTMS 2018 : 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2018.8328706⟩. ⟨hal-01868949⟩
- Accès au bibtex
-
- ref_biblio
- Fabien Charmet, Gregory Blanc. Secure migration of virtual SDN topologies. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438748⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. An energy model for the IoT: secure networking perspective. PIMRC 2018: 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, Oct 2018, Bologna, Italy. pp.1 - 5, ⟨10.1109/PIMRC.2018.8580885⟩. ⟨hal-01992339⟩
- Accès au bibtex
-
- ref_biblio
- Rebecca Copeland, Shohreh Ahvar, Noel Crespi, Romain Durand, Michael Copeland, et al.. Technology assessment for mission-critical services on automotive virtual edge communicator (AVEC). ICIN 2018 : 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2018, Paris, France. pp.1 - 8, ⟨10.1109/ICIN.2018.8401630⟩. ⟨hal-01865524⟩
- Accès au bibtex
-
- ref_biblio
- Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM/IFIP International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré. Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
- Accès au bibtex
-
- ref_biblio
- Simon Foley, Fabien Autrel, Edwin Bourget, Thomas Cledel, Stéphane Grunenwald, et al.. Science hackathons for cyberphysical system security research: putting CPS tesdbed platforms to good use. CPS-SPC 2018 : Workshop on Cyber-Physical Systems Security and Privacy, Oct 2018, Toronto, Canada. pp.102 - 107, ⟨10.1145/3564888.3264.897⟩. ⟨hal-01911182⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. A pyramidal-based model to compute the impact of cyber security events. ARES 2018 : 13th International Conference on Availability, Reliability and Security, Aug 2018, Hamburg, Germany. pp.Article n° 19 -, ⟨10.1145/3230833.3230847⟩. ⟨hal-01885053⟩
- Accès au bibtex
-
- ref_biblio
- Mohamed Hadded, Paul Mühlethaler, Anis Laouiti. TDMA scheduling strategies for vehicular ad hoc networks: from a distributed to a centralized approach. SoftCOM 2018 - 26th International Conference on Software, Telecommunications and Computer Networks, Sep 2018, Split, Croatia. ⟨10.23919/SOFTCOM.2018.8555781⟩. ⟨hal-01864550⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohamed Hadded, Paul Mühlethaler, Anis Laouiti. An optimized multi-hop broadcast scheme for mesh networks with node failures. ICCC 2018: IEEE/CIC International Conference on Communications in China, Aug 2018, Beijing, China. pp.814 - 818, ⟨10.1109/ICCChina.2018.8641157⟩. ⟨hal-02022698⟩
- Accès au bibtex
-
- ref_biblio
- Seif Eddine Hammami, Hassine Moungla, Hossam Afifi. Proactive anomaly detection model for eHealth-enabled data in next generation cellular networks. ICC 2018 : IEEE International Conference on Communications, May 2018, Kansas City, United States. pp.1 - 6, ⟨10.1109/ICC.2018.8422516⟩. ⟨hal-01870403⟩
- Accès au bibtex
-
- ref_biblio
- Hamssa Hasrouny, Abedellatif Samhat, Carole Bassil, Anis Laouiti. A security solution for V2V communication within VANETs. WD 2018 : 10th Wireless Days conference, Apr 2018, Dubai, United Arab Emirates. pp.181 - 183, ⟨10.1109/WD.2018.8361716⟩. ⟨hal-01867393⟩
- Accès au bibtex
-
- ref_biblio
- Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache, Farouk Kamoun. Virtualized network services extension algorithms. NCA 2018: 17th IEEE International Symposium on Network Computing and Applications, Nov 2018, Cambridge, Ma, United States. pp.1 - 5, ⟨10.1109/NCA.2018.8548341⟩. ⟨hal-01991876⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. N-Combat: a nuisance call combating framework for internet telephony. TrustCom/BigDataSE 2018: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, Aug 2018, New York, United States. pp.112 - 117, ⟨10.1109/TrustCom/BigDataSE.2018.00027⟩. ⟨hal-01988338⟩
- Accès au bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. User reactions prediction using embedding features. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Abu Dhabi, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647625⟩. ⟨hal-02050597⟩
- Accès au bibtex
-
- ref_biblio
- Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. Who will like the post? A case study of predicting likers on Flickr. SNAMS 2018: 5th International Conference on Social Networks Analysis, Management and Security, Oct 2018, Valencia, Spain. pp.35 - 42, ⟨10.1109/SNAMS.2018.8554952⟩. ⟨hal-02014631⟩
- Accès au bibtex
-
- ref_biblio
- Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications. GRCON 2018: 8th Annual GNU Radio Conference, Sep 2018, Henderson, United States. pp.1 - 8. ⟨hal-02013656⟩
- Accès au bibtex
-
- ref_biblio
- Jamil Kassem, Michel Barbeau, Abdel-Mehsen Ahmad, Joaquin Garcia-Alfaro. GNU radio blocks for long-lasting frames in mobile underwater acoustic communications. French GNU Radio days 2018, Jul 2018, Lyon, France. pp.1 - 2. ⟨hal-02013632⟩
- Accès au bibtex
-
- ref_biblio
- Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. Dynamic placement of extended service function chains: Steiner-based approximation algorithms. LCN 2018: 43rd IEEE conference on Local Computer Networks, Oct 2018, Chicago, United States. pp.307-310, ⟨10.1109/LCN.2018.8638044⟩. ⟨hal-01851804⟩
- Accès au bibtex
-
- ref_biblio
- Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. A multi-objective non-dominated sorting genetic algorithm for VNF chains placement. CCNC 2018 : IEEE Consumer Communications & Networking Conference, Jan 2018, Las Vegas, United States. pp.1-4, ⟨10.1109/CCNC.2018.8319250⟩. ⟨hal-01613473⟩
- Accès au bibtex
-
- ref_biblio
- Mohammed Laroui, Akrem Sellami, Boubakr Nour, Hassine Moungla, Hossam Afifi, et al.. Driving path stability in VANETs. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Dubai, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647450⟩. ⟨hal-02049979⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maja Lazarevska, Nikesh Man Shakya, Reza Farahbakhsh, Noel Crespi. Mobility supported energy efficient routing protocol for IoT based healthcare applications. CSCN 2018: IEEE Conference on Standards for Communications and Networking, Oct 2018, Paris, France. pp.1 - 5, ⟨10.1109/CSCN.2018.8581828⟩. ⟨hal-01990562⟩
- Accès au bibtex
-
- ref_biblio
- Jorge Eleazar Lopez Coronado, Natalia Kushik, Asma Berriri, Nina Yevtushenko, Djamal Zeghlache. Test derivation for SDN-enabled switches: a logic circuit based approach. ICTSS 2018: IFIP International Conference on Testing Software and Systems, Oct 2018, Cádiz, Spain. pp.69 - 84, ⟨10.1007/978-3-319-99927-2_7⟩. ⟨hal-01990709⟩
- Accès au bibtex
-
- ref_biblio
- Paul Marillonnet, Mikaël Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des données personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie Privée, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
- Accès au bibtex
-
- ref_biblio
- Pascale Minet, Eric Renault, Ines Khoufi, Selma Boumerdassi. Data analysis of a Google data center. CCGRID 2018 : 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2018, Washington Dc, United States. pp.342 - 343, ⟨10.1109/CCGRID.2018.00049⟩. ⟨hal-01867409⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Pascale Minet, Eric Renault, Ines Khoufi, Selma Boumerdassi. Analyzing traces from a Google data center. IWCMC 2018 : 14th International Wireless Communications and Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1167 - 1172, ⟨10.1109/IWCMC.2018.8450304⟩. ⟨hal-01870216⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Amir Mohammadinejad, Reza Farahbakhsh, Noel Crespi. OPIU: Opinion Propagation in online social networks using Influential Users impact. ICC 2018: IEEE International Conference on Communications, May 2018, Kansas City, United States. pp.1 - 7, ⟨10.1109/ICC.2018.8422118⟩. ⟨hal-01988201⟩
- Accès au bibtex
-
- ref_biblio
- Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Dima Al Mouhammad. General semantic system for monitoring & assisting diabetes patient "MySmart diabetes OntoREFerence" ontology. MENACOMM 2018: IEEE Middle East and North Africa Communications Conference, Apr 2018, Jounieh, Lebanon. pp.1 - 6, ⟨10.1109/MENACOMM.2018.8371024⟩. ⟨hal-01875454⟩
- Accès au bibtex
-
- ref_biblio
- van Khang Nguyen, Eric Renault, Viet Hai Ha. Road anomaly detection using smartphone : a brief analysis. MSPN 2018: 4th International Conference on Mobile, Secure and Programmable Networking, Jun 2018, Paris, France. pp.86 - 97, ⟨10.1007/978-3-030-03101-5_8⟩. ⟨hal-01997002⟩
- Accès au bibtex
-
- ref_biblio
- Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Ahmed E. Kamal, et al.. NCP: a near ICN cache placement scheme for IoT-based traffic class. GLOBECOM 2018: IEEE Global Communications Conference, Dec 2018, Dubai, United Arab Emirates. pp.1 - 6, ⟨10.1109/GLOCOM.2018.8647629⟩. ⟨hal-02049991⟩
- Accès au bibtex
-
- ref_biblio
- David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nahit Pawar, Thomas Bourgeau, Hakima Chaouchi. PrIoT: Prototyping the Internet of Things. FICLOUD 2018: 6th International Conference on Future Internet of Things and Cloud, Aug 2018, Barcelone, Spain. pp.216 - 223, ⟨10.1109/FiCloud.2018.00039⟩. ⟨hal-01993744⟩
- Accès au bibtex
-
- ref_biblio
- Cuong Pham, Gregory Blanc, Hervé Debar. On automatic network environment cloning for facilitating cybersecurity training and testing. RESSI 2018: Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, May 2018, La Bresse, France. pp.1-3. ⟨hal-02438757⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Quan Pham Van, Dominique Verchère, Patricia Layec, Arnaud Dupas, Frank Ilchmann, et al.. Monitoring intent for optical channel defragmentation in software-defined elastic optical networks. ICTON 2018 : 20th International Conference on Transparent Optical Networks, Jul 2018, Bucharest, Romania, Romania. pp.1 - 4, ⟨10.1109/ICTON.2018.8473926⟩. ⟨hal-01992391⟩
- Accès au bibtex
-
- ref_biblio
- Eric Valega Prawirodidjojo, Rui Jie Quek, Bu Sung Lee, Vincent Gauthier, Markus Schläpfer. Using mobile phone data to determine human mobility patterns in Paris. CW 2018: International Conference on Cyberworlds, Oct 2018, Singapore, Singapore. pp.399 - 402, ⟨10.1109/CW.2018.00077⟩. ⟨hal-02152305⟩
- Accès au bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Inspecting interactions: online news media synergies in social media. ASONAM 2018: 2018 International Conference on Advances in Social Networks Analysis and Mining, IEEE/ACM, Aug 2018, Barcelona, Spain. pp.535-539, ⟨10.1109/ASONAM.2018.8508534⟩. ⟨hal-01957237⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yasir Saleem, Noel Crespi, Pasquale Pace. SCDIoT: Social Cross-Domain IoT enabling application-to-application communications. IC2E 2018 : IEEE International Conference on Cloud Engineering, Apr 2018, Orlando, United States. pp.346 - 350, ⟨10.1109/IC2E.2018.00068⟩. ⟨hal-01865515⟩
- Accès au bibtex
-
- ref_biblio
- Yasir Saleem, Noel Crespi. Mapping of sensor and route coordinates for smart cities. COMPSAC 2018: 42nd Annual Computer Software and Applications Conference, Jul 2018, Tokyo, Japan. pp.570 - 576, ⟨10.1109/COMPSAC.2018.00087⟩. ⟨hal-01988425⟩
- Accès au bibtex
-
- ref_biblio
- Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
- Accès au bibtex
-
- ref_biblio
- Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. IoT devices recognition through network traffic analysis. BIG DATA 2018: IEEE International Conference on Big Data, Dec 2018, Seattle, United States. pp.5187-5192, ⟨10.1109/BigData.2018.8622243⟩. ⟨hal-01994156⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Abdallah Sobehy, Eric Renault, Paul Mühlethaler. Position certainty propagation: a location service for MANETs. MSPN 2018 - 4th International Conference on Mobile, Secure and Programmable Networking, Jun 2018, Paris, France. pp.131-142, ⟨10.1007/978-3-030-03101-5_13⟩. ⟨hal-01864565⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A green VNFs placement and chaining algorithm. NOMS 2018 : IEEE/IFIP Network Operations and Management Symposium, Apr 2018, Taipei, Taiwan. pp.1 - 5, ⟨10.1109/NOMS.2018.8406183⟩. ⟨hal-01868941⟩
- Accès au bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A green VNF-FG embedding algorithm. NETSOFT 2018 : 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.141 - 149, ⟨10.1109/NETSOFT.2018.8460013⟩. ⟨hal-01992428⟩
- Accès au bibtex
-
- ref_biblio
- Nouredine Tamani, Shohreh Ahvar, Gabriel Santos, Bernard Istasse, Isabel Praca, et al.. Rule-based model for smart building supervision and management. SCC 2018: IEEE International Conference on Services Computing, Jul 2018, San Francisco, United States. pp.9 - 16, ⟨10.1109/SCC.2018.00009⟩. ⟨hal-01988418⟩
- Accès au bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh, Ahlem Khlass. Modeling and performance evaluation of the eICIC/ABS in H-CRAN. Rencontres Francophones sur la Conception de Protocoles, l'Evaluation de Performance et l'Expérimentation des Réseaux de Communication, May 2018, Roscoff, France. ⟨hal-01785229⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sarah Akbarzadeh, Ahlem Khlass. Simulation, modeling and analysis of the eICIC/ABS in H-CRAN. PEMWN 2018 : IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Sep 2018, Toulouse, France. pp.1 - 6, ⟨10.23919/PEMWN.2018.8548938⟩. ⟨hal-01994633⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Xuan Huyen Do, Viet Hai Ha. Implementation of OpenMP data-sharing on CAPE. SoICT 2018: 9th International Symposium on Information and Communication Technology, Dec 2018, Da Nang, Vietnam. pp.359 - 366, ⟨10.1145/3287921.3287950⟩. ⟨hal-01997176⟩
- Accès au bibtex
-
- ref_biblio
- Long Tran Van, Eric Renault, Xuan Huyen Do, Viet Hai Ha. A new execution model for improving performance and flexibility of CAPE. PDP 2018 : 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, Mar 2018, Cambridge, United Kingdom. pp.234 - 238, ⟨10.1109/PDP2018.2018.00039⟩. ⟨hal-01868501⟩
- Accès au bibtex
-
- ref_biblio
- Nina Yevtushenko, Igor Burdonov, Alexandre Kossachev, Jorge Eleazar Lopez Coronado, Natalia Kushik, et al.. Test derivation for the Software Defined Networking platforms: novel fault models and test completeness. EWDTS 2018: IEEE East-West Design & Test Symposium, Sep 2018, Kazan, Russia. pp.1 - 6, ⟨10.1109/EWDTS.2018.8524712⟩. ⟨hal-01990717⟩
- Accès au bibtex
-
2017
- ref_biblio
- Abdel-Mehsen Ahmad, Michel Barbeau, Joaquin Garcia-Alfaro, Jamil Kassen, Evangelos Kranakis, et al.. Doppler effect in the underwater acoustic ultra low frequency band. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.3 - 12, ⟨10.1007/978-3-319-74439-1_1⟩. ⟨hal-01699512⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Shohreh Ahvar, Hnin Pann Phyu, Sachham Man Buddhacharya, Ehsan Ahvar, Noel Crespi, et al.. CCVP: cost-efficient centrality-based VNF placement and chaining algorithm for network service provisioning. NetSoft 2017: 3rd IEEE Conference on Network Softwarization, Jul 2017, Bologna, Italy. pp.1 - 9, ⟨10.1109/NETSOFT.2017.8004104⟩. ⟨hal-01660641⟩
- Accès au bibtex
-
- ref_biblio
- Shohreh Ahvar, Gabriel Santos, Nouredine Tamani, Bernard Istasse, Isabel Praca, et al.. Ontology-based model for trusted critical site supervision in FUSE-IT. ICIN 2017 :20th Innovations in Clouds, Internet and Networks conference, Mar 2017, Paris, France. pp.313 - 315, ⟨10.1109/ICIN.2017.7899430⟩. ⟨hal-01586373⟩
- Accès au bibtex
-
- ref_biblio
- Danya Bachir, Vincent Gauthier, Mounim El Yacoubi, Ghazaleh Khodabandelou. Using mobile phone data analysis for the estimation of daily urban dynamics. ITSC 2017 : 20th International Conference on Intelligent Transportation Systems, Oct 2017, Yokohama, Japan. pp.626 - 632, ⟨10.1109/ITSC.2017.8317956⟩. ⟨hal-01745767⟩
- Accès au bibtex
-
- ref_biblio
- Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Steven Porretta. The sound of communication in underwater acoustic sensor networks. ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks, Sep 2017, Niagara Falls, Canada. pp.13 - 23, ⟨10.1007/978-3-319-74439-1_2⟩. ⟨hal-01699521⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache. Forecasting and anticipating SLO breaches in programmable networks. ICIN 2017 : 20th Conference on Innovations in Clouds, Internet and Networks, Mar 2017, Paris, France. pp.127 - 134, ⟨10.1109/ICIN.2017.7899402⟩. ⟨hal-01531499⟩
- Accès au bibtex
-
- ref_biblio
- Jaafar Bendriss, Imen Grida Ben Yahia, Prosper Chemouil, Djamal Zeghlache. AI for SLA management in programmable networks. DRCN 2017 : 13th International Conference on Design of Reliable Communication Networks, Mar 2017, Munich, Germany. pp.130 - 137. ⟨hal-01630050⟩
- Accès au bibtex
-
- ref_biblio
- Filipe Conceicao, Nouha Oualha, Djamal Zeghlache. Security establishment for IoT environments in 5G: Direct MTC-UE communications. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Oct 2017, Montreal, Canada. ⟨10.1109/PIMRC.2017.8292693⟩. ⟨cea-01888850⟩
- Accès au bibtex
-
- ref_biblio
- Juwendo Denis, Sinda Smirani, Bakarime Diomande, Takoua Ghariani, Badii Jouaber. Energy-efficient coordinated beamforming for multi-cell multicast networks under statistical CSI. SPAWC 2017 : IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications, Jul 2017, Sapporo, Japan. pp.1 - 5, ⟨10.1109/SPAWC.2017.8227795⟩. ⟨hal-01681414⟩
- Accès au bibtex
-
- ref_biblio
- Juwendo Denis, Sinda Smirani, Badii Jouaber. Beamformer designs for energy-efficient multi-cell physical layer multicasting. APCC 2017 : 23rd Asia-Pacific Conference on Communications, Dec 2017, Perth, Australia. pp.1 - 5, ⟨10.23919/APCC.2017.8304069⟩. ⟨hal-01721900⟩
- Accès au bibtex
-
- ref_biblio
- Juwendo Denis, Sinda Smirani, Bakarime Diomande, Takoua Ghariani, Badii Jouaber. Outage probability-based beamforming design for multi-cell multicast networks. PIMRC 2017 : 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.1 - 5, ⟨10.1109/PIMRC.2017.8292337⟩. ⟨hal-01712020⟩
- Accès au bibtex
-
- ref_biblio
- Thibaud Ecarot, Djamal Zeghlache, Cédric Brandily. Consumer-and-provider-oriented efficient IaaS resource allocation. IPDPSW 2017 : IEEE International Parallel and Distributed Processing Symposium Workshops, May 2017, Orlando, United States. pp.77 - 85, ⟨10.1109/IPDPSW.2017.97⟩. ⟨hal-01629722⟩
- Accès au bibtex
-
- ref_biblio
- Reza Farahbakhsh, Samin Karbalay Mohammadi Dastjerdi, Xiao Han, Angel Cuevas Rumin, Noel Crespi. Evolution of publicly disclosed information in Facebook profiles. TRUSTCOM 2017 : 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2017, Sydney, Australia. pp.9 - 16, ⟨10.1109/Trustcom/BigDataSE/ICESS.2017.214⟩. ⟨hal-01586705⟩
- Accès au bibtex
-
- ref_biblio
- Takoua Ghariani, Badii Jouaber. Green topological potential-based optimization for power and spectral efficiency tradeoff in LTE HetNets. ITNAC 2017: 26th International Telecommunication Networks and Applications Conference, Nov 2017, Melbourne, Australia. pp.1 - 6, ⟨10.1109/ATNAC.2017.8215394⟩. ⟨hal-01670388⟩
- Accès au bibtex
-
- ref_biblio
- Chaima Ghribi, Marouen Mechtri, Oussama Soualah, Djamal Zeghlache. SFC provisioning over NFV enabled clouds. CLOUD 2017 : IEEE 10th International Conference on Cloud Computing, Jun 2017, Honolulu, United States. pp.423 - 430, ⟨10.1109/CLOUD.2017.61⟩. ⟨hal-01629737⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack graph-based countermeasure selection using a stateful return on investment metric. FPS 2017: 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. pp.293 - 302, ⟨10.1007/978-3-319-75650-9_19⟩. ⟨hal-01740860⟩
- Accès au bibtex
-
- ref_biblio
- Ouassila Hoceini, Hossam Afifi, Rachida Apidjit. A new key management and authentication architecture for ZigBee networks (KAAZ). SAM 2017: international conference on Security & Management, Jul 2017, Las Vegas, United States. pp.39 - 45. ⟨hal-01699744⟩
- Accès au bibtex
-
- ref_biblio
- Fatma Hrizi, Anis Laouiti. Hierarchical small world overlay for efficient forwarding in volunteer clouds. AINA 2017 : IEEE 31st International Conference on Advanced Information Networking and Applications, Mar 2017, Taipei, Taiwan. pp.236 - 243, ⟨10.1109/AINA.2017.160⟩. ⟨hal-01643242⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Hossam Afifi, Ahmed E. Kamal. Service placement in complex active networks. ICCCN 2017 : 26th International Conference on Computer Communications and Networks, Jul 2017, Vancouver, Canada. pp.1 - 9, ⟨10.1109/ICCCN.2017.8038471⟩. ⟨hal-01593443⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Hossam Afifi, Hassine Moungla. Optimal Hadoop over ICN placement algorithm for networking and distributed computing. GLOBECOM 2017 : IEEE Global Communications Conference, Dec 2017, Singapore, Singapore. pp.1 - 6, ⟨10.1109/GLOCOM.2017.8254118⟩. ⟨hal-01816357⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Hossam Afifi, Hassnaa Moustafa. Optimal Placement Algorithm (OPA) for IoT over ICN. INFOCOM NOM 2017 : Named-Oriented Mobility: Architectures, Algorithms, and Applications workshop, May 2017, Atlanta, United States. pp.254 - 259, ⟨10.1109/INFCOMW.2017.8116405⟩. ⟨hal-01681395⟩
- Accès au bibtex
-
- ref_biblio
- Sonia Ikken, Eric Renault, Amine Barkat, Abdelkamel Tari, M. Tahar Kechadi. Cost-efficient big intermediate data placement in a collaborative cloud storage environment. HPCC 2017: 19th international conference on High Performance Computing and Communications, Dec 2017, Bangkok, Thailand. pp.514 - 521, ⟨10.1109/HPCC-SmartCity-DSS.2017.67⟩. ⟨hal-01712042⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. ProtectCall: call protection based on user reputation. TRUSTCOM 2017 : 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2017, Sydney, Australia. pp.660 - 667, ⟨10.1109/Trustcom/BigDataSE/ICESS.2017.297⟩. ⟨hal-01586712⟩
- Accès au bibtex
-
- ref_biblio
- Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
- Accès au bibtex
-
- ref_biblio
- Samin Karbalay Mohammadi Dastjerdi, Reza Farahbakhsh, Noel Crespi. Popularity evolution of professional users on Facebook. IEEE ICC, May 2017, Paris, France. pp.1 - 6, ⟨10.1109/ICC.2017.7997220⟩. ⟨hal-01586717⟩
- Accès au bibtex
-
- ref_biblio
- Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache. Scalable and cost-efficient algorithms for VNF chaining and placement problem. ICIN 2017 : 20th Conference on Innovations in Clouds, Internet and Networks, Mar 2017, Paris, France. pp.92 - 99, ⟨10.1109/ICIN.2017.7899395⟩. ⟨hal-01630011⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Khedher, Emad Abd-Elrahman, Hossam Afifi, Michel Marot. Optimal and cost efficient algorithm for virtual CDN orchestration. LCN 2017 : 42nd IEEE Conference on Local Computer Networks, Oct 2017, Singapore, Singapore. pp.61 - 69, ⟨10.1109/LCN.2017.115⟩. ⟨hal-01664049⟩
- Accès au bibtex
-
- ref_biblio
- Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Christophe Kiennert, Pierre Olivier Rocher, Malinka Ivanova, Anna Rozeva, Mariana Durcheva, et al.. Security challenges in e-assessment and technical solutions. IV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩. ⟨hal-01699388⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maxim Kolomeec, Gustavo Daniel Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, et al.. Choosing models for security metrics visualization. MMM-ACNS 2017 : International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Aug 2017, Warsaw, Poland. pp.75 - 87, ⟨10.1007/978-3-319-65127-9_7⟩. ⟨hal-01648050⟩
- Accès au bibtex
-
- ref_biblio
- Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin. Link reliable and trust aware RPL routing protocol for Internet of Things. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171360⟩. ⟨hal-01681446⟩
- Accès au bibtex
-
- ref_biblio
- Jorge Lopez, Natalia Kushik, Djamal Zeghlache. Quality Estimation of Virtual Machine Placement in Cloud Infrastructures. 29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.213-229, ⟨10.1007/978-3-319-67549-7_13⟩. ⟨hal-01678958⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jorge Eleazar Lopez Coronado, Natalia Kushik, Nina Yevtushenko, Djamal Zeghlache. Analyzing and validating virtual network requests. ICSOFT 2017 : 12th International Conference on Software Technologies, Jul 2017, Madrid, Spain. pp.441 - 446, ⟨10.5220/0006472304410446⟩. ⟨hal-01686297⟩
- Accès au bibtex
-
- ref_biblio
- Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Lina Nachabe Ismail, Bachar El Hassan, Dima Al Mouhammad, Marc Girod-Genet. Intelligent system for diabetes patients monitoring and assistance. ICABME 2017 : 4th International Conference on Advances in Biomedical Engineering, Oct 2017, Beirut, Lebanon. pp.1 - 4, ⟨10.1109/ICABME.2017.8167570⟩. ⟨hal-01681434⟩
- Accès au bibtex
-
- ref_biblio
- Duy Huy Nguyen, Hang Nguyen, Eric Renault. Performance evaluation of E-MQS scheduler with mobility in LTE heterogeneous network. ICC 2017 : IEEE International Conference on Communications, May 2017, Paris, France. pp.1 - 6, ⟨10.1109/ICC.2017.7996487⟩. ⟨hal-01585029⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Minh Quang Nguyen, Hang Nguyen, Eric Renault, Yusheng Ji. Hybrid source-channel coding with bandwidth expansion for speech data. VTC Spring 2017 : IEEE 85th Vehicular Technology Conference, Jun 2017, Sydney, Australia. pp.1 - 5, ⟨10.1109/VTCSpring.2017.8108391⟩. ⟨hal-01654972⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Minh Quang Nguyen, Hang Nguyen, Eric Renault, Yusheng Ji. Hybrid digital-analog source-channel coding with adaptation. CCNC 2017 : 14th IEEE Consumer Communications & Networking Conference, Jan 2017, Las Vegas, United States. pp.957 - 962, ⟨10.1109/CCNC.2017.7983262⟩. ⟨hal-01703095⟩
- Accès au bibtex
-
- ref_biblio
- Steven Porretta, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis. Learning to communicate underwater: an exploration of limited mobility agents. WUWNET 2017 :12th International Conference on Underwater Networks & Systems, Nov 2017, Halifax, Ns, Canada. pp.1 - 5, ⟨10.1145/3148675.3148709⟩. ⟨hal-01740876⟩
- Accès au bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi. Identifying content originator in social networks. GLOBECOM 2017 : IEEE International Conference on Global Communications, Dec 2017, Singapore, Singapore. pp.1 - 6, ⟨10.1109/GLOCOM.2017.8255074⟩. ⟨hal-01702753⟩
- Accès au bibtex
-
- ref_biblio
- Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nikesh Man Shakya, Mehdi Mani, Noel Crespi. SEEOF: Smart Energy Efficient Objective Function. GIoTS 2017 : 1st IEEE Global Internet of Things Summit, Jun 2017, Geneva, Switzerland. pp.1 - 6, ⟨10.1109/GIOTS.2017.8016252⟩. ⟨hal-01586728⟩
- Accès au bibtex
-
- ref_biblio
- Sinda Smirani, Juwendo Denis, Bakarime Diomande, Badii Jouaber. Wyner-Ziv nested lattice coding for single-cell multicast service delivery. PIMRC 2017 : IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.1 - 5, ⟨10.1109/PIMRC.2017.8292341⟩. ⟨hal-01710971⟩
- Accès au bibtex
-
- ref_biblio
- Sinda Smirani, Juwendo Denis, Badii Jouaber. Multilayered Wyner-Ziv lattice coding for single-cell point-to-multipoint communications. WIMOB 2017: IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2017, Rome, Italy. pp.1 - 6, ⟨10.1109/WiMOB.2017.8115817⟩. ⟨hal-01653382⟩
- Accès au bibtex
-
- ref_biblio
- Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. A link failure recovery algorithm for Virtual Network Function chaining. IM 2017 : IFIP/IEEE Symposium on Integrated Network Management , May 2017, Lisbon, Portugal. pp.213 - 221, ⟨10.23919/INM.2017.7987282⟩. ⟨hal-01629687⟩
- Accès au bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. Energy efficient algorithm for VNF placement and chaining. CCGRID 2017 : 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017, Madrid, Spain. pp.579 - 588, ⟨10.1109/CCGRID.2017.84⟩. ⟨hal-01575711⟩
- Accès au bibtex
-
- ref_biblio
- Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. An efficient algorithm for virtual network function placement and chaining. CCNC 2017 : 14th IEEE conference on Consumer Communications & Networking, Jan 2017, Las Vegas, United States. pp.647 - 652, ⟨10.1109/CCNC.2017.7983207⟩. ⟨hal-01629694⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Xuan Huyen Do, Viet Hai Ha. Design and implementation of a new execution model for CAPE. SOICT 2017 : 8th international Symposium on Information and Communication Technology, Dec 2017, Nha Trang City, Vietnam. pp.453 - 459, ⟨10.1145/3155133.3155199⟩. ⟨hal-01702671⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Viet Hai Ha. Optimization of checkpoints and execution model for an implementation of OpenMP on distributed memory architectures. CCGRID 2017: 17th international symposium on Cluster, Cloud and Grid Computing, May 2017, Madrid, Spain. pp.711 - 714, ⟨10.1109/CCGRID.2017.119⟩. ⟨hal-01702680⟩
- Accès au bibtex
-
- ref_biblio
- Jun Zhang, Houda Labiod, Seif Eddine Hammami, Hossam Afifi. Scalable energy efficient routing in multi-layer femtocell networks. IWCMC 2017 : 13th International Wireless Communications & Mobile Computing Conference, Jun 2017, Valencia, Spain. pp.1540 - 1545, ⟨10.1109/IWCMC.2017.7986513⟩. ⟨hal-01577006⟩
- Accès au bibtex
-
2016
- ref_biblio
- Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Luigi Aztori, Makhlouf Hadji, Virginia Pilloni. IoT-D2D task allocation: an award-driven game theory approach. ICT 2016 : 23rd International Conference on Telecommunications, May 2016, Thessaloniki, Greece. pp.1 - 6, ⟨10.1109/ICT.2016.7500355⟩. ⟨hal-01370189⟩
- Accès au bibtex
-
- ref_biblio
- Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam-Mann, Noel Crespi, Joaquin Garcia-Alfaro, et al.. CACEV: a Cost and CArbon Emission-Efficient Virtual machine placement method for green distributed clouds. SCC 2016 : 13th IEEE International Conference on Services Computing , Jun 2016, San Francisco, United States. pp.275 - 282, ⟨10.1109/SCC.2016.43⟩. ⟨hal-01359868⟩
- Accès au bibtex
-
- ref_biblio
- Mayla Alimam, Emmanuel Bertin, Noel Crespi. Enterprise 2.0 : literature taxonomy and usage evaluation. POEM 2016 : 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling, Nov 2016, Skövde, Sweden. pp.26-40, ⟨10.1007/978-3-319-48393-1_3⟩. ⟨hal-01368016⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mayla Alimam, Emmanuel Bertin, Noel Crespi. Improving the Capabilities of Email for Businesses - The Case of Social Tagging. Twenty-Fourth European Conference on Information Systems (ECIS), Jun 2016, Istanbul, Turkey. ⟨hal-01368015⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ichrak Amdouni, Fatma Hrizi, Anis Laouiti, Eduard Grasa, Hakima Chaouchi. Exploring the flexibility of network access control in the Recursive InterNetwork Architecture. APCC 2016 : 22nd Asia-Pacific Conference on Communications, Aug 2016, Yogyakarta, Indonesia. pp.559 - 566, ⟨10.1109/APCC.2016.7581476⟩. ⟨hal-01431552⟩
- Accès au bibtex
-
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Lyes Bouali, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Samia Bouzefrane, Mehammed Daoui. Virtualization techniques: challenges & opportunities. MSPN 2016 : International Conference on Mobile, Secure and Programmable Networking, Jun 2016, Paris, France. pp.49 - 62, ⟨10.1007/978-3-319-50463-6_5⟩. ⟨hal-01462931⟩
- Accès au bibtex
-
- ref_biblio
- Selma Boumerdassi, Eric Renault. A flooding-based solution to improve location services in VANETs. ICC 2016 : International Conference on Communications, May 2016, Kuala Lumpur, Malaysia. pp.1 - 6, ⟨10.1109/ICC.2016.7511575⟩. ⟨hal-01452205⟩
- Accès au bibtex
-
- ref_biblio
- Quyet Cao Huu, Imran Khan, Reza Farahbakhsh, Giyyarpuram Madhusudan, Gyu Myoung Lee, et al.. A trust model for data sharing in smart cities. ICC 2016 : IEEE International Conference on Communications : Communications for All Things, May 2016, Kuala Lumpur, Malaysia. pp.1 - 7, ⟨10.1109/ICC.2016.7510834⟩. ⟨hal-01348031⟩
- Accès au bibtex
-
- ref_biblio
- Yuanfang Chen, Lei Shu, Noel Crespi, Gyu Myoung Lee, Mohsen Guizani. Understanding the impact of network structure on propagation dynamics based on mobile big data. IWCMC 2016 : 12th International Wireless Communication and Mobile Computing Conference, Sep 2016, Paphos, Cyprus. pp.1018 - 1023, ⟨10.1109/IWCMC.2016.7577198⟩. ⟨hal-01404479⟩
- Accès au bibtex
-
- ref_biblio
- Nicolas Gensollen, Vincent Gauthier, Michel Marot, Monique Becker. Submodular optimization for control of prosumer networks. SMARTGRIDCOMM 2016 : 7th IEEE International Conference on Smart Grid Communications, Nov 2016, Sydney, Australia. pp.1 - 6, ⟨10.1109/SmartGridComm.2016.7778758⟩. ⟨hal-01663977⟩
- Accès au bibtex
-
- ref_biblio
- Chaima Ghribi, Marouen Mechtri, Djamal Zeghlache. Scalable virtual resource embedding in clouds. GLOBECOM 2016 : IEEE Global Communications Conference, Dec 2016, Washington, Dc, United States. pp.1 - 7, ⟨10.1109/GLOCOM.2016.7842242⟩. ⟨hal-01471721⟩
- Accès au bibtex
-
- ref_biblio
- Chaima Ghribi, Marouen Mechtri, Djamal Zeghlache. A dynamic programming algorithm for joint VNF placement and chaining. CAN 2016 : Workshop on Cloud-Assisted Networking, Dec 2016, Irvine, United States. pp.19 - 24 ⟨10.1145/3010079.3010083⟩. ⟨hal-01462061⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Alexander Motzek, Joaquin Garcia-Alfaro, Hervé Debar. Selection of mitigation actions based on financial and operational impact assessments. ARES 2016 : 11th International Conference on Availability, Reliability and Security, Aug 2016, Salzburg, Austria. pp.137 - 146, ⟨10.1109/ARES.2016.3⟩. ⟨hal-01450193⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Ender Alvarez, Alexander Motzek, Matteo Merialdo, Joaquin Garcia-Alfaro, et al.. Towards an automated and dynamic risk management response system. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.37 - 53, ⟨10.1007/978-3-319-47560-8_3⟩. ⟨hal-01450282⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.87 - 102, ⟨10.1007/978-3-319-54876-0_7⟩. ⟨hal-01487752⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Hervé Debar. Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms. TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2016, Tianjin, China. pp.340 - 348, ⟨10.1109/TrustCom.2016.0082⟩. ⟨hal-01468032⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. New types of alert correlation for security information and event management systems. NTMS 2016 : 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. pp.1 - 7, ⟨10.1109/NTMS.2016.7792462⟩. ⟨hal-01452817⟩
- Accès au bibtex
-
- ref_biblio
- Viet Hai Ha, Xuan Huyen Do, van Long Tran, Eric Renault. Creating an easy to use and high performance parallel platform on multi-cores networks. MSPN 2016 : 2nd International Conference on Mobile, Secure, and Programmable Networking, Jun 2016, Paris, France. pp.197 - 207, ⟨10.1007/978-3-319-50463-6_16⟩. ⟨hal-01452249⟩
- Accès au bibtex
-
- ref_biblio
- Samir Haddad, Jinane Sayah, Marc Girod-Genet, Bachar El Hassan. Optimized energy distribution in Wireless Sensor Networks. DIPDMWC 2016 : 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, Jul 2016, Moscow, Russia. pp.284 - 291, ⟨10.1109/DIPDMWC.2016.7529404⟩. ⟨hal-01358324⟩
- Accès au bibtex
-
- ref_biblio
- Makhlouf Hadji, Benjamin Aupetit, Djamal Zeghlache. Cost-efficient algorithms for critical resource allocation in cloud federations. CLOUDNET 2016 : 5th International Conference on Cloud Networking, Oct 2016, Pisa, Italy. pp.1 - 6, ⟨10.1109/CloudNet.2016.11⟩. ⟨hal-01471712⟩
- Accès au bibtex
-
- ref_biblio
- Seif Eddine Hammami, Hossam Afifi, Michel Marot, Vincent Gauthier. Network planning tool based on network classification and load prediction. WCNC 2016 : IEEE Wireless Communications and Networking Conference, Apr 2016, Doha, Qatar. pp.1 - 6, ⟨10.1109/WCNC.2016.7565166⟩. ⟨hal-01370148⟩
- Accès au bibtex
-
- ref_biblio
- Hamssa Hasrouny, Carole Bassil, Abed Ellatif Samhat, Anis Laouiti. Security risk analysis of a trust model for secure group leader-based communication in VANET. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.71 - 83, ⟨10.1007/978-981-10-3503-6_6⟩. ⟨hal-01532782⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fatma Hrizi, Khalifa Toumi, Anis Laouiti. Trust-BZB : towards a trust-driven routing in vehicular networks. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.85 - 96, ⟨10.1007/978-981-10-3503-6_7⟩. ⟨hal-01496677⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi. OMAC: Optimal Migration Algorithm for virtual CDN. ICT 2016 : 23rd International Conference on Telecommunications, May 2016, Thessaloniki, Greece. pp.1 - 6, ⟨10.1109/ICT.2016.7500390⟩. ⟨hal-01370192⟩
- Accès au bibtex
-
- ref_biblio
- Hatem Ibn Khedher, Makhlouf Hadji, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi, Ahmed E. Kamal. Scalable and cost efficient algorithms for virtual CDN migration. LCN 2016 : 41st IEEE Conference on Local Computer Networks, Nov 2016, Dubai, United Arab Emirates. pp.112 - 120, ⟨10.1109/LCN.2016.23⟩. ⟨hal-01462218⟩
- Accès au bibtex
-
- ref_biblio
- Sonia Ikken, Eric Renault, Amine Barkat, M. Tahar Kechadi, Abdelkamel Tari. Efficient intermediate data placement in federated cloud data centers storage. MSPN 2016 : 2nd International Conference on Mobile, Secure, and Programmable Networking, Jun 2016, Paris, France. pp.1 - 15, ⟨10.1007/978-3-319-50463-6_1⟩. ⟨hal-01452230⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. Browser-to-browser authentication and trust relationships for WebRTC. UBICOMM 2016 : 10th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Oct 2016, Venice, Italy. pp.9 - 16. ⟨hal-01445063⟩
- Accès au bibtex
-
- ref_biblio
- Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi, Amir Mohammadinejad. Br2Br: a vector-based trust framework for WebRTC calling services. HPCC 2016 : 18th International Conference on High Performance Computing and Communications , Dec 2016, Sydney, Australia. pp.522 - 529, ⟨10.1109/HPCC-SmartCity-DSS.2016.0080⟩. ⟨hal-01463194⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Kaouthar Drira, Djamal Zeghlache. A self-stabilizing framework for dynamic bandwidth allocation in virtual networks. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.69 - 77, ⟨10.1109/NOMS.2016.7502798⟩. ⟨hal-01459193⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Kaouther Drira, Djamal Zeghlache. A self-stabilizing framework for dynamic bandwidth allocation in virtual networks. IEEE/IFIP Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. ⟨hal-01494259⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sébastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
- Accès au bibtex
-
- ref_biblio
- Ghazaleh Khodabandelou, Vincent Gauthier, Mounim El Yacoubi, Marco Fiore. Population estimation from mobile network traffic metadata. WOWMOM 2016 : 17th International symposium on a world of wireless, mobile and multimedia networks, Jun 2016, Coimbra, Portugal. pp.1 - 9, ⟨10.1109/WoWMoM.2016.7523554⟩. ⟨hal-01426320⟩
- Accès au bibtex
-
- ref_biblio
- Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. VNF placement and chaining in distributed cloud. CLOUD 2016 : 9th IEEE International Conference on Cloud Computing, Jun 2016, San Francisco, United States. pp.376 - 383, ⟨10.1109/CLOUD.2016.0057⟩. ⟨hal-01462034⟩
- Accès au bibtex
-
- ref_biblio
- Marouen Mechtri, Imen Grida Ben Yahia, Djamal Zeghlache. Agile service manager for 5G. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.1285 - 1290, ⟨10.1109/NOMS.2016.7503004⟩. ⟨hal-01462110⟩
- Accès au bibtex
-
- ref_biblio
- Amir Mohammadinejad, Reza Farahbakhsh, Noel Crespi. Employing personality feature to rank the influential users in signed networks. SOCIALCOM 2016 : 9th International Conference on Social Computing and Networking, Oct 2016, Atlanta, United States. pp.346 - 353, ⟨10.1109/BDCloud-SocialCom-SustainCom.2016.59⟩. ⟨hal-01445075⟩
- Accès au bibtex
-
- ref_biblio
- Lina Nachabe Ismail, Marc Girod-Genet, Bachar El Hassan, Johnny Khawaja. Ontology based Tele-health Smart Home Care System: ontosmart to monitor elderly. CoNeCo 2016 : 8th International Conference on Computer Networks & Communications, Jun 2016, Zurich, Switzerland. pp.43 - 59, ⟨10.5121/csit.2016.60805⟩. ⟨hal-01340404⟩
- Accès au bibtex
-
- ref_biblio
- Duy Huy Nguyen, Hang Nguyen, Eric Renault. E-MQS : a new downlink scheduler for real-time flows in LTE network. VTC FALL 2016 : 84th Vehicular Technology Conference , Sep 2016, Montreal, Canada. pp.1 - 5, ⟨10.1109/VTCFall.2016.7880981⟩. ⟨hal-01493173⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Minh Quang Nguyen, Hang Nguyen, Eric Renault, Phan Thuan Do. Joint source-channel coding with adaptation. ICCE 2016 :6th International Conference on Communications and Electronics, Jul 2016, Halong Bay, Vietnam. pp.77 - 81, ⟨10.1109/CCE.2016.7562616⟩. ⟨hal-01446916⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Manh Cuong Nguyen, Hang Nguyen, Eric Georgeaux, Philippe Mège, Laurent Martinod. Adaptive physical resource block design for enhancing voice capacity over LTE network in PMR context. PIMRC 2016 : 27th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2016, Valencia, Spain. pp.1 - 5, ⟨10.1109/PIMRC.2016.7794632⟩. ⟨hal-01446292⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Duy Huy Nguyen, Hang Nguyen, Eric Renault. A new non-intrusive assessment method for VoLTE quality based on extended E-model. MSPN 2016: 2nd international conference on Mobile, Secure and Programmable Networking , Jun 2016, Paris, France. pp.122 - 136, ⟨10.1007/978-3-319-50463-6_11⟩. ⟨hal-01446945⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Duy-Huy Nguyen, Hang Nguyen. A dynamic rate adaptation algorithm using WB E-model for voice traffic over LTE network. 2016 Wireless Days (WD), IFIP; IEEE, Mar 2016, Toulouse, France. pp.1-6, ⟨10.1109/WD.2016.7461490⟩. ⟨hal-01319420⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Praboda Rajapaksha, Reza Farahbakhsh, Samin Karbalay Mohammadi Dastjerdi, Matthew N. Dailey, Noel Crespi. Video content delivery enhancement in CDNs based on users' social information. GLOBECOM 2016 : IEEE Global Communications Conference, Dec 2016, Washington Dc, United States. pp.1 - 6, ⟨10.1109/GLOCOMW.2016.7849079⟩. ⟨hal-01468028⟩
- Accès au bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Revisiting a watermark-based detection scheme to handle cyber-physical attacks. 11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzbourg, Austria. pp.21 - 28, ⟨10.1109/ARES.2016.2⟩. ⟨hal-01449821⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro. Security of cyber-physical systems : from theory to testbeds and validation. CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Sep 2016, Heraklion, Greece. pp.3 - 18, ⟨10.1007/978-3-319-61437-3_1⟩. ⟨hal-01543262⟩
- Accès au bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro. Event-triggered watermarking control to handle cyber-physical integrity attacks. NORDSEC 2016 : 21st Nordic Conference on Secure IT Systems, Nov 2016, Oulu, Finland. pp.3 - 19, ⟨10.1007/978-3-319-47560-8_1⟩. ⟨hal-01450276⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mickael Salaun, Marion Daubignard, Hervé Debar. StemJail: dynamic role compartmentalization. ASIA CCS 2016 : 11th Asia Conference on Computer and Communications Security , May 2016, Xi'An, China. pp.865 - 876 ⟨10.1145/2897845.2897912⟩. ⟨hal-01452811⟩
- Accès au bibtex
-
- ref_biblio
- Yasir Saleem, Noel Crespi, Mubashir Husain Rehmani, Rebecca Copeland, Dina Hussein Ali, et al.. Exploitation of social IoT for recommendation services. WFIoT 2016 : 3rd World Forum on Internet of Things, Dec 2016, Reston, United States. pp.359 - 364, ⟨10.1109/WF-IoT.2016.7845500⟩. ⟨hal-01468020⟩
- Accès au bibtex
-
- ref_biblio
- Jose Manuel Sanchez Vilchez, Imen Grida Ben Yahia, Noel Crespi. Self-modeling based diagnosis of services over programmable networks. NETSOFT 2016 : 2nd IEEE Conference on Network Softwarization, Jun 2016, Seoul, South Korea. pp.277 - 285, ⟨10.1109/NETSOFT.2016.7502423⟩. ⟨hal-01348028⟩
- Accès au bibtex
-
- ref_biblio
- Abdallah Sobehy, Walid Ben-Ameur, Hossam Afifi, Amira Bradai. How to win elections. COLLABORATECOM 2016 : 12th International Conference on Collaborative Computing: Networking, Applications and Worksharing, Nov 2016, Beijing, China. pp.221 - 230, ⟨10.1007/978-3-319-59288-6_20⟩. ⟨hal-01710851⟩
- Accès au bibtex
-
- ref_biblio
- Oussama Soualah, Ilhem Fajjari, Makhlouf Hadji, Nadjib Aitsaadi, Djamal Zeghlache. A novel virtual network embedding scheme based on Gomory-Hu tree within cloud's backbone. NOMS 2016 : Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.536 - 542, ⟨10.1109/NOMS.2016.7502855⟩. ⟨hal-01459189⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Viet Hai Ha. Analysis and evaluation of the performance of CAPE. SCALCOM 2016 : International Conference on Scalable Computing and Communications, IEEE, Jul 2016, Toulouse, France. pp.620-627, ⟨10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0104⟩. ⟨hal-01496859⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Quan Pham Van, Dominique Verchère, Selma Khebbache, Djamal Zeghlache, Patricia Layec, et al.. Virtualized routing and frequency allocation functions in elastic optical networks. ECOC 2016 : 42nd European Conference on Optical Communication, Sep 2016, Düsseldorf, Germany. pp.524 - 526. ⟨hal-01471669⟩
- Accès au bibtex
-
- ref_biblio
- Ifa Fatiha Zain, Azlan Awang, Anis Laouiti. Hybrid MAC protocols in VANET : a survey. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Aug 2016, Kuala Lumpur, Malaysia. pp.3 - 14, ⟨10.1007/978-981-10-3503-6_1⟩. ⟨hal-01496679⟩
- Accès au bibtex
-
2015
- ref_biblio
- Emad Mohamed Abd Elrahman Abousabea, Hatem Ibn Khedher, Hossam Afifi, Thouraya Toukabri Gunes. Fast group discovery and non-repudiation in D2D communications using IBE. IWCMC 2015 : 11th Wireless Communications and Mobile Computing Conference, Aug 2015, Dubrovnik, Croatia. pp.616 - 621, ⟨10.1109/IWCMC.2015.7289154⟩. ⟨hal-01255105⟩
- Accès au bibtex
-
- ref_biblio
- Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. On the isofunctionality of network access control lists. ARES 2015: 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.168 - 173, ⟨10.1109/ARES.2015.78⟩. ⟨hal-01332029⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar. Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics. SECRYPT 2015 : 12th International Conference on Security and Cryptography, Jul 2015, Colmar, France. pp.53 - 64, ⟨10.5220/0005544100530064⟩. ⟨hal-01332331⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atechian, Carole Bassil. Privacy using mobile cloud. DICTAP 2015 : 5th International Conference on Digital Information and Communication Technology and its Applications, Apr 2015, Beirut, Lebanon. pp.178 - 182, ⟨10.1109/DICTAP.2015.7113194⟩. ⟨hal-01272387⟩
- Accès au bibtex
-
- ref_biblio
- Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Rami Yared, Talar Atechian. Micro-economy effect on cloud federation. GSCIT 2015 : Global Summit on Computer & Information Technology, Jun 2015, Sousse, Tunisia. pp.1 - 4, ⟨10.1109/GSCIT.2015.7353324⟩. ⟨hal-01272535⟩
- Accès au bibtex
-
- ref_biblio
- Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atechian. Enhanced revenue optimizing SLA-based admission control for IaaS cloud networks. FICLOUD 2015 : 3rd International Conference on Future Internet of Things and Cloud, Aug 2015, Rome, Italy. pp.225 - 230, ⟨10.1109/FiCloud.2015.123⟩. ⟨hal-01272068⟩
- Accès au bibtex
-
- ref_biblio
- Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fréjus Gbaguidi, Selma Boumerdassi, Eric Renault, Eugène Ezin. Characterizing servers workload in cloud datacenters. FICLOUD 2015 : 3rd International Conference on Future Internet of Things and Cloud, Aug 2015, Rome, Italy. pp.657 - 661, ⟨10.1109/FiCloud.2015.120⟩. ⟨hal-01269580⟩
- Accès au bibtex
-
- ref_biblio
- Giovanni Giambene, van Anh Le, Thomas Bourgeau, Hakima Chaouchi. Soft frequency reuse schemes for heterogeneous LTE systems. ICC 2015 : IEEE International Conference on Communications, Jun 2015, Londres, United Kingdom. pp.3161 - 3166, ⟨10.1109/ICC.2015.7248810⟩. ⟨hal-01272534⟩
- Accès au bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez-Martin. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security, Jul 2015, Paris, France. pp.1 - 6, ⟨10.1109/NTMS.2015.7266480⟩. ⟨hal-01263402v2⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gustavo Daniel Gonzalez Granadillo, Joaquin Garcia-Alfaro, Hervé Debar. Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. 11th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, TX, United States. pp.538-555, ⟨10.1007/978-3-319-28865-9_29⟩. ⟨hal-01332277⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Quyet H. Cao, Giyyarpuram Madhusudan, Reza Farahbakhsh, Noel Crespi. Usage control for data handling in smart cities. GLOBECOM 2015 : IEEE Global Communications Conference, Dec 2015, San Diego, United States. pp.1 - 6, ⟨10.1109/GLOCOM.2015.7417270⟩. ⟨hal-01367526⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Son Han, Quyet Cao Huu, Bahram Alinia, Noel Crespi. Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. AICCSA : 12th ACS/IEEE International Conference on Computer Systems and Applications, Nov 2015, Marrakech, Morocco. pp.1 - 8, ⟨10.1109/AICCSA.2015.7507264⟩. ⟨hal-01348001⟩
- Accès au bibtex
-
- ref_biblio
- Xiao Han, Leye Wang, Ngoc Son Han, Chao Chen, Noel Crespi, et al.. Link prediction for new users in Social Networks. ICC 2015 : IEEE International Conference on Communications , Jun 2015, London, United Kingdom. pp.1250 - 1255, ⟨10.1109/ICC.2015.7248494⟩. ⟨hal-01334023⟩
- Accès au bibtex
-
- ref_biblio
- Sonia Ikken, Eric Renault, M. Tahar Kechadi, Abdelkamel Tari. Toward scheduling I/O request of Mapreduce tasks based on Markov model. MSPN 2015 : First International Conference on Mobile, Secure and Programmable Networking , Jun 2015, Paris, France. pp.78 - 89, ⟨10.1007/978-3-319-25744-0_7⟩. ⟨hal-01269602⟩
- Accès au bibtex
-
- ref_biblio
- Houda Jmila, Djamal Zeghlache. An Adaptive Load Balancing Scheme for Evolving Virtual Networks. 12th Annual IEEE Consumer Communications & Networking Conference, Jan 2015, Las Vegas, United States. ⟨10.1109/CCNC.2015.7158024⟩. ⟨hal-01494255⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Duy Huy Nguyen, Hang Nguyen. An improved Log-MAP algorithm based on polynomial regression function for LTE Turbo decoding. ICCW 2015 : International Conference on Communications, Jun 2015, London, United Kingdom. pp.2163 - 2167, ⟨10.1109/ICCW.2015.7247502⟩. ⟨hal-01283990⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Minh Quang Nguyen, Hang Nguyen. Joint effect of channel coding and AMR compression on speech quality. WICOM 2015 : 11th International Conference on Wireless Communications, Networking and Mobile Computing, Sep 2015, Shanghai, China. pp.291 - 295. ⟨hal-01272054⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Soochang Park, Dina Hussein Ali, Noel Crespi. On-site service discovery along user roaming over Internet of Things. ICCE 2015 : International Conference on Consumer Electronics, Jan 2015, Las Vegas, United States. pp.194 - 195, ⟨10.1109/ICCE.2015.7066377⟩. ⟨hal-01297735⟩
- Accès au bibtex
-
- ref_biblio
- Thouraya Toukabri, Adel Mounir Sareh Said, Emad Mohamed Abd Elrahman Abousabea, Hossam Afifi. Distributed D2D architecture for ITS services in advanced 4G networks. VTC Fall 2015 : IEEE 82nd Vehicular Technology Conference, Sep 2015, Boston, United States. pp.1 - 7, ⟨10.1109/VTCFall.2015.7390893⟩. ⟨hal-01282874⟩
- Accès au bibtex
-
- ref_biblio
- van Long Tran, Eric Renault, Viet Hai Ha. Improving the reliability and the performance of CAPE by using MPI for data exchange on network. MSPN 2015 : First International Conference on Mobile, Secure and Programmable Networking, Jun 2015, Paris, France. pp.90 - 100, ⟨10.1007/978-3-319-25744-0_8⟩. ⟨hal-01377623⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier. CrowdTasker : maximizing coverage quality in Piggyback Crowdsensing under budget constraint. PERCOM 2015 : International Conference on Pervasive Computing and Communications, Mar 2015, Saint Louis, United States. pp.55 - 62, ⟨10.1109/PERCOM.2015.7146509⟩. ⟨hal-01464645⟩
- Accès au bibtex
-
- ref_biblio
- Chen Yuanfang, Noel Crespi, Lei Shu, Lee Myoung Gyu. Reality Mining with Mobile Data. Understanding the Impact of Network Structure on Propagation Dynamics, ICA3PP 2015, 2015, Zhangjiajie, China. pp. 442-461. ⟨hal-01476292⟩
- Accès au bibtex
-
2014
- ref_biblio
- Jacques Abou Abdo, Jacques Demerjian, Hakima Chaouchi, Kabalan Barbar, Guy Pujolle. Operator centric mobile cloud architecture. WCNC 2014 : Wireless Communications and Networking Conference, Apr 2014, Istanbul, Turkey. pp.2982 - 2987, ⟨10.1109/WCNC.2014.6952953⟩. ⟨hal-01281766⟩
- Accès au bibtex
-
- ref_biblio
- Rebecca Copeland, Noel Crespi. Identifying risk profiles and mitigating actions for business communication services. CNSM 2014 : 10th International Conference on Network and Service Management, Nov 2014, Rio De Janeiro, Brazil. pp.236 - 241, ⟨10.1109/CNSM.2014.7014165⟩. ⟨hal-01286074⟩
- Accès au bibtex
-
- ref_biblio
- Rebecca Copeland, Noel Crespi. Rating credibility of sources for profiling risk and business context of service requests. SCC 2014 : IEEE International Conference on Services Computing, Jun 2014, Anchorage, United States. pp.416 - 423, ⟨10.1109/SCC.2014.62⟩. ⟨hal-01334171⟩
- Accès au bibtex
-
- ref_biblio
- Chaima Ghribi, Djamal Zeghlache. Exact and heuristic graph-coloring for energy efficient advance cloud resource reservation. CLOUD 2014 : 7th International Conference on Cloud Computing, Jun 2014, Alaska, United States. pp.112 - 119, ⟨10.1109/CLOUD.2014.25⟩. ⟨hal-01281941⟩
- Accès au bibtex
-
- ref_biblio
- Toufik Guettari, Jérôme Boudy, Badr-Eddine Benkelfat, Jean-Louis Baldinger, Pascal Doré, et al.. Thermal signal analysis in smart home environment for detecting a human presence. ATSIP 2014 : 1st International Conference on Advanced Technologies for Signal and Image Processing, Mar 2014, Sousse, Tunisia. pp.334 - 339, ⟨10.1109/ATSIP.2014.6834631⟩. ⟨hal-01304371⟩
- Accès au bibtex
-
- ref_biblio
- Toufik Guettari, Jérôme Boudy, Badr-Eddine Benkelfat, Jean-Louis Baldinger, Pascal Doré, et al.. Analyse du signal thermique dans un environement intelligent pour detecter la présence humaine. Journées d'Etude en TéléSanté (JETSAN 2014), Jun 2014, Troyes, France. pp.1 - 6. ⟨hal-01459133⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohamed Hadded, Rachid Zagrouba, Anis Laouiti, Paul Mühlethaler, Leila Azouz Saidane. An optimal strategy for collision-free slots allocations in Vehicular Ad-hoc NETworks. IWVSC 2014 : 1st International Workshop on Vehicular Adhoc Networks for Smart Cities, Jun 2014, Kuala Lumpur, Malaysia. pp.15 - 30, ⟨10.1007/978-981-287-158-9_2⟩. ⟨hal-01304348⟩
- Accès au bibtex
-
- ref_biblio
- Xiao Han, Leye Wang, Soochang Park, Angel Cuevas Rumin, Noel Crespi. Alike people, alike interests? A large-scale study on interest similarity in social networks. ASONAM 2014 : IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug 2014, Beijing, China. pp.491 - 496, ⟨10.1109/ASONAM.2014.6921631⟩. ⟨hal-01340426⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identités multiples et protection des données à caractère personnel dans le champ des identités numériques : quelques aspects du paysage européen. 5ème Atelier sur la Protection de la Vie Privée, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
- Accès au bibtex
-
- ref_biblio
- Pinar Kirci, Hakima Chaouchi, Anis Laouiti. Wireless sensor networks and efficient localisation. FICLOUD 2014 : International Conference on Future Internet of Things and Cloud, Aug 2014, Barcelona, Spain. pp.98 - 100, ⟨10.1109/FiCloud.2014.25⟩. ⟨hal-01332368⟩
- Accès au bibtex
-
- ref_biblio
- Cuong Nguyen Manh, Hang Nguyen, Alina Alexandra Florea, Philippe Mège, Laurent Martinod, et al.. Architecture for multi-users multiplexing radio voice transmission for enhancing voice capacity over LTE in PMR context. PIMRC 2014 : IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, Sep 2014, Washington Dc, United States. pp.1459 - 1463 ⟨10.1109/PIMRC.2014.7136398⟩. ⟨hal-01286077⟩
- Accès au bibtex
-
- ref_biblio
- Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Hervé Debar. Classification of SSL servers based on their SSL handshake for automated security assessment. BADGERS 2014 : 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Sep 2014, Wroclaw, Poland. pp.30 - 39, ⟨10.1109/BADGERS.2014.10⟩. ⟨hal-01332339⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Bruno Robillart, Cosimo Calo, Abdoulaye Fall, François Lamare, Yaneck Gottesman, et al.. Spectral and temporal phase measurement by Optical Frequency-Domain Reflectometry. PHOTONICS WEST 2014 : Fiber Lasers XI Conference, Feb 2014, San Francisco, CA, United States. pp.896134, ⟨10.1117/12.2039600⟩. ⟨hal-01285646⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Jose Rubio-Hernan, Joaquin Garcia-Alfaro. On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems. Digital trust : 1st Symposium on Digital Trust in Auvergne, Dec 2014, Clermont-Ferrand, France. ⟨hal-01281994⟩
- Accès au bibtex
-
2013
- ref_biblio
- Ehsan Ahvar, Gyu Myoung Lee, Noel Crespi. A cluster-based peer-to-peer architecture for cloud-based smart homes. CCIS 2013 : International Workshop on Cloud Computing and Information Security, Nov 2013, Shanghai, China. ⟨hal-01369458⟩
- Accès au bibtex
-
- ref_biblio
- Emmanuel Bertin, Sébastien Cubaud, Stéphane Tuffin, Stéphane Cazeaux, Noel Crespi, et al.. WebRTC, the day after: what's next for conversational services?. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.46 - 52, ⟨10.1109/ICIN.2013.6670893⟩. ⟨hal-01274311⟩
- Accès au bibtex
-
- ref_biblio
- Amira Bradai, Hossam Afifi. Game theoretic framework for reputation-based distributed intrusion detection. PASSAT 2013 : ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust, Sep 2013, Washington D.C., United States. pp.214 - 219, ⟨10.1109/SocialCom.2013.84⟩. ⟨hal-01274853⟩
- Accès au bibtex
-
- ref_biblio
- Wipada Chanthaweethip, Xiao Han, Noel Crespi, Yuanfang Chen, Reza Farahbakhsh, et al.. 'Current City' prediction for coarse location based applications on Facebook. GLOBECOM 2013 : IEEE Global Communications Conference, Exhibition & Industry Forum, Dec 2013, Atlanta, United States. pp.3188 - 3193, ⟨10.1109/GLOCOM.2013.6831562⟩. ⟨hal-01297715⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yuanfang Chen, Antonio M. Ortiz, Noel Crespi, Lei Shu, Lin Lv. Reality mining: digging the impact of friendship and location on crowd behavior. MOBIQUITOUS 2013 : 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Dec 2013, Tokyo, Japan. pp.142 - 154, ⟨10.1007/978-3-319-11569-6_12⟩. ⟨hal-01285971⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Bachir Chihani, Emmanuel Bertin, Noel Crespi. A user-centric context-aware mobile assistant. ICIN 2013 : 17th International Conference on Intelligence in Next Generation Networks, Oct 2013, Venice, Italy. pp.110 - 117, ⟨10.1109/ICIN.2013.6670901⟩. ⟨hal-01298746⟩
- Accès au bibtex
-
- ref_biblio
- Bachir Chihani, Emmanuel Bertin, Noel Crespi. A graph-based context modeling approach. SACONET 2013: 4th International Conference on Smart Communications in Network Technologies, Jun 2013, Paris, France. pp.1 - 6, ⟨10.1109/SaCoNeT.2013.6654570⟩. ⟨hal-01277790⟩
- Accès au bibtex
-
- ref_biblio
- Rebecca Copeland, Noel Crespi. Wallet-on-wheels using vehicle's identity for secure mobile money. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.102 - 109, ⟨10.1109/ICIN.2013.6670900⟩. ⟨hal-01274842⟩
- Accès au bibtex
-
- ref_biblio
- Wassim Drira, Eric Renault, Djamal Zeghlache. Towards a secure social sensor network. BIBM 2013 : International Conference on Bioinformatics and Biomedicine, Dec 2013, Shanghai, China. pp.24 - 29, ⟨10.1109/BIBM.2013.6732730⟩. ⟨hal-01281932⟩
- Accès au bibtex
-
- ref_biblio
- Marwa Elbouz, Fatma Bouzidi, Ayman Alfalou, Christian Brosseau, Isabelle Leonard, et al.. Adapted all-numerical correlator for face recognition applications. SPIE Defense, Security and Sensing 2013 : Optical Pattern Recognition XXIV, Apr 2013, Baltimore, United States. pp.874807 - ⟨10.1117/12.2014383⟩. ⟨hal-01696143⟩
- Accès au bibtex
-
- ref_biblio
- Reza Farahbakhsh, Angel Cuevas Rumin, Rubén Cuevas Rumin, Reza Rejaie, Michal Kryczka, et al.. Investigating the reaction of BitTorrent content publishers to antipiracy actions. P2P 2013 : 13th International Conference on Peer-to-Peer Computing, Sep 2013, Trento, Italy. pp.1 - 10, ⟨10.1109/P2P.2013.6688699⟩. ⟨hal-01286059⟩
- Accès au bibtex
-
- ref_biblio
- Takoua Ghariani, Badii Jouaber. Energy aware cross layer uplink scheduling for multihomed environments. GLOBECOM 2013 : 5th IEEE International Workshop on Management of Emerging Networks and Services, Dec 2013, Atlanta, United States. pp.861 - 866, ⟨10.1109/GLOCOMW.2013.6825097⟩. ⟨hal-01281918⟩
- Accès au bibtex
-
- ref_biblio
- Toufik Guettari, Jérôme Boudy, Dan Istrate, Badr-Eddine Benkelfat, Pascal Doré, et al.. Multimodal indoor tracking and localization in the context of healthcare monitoring system. JETSAN 2013 : Journées d'Etude en TéléSanté, May 2013, Fontainebleau, France. ⟨hal-01464756⟩
- Accès au bibtex
-
- ref_biblio
- Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar. An adaptive mitigation framework for handling suspicious network flows via MPLS policies. NORDSEC 2013 : 18th Nordic Conference on Secure IT Systems, Oct 2013, Ilulissat, Greenland. pp.297 - 312, ⟨10.1007/978-3-642-41488-6_20⟩. ⟨hal-01269681⟩
- Accès au bibtex
-
- ref_biblio
- Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Antonio Manzalini, Roberto Minerva, Ernest Kaempfer, Franco Callegati, Aldo Campi, et al.. Manifesto of edge ICT fabric. ICIN 2013 : 17th International Conference on Intelligence in Next Generation, Oct 2013, Venice, Italy. pp.9 - 15, ⟨10.1109/ICIN.2013.6670888⟩. ⟨hal-01274290⟩
- Accès au bibtex
-
- ref_biblio
- Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquin Garcia-Alfaro. Real-time malicious fast-flux detection using DNS and bot related features. PST 2013 : 11th International Conference on Privacy, Security and Trust, Jul 2013, Tarragona, Spain. pp.369 - 372, ⟨10.1109/PST.2013.6596093⟩. ⟨hal-01275014⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Fernando Royo, Teresa Olivares, Noel Crespi, Luis Orozco Barbosa. Smart wireless design scheme: fuzzy-logic routing and TDMA MAC protocol integration. MOBIWAC 2013: 11th ACM International Symposium on Mobility Management and Wireless Access, Nov 2013, Barcelona, Spain. pp.81 - 88, ⟨10.1145/2508222.2508229⟩. ⟨hal-01286008⟩
- Accès au bibtex
-
- ref_biblio
- Bruno Vidalenc, Ludovic Noirie, Laurent Ciavaglia, Eric Renault. Dynamic risk-aware routing for OSPF networks. IM 2013 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.226 - 234. ⟨hal-00850335⟩
- Accès au bibtex
-
- ref_biblio
- Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro. Attribute-based mining process for the organization-based access control model. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.421 - 430, ⟨10.1109/TrustCom.2013.53⟩. ⟨hal-01275020⟩
- Accès au bibtex
-
2012
- ref_biblio
- Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ming-Chen Chung, Gyu Myoung Lee, Noel Crespi, Chien-Chao Tseng. RFID object tracking with IP compatibility for the internet of things. iThings 2012 : IEEE International Conference on Internet of Things, Nov 2012, Besançon, France. pp.132 - 139, ⟨10.1109/GreenCom.2012.30⟩. ⟨hal-00820265⟩
- Accès au bibtex
-
- ref_biblio
- Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): mécanismes de prévention contre l'usurpation d'adresses IP source. SSTIC 2012 : Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Wassim Drira, Eric Renault, Djamal Zeghlache. Towards a dynamic middleware for wireless sensor networks. ICNFI 2012 : International Conference on Networking and Future Internet, Apr 2012, Istanbul, Turkey. pp.42 - 45. ⟨hal-01300847⟩
- Accès au bibtex
-
- ref_biblio
- Wassim Drira, Eric Renault, Djamal Zeghlache. Design and performance evaluation of a composite-based back end system for WSNs. IWCMC 2012 : 8th International Wireless Communications and Mobile Computing Conference, Aug 2012, Limassol, Cyprus. pp.1142 - 1148, ⟨10.1109/IWCMC.2012.6314367⟩. ⟨hal-01299328⟩
- Accès au bibtex
-
- ref_biblio
- Takoua Ghariani, Mehdi Loukil, Badii Jouaber. ECO-WISM: Energy Consumption Optimization for Wireless Interface Selection Mechanism. ICNFI 2012 : International Conference on Networking and Future Internet, Apr 2012, Istanbul, Turkey. ⟨hal-01461601⟩
- Accès au bibtex
-
- ref_biblio
- Viet Hai Ha, Eric Renault. Design of a shared-memory model for CAPE. IWOMP 2012 : 8th International Workshop on OpenMP, Jun 2012, Rome, Italy. pp.262 - 266, ⟨10.1007/978-3-642-30961-8_22⟩. ⟨hal-01300124⟩
- Accès au bibtex
-
- ref_biblio
- Marc Lacoste, Aurelien Wailly, Hervé Debar. Self-defending clouds : myth and realities. C&ESAR 2012 : Computer & Electronics Security Applications Rendez-vous, Nov 2012, Rennes, France. ⟨hal-01464909⟩
- Accès au bibtex
-
- ref_biblio
- Nassim Laga, Emmanuel Bertin, Noel Crespi. Promoting mashup creation through unstructured data extraction. ICOIN 2012 : International Conference on Information Networking, Feb 2012, Bali, Indonesia. pp.59-64, ⟨10.1109/ICOIN.2012.6164349⟩. ⟨hal-01300851⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. One Year of Internet SSL measurement. ACSAC - Annual Computer Security Applications Conference, Dec 2012, Orlando, United States. pp.11-20. ⟨hal-00770473⟩
- Accès au bibtex
-
- ref_biblio
- Aida Seck, Jordi Vuong, Petros Ramantanis, Djalal Falih Bendimerad, Yann Frignac, et al.. Numerical investigation of performance variability for WDM transmission systems using PDM-QPSK channels. OFC/NFOEC 2012 : Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference, Mar 2012, Los Angeles, United States. pp.1 - 3, ⟨10.1364/NFOEC.2012.JW2A.51⟩. ⟨hal-01344518⟩
- Accès au bibtex
-
- ref_biblio
- Zhenzhen Zhao, Ji Liu, Noel Crespi. Dig-event: let's socialize around events. CSCW 2012 : ACM Conference on Computer Supported Cooperative Work, Feb 2012, Seattle, United States. pp.279 - 280, ⟨10.1145/2141512.2141602⟩. ⟨hal-01300820⟩
- Accès au texte intégral et bibtex
-
2011
- ref_biblio
- Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
- Accès au bibtex
-
- ref_biblio
- Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Djalal Falih Bendimerad, Badr-Eddine Benkelfat, Yaneck Gottesman, Omar Seddiki, Rachid Hamdi. Performances of a tunable birefringent filter for high density multi-wavelength applications. Photonics North 2011 : International Conference on Application Photonic Technology, May 2011, Ottawa, Canada. ⟨hal-01302217⟩
- Accès au bibtex
-
- ref_biblio
- Emmanuel Bertin, Noel Crespi, Michel L'Hostis. A few myths about Telco and OTT models. ICIN 2011 : 15th International Conference on Intelligence in Next Generation Networks : From Bits to Data, from Pipes to Clouds, Oct 2011, Berlin, Germany. pp.6 - 10, ⟨10.1109/ICIN.2011.6081106⟩. ⟨hal-01303630⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011 : IEEE Wireless Communications and Networking Conference, Mar 2011, Cancun, Mexico. pp.784 - 789, ⟨10.1109/WCNC.2011.5779232⟩. ⟨hal-01304157⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
- Accès au bibtex
-
- ref_biblio
- Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Bachir Chihani, Emmanuel Bertin, Noel Crespi. A comprehensive framework for context-aware communication services. ICIN 2011 : 15th International Conference on Intelligence in Next Generation Networks : From Bits to Data, from Pipes to Clouds, Oct 2011, Berlin, Germany. pp.52 - 57, ⟨10.1109/ICIN.2011.6081102⟩. ⟨hal-01303628⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kwangjin Choi, Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Navigation information-based proxy server handoff for mobile IPTV services. ITC-CSCC 2011 : 26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun 2011, Gyeongju, South Korea. pp.1170-1173. ⟨hal-01302433⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. Wireless sensor networks energy based protocol in medical application. WiCOM 2011 : 7th International Conference on Wireless Communications, Networking and Mobile Computing, Sep 2011, Wuhan, China. pp.1 - 6, ⟨10.1109/wicom.2011.6040383⟩. ⟨hal-01347756⟩
- Accès au bibtex
-
- ref_biblio
- Sonia Elwardi-Ben Amor, Mourad Zghal, Badr-Eddine Benkelfat. Optimization of coherence multiplexed coding for high density signal processing. PIERS 2011 : Progress In Electromagnetics Research Symposium, Mar 2011, Marrakesh, Morocco. pp.1243 - 1246. ⟨hal-01302403⟩
- Accès au bibtex
-
- ref_biblio
- Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mathew Pradeep Goonewardena, Nandana Rajatheva, Tijani Chahed, Djamal Zeghlache. ENPA and EBPA models for primary user activity based power allocation in cognitive systems. PIMRC 2011 : 22nd Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2011, Toronto, Canada. pp.671 - 675, ⟨10.1109/PIMRC.2011.6140048⟩. ⟨hal-01302213⟩
- Accès au bibtex
-
- ref_biblio
- Zeynep Gurkas Aydin, Abdul Halim Zaim, Hakima Chaouchi, Tülin Atmaca. Extended early update for host identity protocol with movement prediction. ICNFI 2011 : 1st International Conference on Networking and Future Internet, Apr 2011, Paris, France. ⟨hal-01354611⟩
- Accès au bibtex
-
- ref_biblio
- Zeynep Gurkas Aydin, Abdul Halim Zaim, Hakima Chaouchi, Tülin Atmaca. A prediction based mobility extension for eHIP protocol. ISCIS 2011 : 26th International Symposium on Computer and Information Sciences, Sep 2011, London, United Kingdom. pp.209 - 213, ⟨10.1007/978-1-4471-2155-8_26⟩. ⟨hal-01302447⟩
- Accès au bibtex
-
- ref_biblio
- Nabil Hachem, Yosra Ben Mustapha, Gustavo Daniel Gonzalez Granadillo, Hervé Debar. Botnets : lifecycle and taxonomy. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 8, ⟨10.1109/SAR-SSI.2011.5931395⟩. ⟨hal-01301872⟩
- Accès au bibtex
-
- ref_biblio
- Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache. Jeux non-coopératifs dans les clouds : tarification des services. ROADEF 2011 : 12e Congrès Annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision, Mar 2011, Saint-Etienne, France. ⟨hal-01343139⟩
- Accès au bibtex
-
- ref_biblio
- Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache. Constrained pricing for cloud resource allocation. NCA 2011 : 10th IEEE International Symposium on Network Computing and Applications, Aug 2011, Cambridge, United States. pp.359 - 365, ⟨10.1109/NCA.2011.64⟩. ⟨hal-01303658⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Marouen Mechtri, Wajdi Louati, Djamal Zeghlache. Cloud service delivery across multiple cloud platforms. SCC 2011 : 8th International Conference on Services Computing, Jul 2011, Washington, United States. pp.741 - 742, ⟨10.1109/SCC.2011.107⟩. ⟨hal-01303863⟩
- Accès au bibtex
-
- ref_biblio
- Xin Jin, Abdelwaheb Marzouki, Li Chuan Tseng, Mathew Pradeep Goonewardena, Djamal Zeghlache. Adaptive resource allocation using Kalman filters in busy and idle bands for WPM-based cognitive radio systems. SCVT 2011 : 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux, Nov 2011, Ghent, Belgium. pp.1 - 5, ⟨10.1109/SCVT.2011.6101298⟩. ⟨hal-01345055⟩
- Accès au bibtex
-
- ref_biblio
- Khalil Ur Rehman Laghari, Noel Crespi, Benjamin Molina, Carlos E. Palau. QoE aware Service delivery in distributed environment. WAINA 2011 : IEEE Workshops of International Conference on Advanced Information Networking and Applications, Mar 2011, Singapour, Singapore. pp.837-842, ⟨10.1109/WAINA.2011.58⟩. ⟨hal-01303062⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sondes Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gyu Myoung Lee, Noel Crespi. Internet of things for smart objects : ubiquitous networking between humans and objects. ICAIT 2011 : International Conference on Advanced Infocomm Technology, Jul 2011, Wuhan, China. ⟨hal-01465049⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gyu Myoung Lee, Noel Crespi. The internet of things : challenge for a new architecture from problems. Interconnecting Smart Objects with the Internet Workshop 2011, Mar 2011, Prague, Czech Republic. pp.1 - 2. ⟨hal-01304069⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Houssem Medhioub, Ines Houidi, Wajdi Louati, Djamal Zeghlache. Design, implementation and evaluation of virtual resource description and clustering framework. AINA 2011 : 25th IEEE International Conference on Advanced Information Networking and Applications, Mar 2011, Singapour, Singapore. pp.83 - 89 ⟨10.1109/AINA.2011.46⟩. ⟨hal-01304190⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- S. H. Shah Newaz, Youngin Bae, Jongmin Lee, Gyu Myoung Lee, Noel Crespi, et al.. Minimizing the number of IGMP report messages for receiver-driven layered video multicasting. VTC SPRING 2011 : IEEE 73rd Vehicular Technology Conference, May 2011, Budapest, Hungary. pp.1-5, ⟨10.1109/VETECS.2011.5956740⟩. ⟨hal-01304075⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- S. H. Shah Newaz, Angel Cuevas Rumin, Gyu Myoung Lee, Noel Crespi, Jun Kyun Choi. A novel approach for making energy efficient PON. SIGCOMM 2011 : Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, Aug 2011, Toronto, Canada. pp.428 - 429, ⟨10.1145/2018436.2018503⟩. ⟨hal-01464994⟩
- Accès au bibtex
-
- ref_biblio
- S. H. Shah Newaz, Raja Usman Akbar, Y Lim, Gyu Myoung Lee, Noel Crespi, et al.. Efficient mobile IP location update mechanism for idle terminals in optical wireless integrated access networks. ICNS 2011 : 7th International Conference on Networking and Services, May 2011, Venice/Mestre, Italy. pp.257 - 261. ⟨hal-01303869⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Wendong Xiao, Hakima Chaouchi. Cooperative fingerprint-based indoor localization using self-organizing maps. IWCMC 2011 : 7th International Wireless Communications and Mobile Computing Conference, Jul 2011, Istanbul, Turkey. pp.1814 - 1819, ⟨10.1109/IWCMC.2011.5982810⟩. ⟨hal-01302453⟩
- Accès au bibtex
-
- ref_biblio
- Muhammad Shoaib Saleem, Eric Renault, Djamal Zeghlache. Architecture and design of network of information mobile node. ICNFI 2011 : 1st International Conference on Networking and Future Internet, Apr 2011, Paris, France. ⟨hal-01465024⟩
- Accès au bibtex
-
- ref_biblio
- Sivasothy Shanmugalingam, Vincent Verdot, Noel Crespi, Paul Labrogere. A solution for partial video voice over IP session transfer and retrieval. WPMC 2011 : 14th International Symposium on Wireless Personal Multimedia Communications, Oct 2011, Brest, France. pp.1-5. ⟨hal-01303623⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ines Slama, Djamal Zeghlache. A new energy efficient interface selection mechanism for power saving at multi-interface mobile terminals. WTS 2011 : Wireless Telecommunications Symposium, Apr 2011, New York City, United States. ⟨hal-01355089⟩
- Accès au bibtex
-
- ref_biblio
- Juan R. Velasco, Marc Roelands, Dries de Roeck, Rob Moonen, Lieven Trappeniers, et al.. Do-it-yourself creation of pervasive, tangible applications. TEI 2011 : 5th International Conference on Tangible, Embedded, and Embodied Interaction, Jan 2011, Funchal, Portugal. pp.361 - 364, ⟨10.1145/1935701.1935786⟩. ⟨hal-01303670⟩
- Accès au bibtex
-
- ref_biblio
- Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. CSC 2011 : Workshop on Cryptography and Security in Clouds , Mar 2011, Zurich, Switzerland. ⟨hal-01300936⟩
- Accès au bibtex
-
- ref_biblio
- Aurelien Wailly, Marc Lacoste, Hervé Debar. Towards multi-layer autonomic isolation of cloud computing and networking resources. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931358⟩. ⟨hal-01300934⟩
- Accès au bibtex
-
- ref_biblio
- Mariem Zekri, Jeevan Pokhrel, Badii Jouaber, Djamal Zeghlache. Reputation for vertical handover decision making. APCC 2011 : 17th Asia-Pacific Conference on Communications, Oct 2011, Sabah, Malaysia. pp.318 - 323, ⟨10.1109/APCC.2011.6152826⟩. ⟨hal-01347241⟩
- Accès au bibtex
-
- ref_biblio
- Mariem Zekri, Makhlouf Hadji, Badii Jouaber, Djamal Zeghlache. A Nash Stackelberg approach for network pricing, revenue maximization and vertical handover decision making. LCN 2011 : 36th Annual IEEE Conference on Local Computer Networks, Oct 2011, Bonn, Germany. pp.622 - 629, ⟨10.1109/LCN.2011.6115526⟩. ⟨hal-01302399⟩
- Accès au bibtex
-
- ref_biblio
- Hongguang Zhang, Mohammed Boutabia, Hang Nguyen, Lingnan Xia. Field performance evaluation of VoIP in 4G trials. ICME 2011 : IEEE International Conference on Multimedia and Expo, Jul 2011, Barcelone, Spain. pp.1 - 4, ⟨10.1109/ICME.2011.6011962⟩. ⟨hal-01303884⟩
- Accès au bibtex
-
- ref_biblio
- Zhenzhen Zhao, Sirsha Bhattarai, Noel Crespi. An event-based functionality integration framework. ICWS 2011 : 9th IEEE International Conference on Web Services, Jul 2011, Washington, United States. pp.720 - 721, ⟨10.1109/ICWS.2011.121⟩. ⟨hal-01303685⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Zhenzhen Zhao, Sirsha Bhattarai, Ji Liu, Noel Crespi. Mashup services to daily activities : end-user perspective in designing a consumer mashups. iiWAS 2011 : 13th International Conference on Information Integration and Web-based Applications & Services, Dec 2011, Ho Chi Min, Vietnam. pp.222 - 229, ⟨10.1145/2095536.2095574⟩. ⟨hal-01302211⟩
- Accès au bibtex
-
- ref_biblio
- Zhenzhen Zhao, Nassim Laga, Noel Crespi. User-centric service selection, integration and management through daily events. MUCS 2011 : 8th International Workshop on Managing Ubiquitous Communications and Services, Mar 2011, Seatle, United States. pp.94-99, ⟨10.1109/PERCOMW.2011.5766979⟩. ⟨hal-01300822⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Zhenzhen Zhao, Ji Liu, Noel Crespi. The design of activity-oriented social networking : Dig-Event. iiWAS 2011 : 13th International Conference on Information Integration and Web-based Applications & Services , Dec 2011, Ho Chi Min, Vietnam. pp.420 - 425, ⟨10.1145/2095536.2095621⟩. ⟨hal-01302162⟩
- Accès au bibtex
-
- ref_biblio
- Qin Zou, Robert Farha, Kamal Ghoumid, Badr-Eddine Benkelfat. Exaltation de l'émission spontanée à 1,53 µm dans un guide réalisé par diffusion de titane dans un substrat de niobate de lithium dopé à l'erbium et pompé optiquement à 980 nm. COLOQ 2011 : 12e Edition du Colloque sur les Lasers et l'Optique Quantique, Jul 2011, Marseille, France. pp.171 - 172. ⟨hal-01465704⟩
- Accès au bibtex
-
2010
- ref_biblio
- Tara Ali Yahiya, Hakima Chaouchi. On the integration of LTE and mobile WiMAX networks. CON-WIRE 2010 : 1st IEEE International Workshop on Convergence of Heterogeneous Wireless Systems , Aug 2010, Zurich, Switzerland. pp.1 - 5, ⟨10.1109/ICCCN.2010.5560067⟩. ⟨hal-01306780⟩
- Accès au bibtex
-
- ref_biblio
- Raheel Ali Baloch, Noel Crespi. Service dependency analysis in ubiquitous environment. IWUSP 2010 : International Workshop on Ubiquitous Service Platforms , Oct 2010, Kyoto, Japan. ⟨hal-01308713⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Raheel Ali Baloch, Noel Crespi. Addressing context dependency using profile context in overlay networks. PerNets 2010 : 4th International Workshop on Personalized Networks , Jan 2010, Las Vegas, United States. pp.1 - 5, ⟨10.1109/CCNC.2010.5421623⟩. ⟨hal-00470414⟩
- Accès au bibtex
-
- ref_biblio
- Raheel Ali Baloch, Noel Crespi. Formal model for analysis of context dependencies in ubiquitous systems. ICDIM 2010 : 5th International Conference on Digital Information Management, Jul 2010, Thunder Bay, Canada. ⟨10.1109/ICDIM.2010.5663468⟩. ⟨hal-01356345⟩
- Accès au bibtex
-
- ref_biblio
- Kheira Bekara, Maryline Laurent. La vie privée dans les environnements fédérés. Atelier protection de la vie privée 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, Pékin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Shiddhartha Raj Bhandari, Gyu Myoung Lee, Noel Crespi. Mobility model for user's realistic behavior in mobile ad hoc network. CNSR 2010 : 8th Annual Conference on Communication Networks and Services Research, May 2010, Montreal, Canada. pp.102 - 107, ⟨10.1109/CNSR.2010.27⟩. ⟨hal-01314822⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sirsha Bhattarai, Zhenzhen Zhao, Noel Crespi. Consumer mashups : end-user perspectives and acceptance model. iiWAS 2010 : 12th International Conference on Information Integration and Web-based Applications & Services, Nov 2010, Paris, France. pp.930 - 933, ⟨10.1145/1967486.1967651⟩. ⟨hal-01308977⟩
- Accès au bibtex
-
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ismehene Chahbi, Badii Jouaber, Djamal Zeghlache. SCLS : a stream-controlled link scheduling algorithm for MIMO wireless mesh networks. ICCS 2010 : IEEE International Conference on Communication Systems, Nov 2010, Singapore, Singapore. pp.400 - 405, ⟨10.1109/ICCS.2010.5686515⟩. ⟨hal-01308083⟩
- Accès au bibtex
-
- ref_biblio
- Ismehene Chahbi, Badii Jouaber. A joint AOA, AOD and delays estimation of multipath signals based on beamforming techniques. ASILOMAR 2010 : 44th Annual Asilomar Conference on Signals, Systems, and Computers, Nov 2010, Pacific Grove, United States. pp.603 - 607, ⟨10.1109/ACSSC.2010.5757632⟩. ⟨hal-01308159⟩
- Accès au bibtex
-
- ref_biblio
- Tony Cheneau, Maryline Laurent. Étude des solutions de proxy Neighbor Discovery sécurisées et proposition basée sur la Signature Agility. 5ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khadija Daoud Triki, Karine Guillouard, Philippe Herbelin, Noel Crespi. A network-controlled architecture for SCTP hard handover. VTC FALL 2010 : IEEE 72nd Vehicular Technology Conference, Sep 2010, Ottawa, Canada. pp.1 - 5, ⟨10.1109/VETECF.2010.5594583⟩. ⟨hal-01305135⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sonia Elwardi-Ben Amor, Mourad Zghal, Badr-Eddine Benkelfat. Gaussian beam divergence effects on crosstalk in coherence multiplexed system. EOSAM 2010 : 3rd Scientific European Optical Society Annual Meeting, Oct 2010, Paris, France. ⟨hal-01355085⟩
- Accès au bibtex
-
- ref_biblio
- Jagadish Ghimire, Mehdi Mani, Teerapat Sanguankotchakorn, Noel Crespi. Self-connectivity estimation for super node overlay creation in ad-hoc networks. ICT 2010 : 17th International Conference on Telecommunications, Apr 2010, Doha, Qatar. pp.722 - 727, ⟨10.1109/ICTEL.2010.5478804⟩. ⟨hal-01356827⟩
- Accès au bibtex
-
- ref_biblio
- Jagadish Ghimire, Mehdi Mani, Noel Crespi, Teerapat Sanguankotchakorn. Delay and capacity analysis of structured P2P overlay for IP telephony. SPECTS 2010 : International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Jul 2010, Ottawa, Canada. pp.1 - 8. ⟨hal-01356724⟩
- Accès au bibtex
-
- ref_biblio
- Kamal Ghoumid, Chafia Benmouhoub, Richard Ferriere, Badr-Eddine Benkelfat, Gwenn Ulliac, et al.. Performances d'une cavité Fabry-Pérot réalisée par faisceau d'ions focalisés. JNOG 2010 : 29e Journées Nationales d'Optique Guidée, Oct 2010, Besançon, France. pp.69 - 71. ⟨hal-01355082⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Zeynep Gurkas Aydin, Tara Ali Yahiya, Hakima Chaouchi, Abdul Halim Zaim. QoS mobility-aware algorithm using early update for host identity protocol. PIMRC 2010 : 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2010, Istanbul, Turkey. pp.2014 - 2018 ⟨10.1109/PIMRC.2010.5671588⟩. ⟨hal-01306765⟩
- Accès au bibtex
-
- ref_biblio
- Leïla Harfouche, Selma Boumerdassi, Eric Renault. Weighted social Manhattan : modeling and performance analysis of a mobility model. PIMRC 2010 : 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2010, Istanbul, Turkey. pp.2019 - 2023, ⟨10.1109/PIMRC.2010.5671585⟩. ⟨hal-01309495⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Djamal Zeghlache, Panagiotis Papadimitriou, Laurent Mathy. Adaptive virtual network provisioning. VISA 2010 : 2nd ACM SIGCOMM workshop on Virtualized Infrastructure Systems and Architectures, Sep 2010, New Delhi, India. pp.41 - 48, ⟨10.1145/1851399.1851407⟩. ⟨hal-01308686⟩
- Accès au bibtex
-
- ref_biblio
- Cuiting Huang, Noel Crespi. A service composition model for dynamic service creation and update in IMS/Web 2.0 converged environment. AINTEC 2010 : 6th Asian Internet Engineering Conference, Nov 2010, Bangkok, Thailand. pp.95 - 102, ⟨10.1145/1930286.1930299⟩. ⟨hal-01308974⟩
- Accès au bibtex
-
- ref_biblio
- Grégoire Jacob, Eric Filiol, Hervé Debar. Formalization of viruses and malware through process algebras. WAIS 2010 : 4th International Workshop on Advances in Information Security, Feb 2010, Krakow, Poland. pp.597 - 602, ⟨10.1109/ARES.2010.59⟩. ⟨hal-01355337⟩
- Accès au bibtex
-
- ref_biblio
- Nassim Laga, Emmanuel Bertin, Noel Crespi. Service oriented computing from the user perspective. KuVS 2010 : 3rd Kommunikation und Verteilte Systeme (KuVS) Fachgespräch meeting, Oct 2010, Berlin, Germany. ⟨hal-01308988⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nassim Laga, Emmanuel Bertin, Noel Crespi. Business process personalization through Web widgets. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.551 - 558, ⟨10.1109/ICWS.2010.22⟩. ⟨hal-01308979⟩
- Accès au bibtex
-
- ref_biblio
- Nassim Laga, Emmanuel Bertin, Noel Crespi. Composition at the frontend : the user centric approach. ICIN 2010 : 14th International Conference on Intelligence in Next Generation Networks, Oct 2010, Berlin, Germany. pp.1 - 6, ⟨10.1109/ICIN.2010.5640926⟩. ⟨hal-01308991⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khalil Ur Rehman Laghari, Noel Crespi, Imen Grida Ben Yahia. Towards a service delivery based on customer eXperience ontology : shift from service to eXperience. MACE '10 : The 5th International Workshop on Modelling Autonomic Communication Environments, Oct 2010, Niagara Falls, Canada. pp.51 - 61, ⟨10.1007/978-3-642-16836-9_5⟩. ⟨hal-01306841⟩
- Accès au bibtex
-
- ref_biblio
- Sondes Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, Pékin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gyu Myoung Lee, Noel Crespi. ITU-T standardization for energy saving using NGN and connected objects. NOC/OC&I 2010 : 15th European Conference on Networks and Optical Communications / 5th Conference on Optical Cabling and Infrastructure, Jun 2010, Faro-Algarve, Portugal. pp.1 - 7. ⟨hal-01356727⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gyu Myoung Lee, Noel Crespi. Shaping future service environments with the cloud and internet of things : networking challenges and service evolution. 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010), Oct 2010, Heraclion, Greece. pp.399-410, ⟨10.1007/978-3-642-16558-0_34⟩. ⟨hal-01308694⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Adisorn Lertsinsrubtavee, Teerapat Sanguankotchakorn, Anis Laouiti, Kanchana Kanchanasut. Velocity effect to the performance of MANEMO. AsiaFI 2010 : 3rd AsiaFI Winter School on Mobile and Wireless, Feb 2010, Seoul South Korea. ⟨hal-01306147⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Loukil, Takoua Ghariani, Badii Jouaber, Djamal Zeghlache. A semantic database framework for context management in heterogeneous wireless networks. WIMOB 2010 : 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.35 - 39, ⟨10.1109/WIMOB.2010.5645041⟩. ⟨hal-01308280⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Mani, Anh Minh Nguyen, Noel Crespi. SCOPE : a prototype for spontaneous P2P social networking. PerCom 2010 : 8th IEEE International Conference on Pervasive Computing and Communications, Mar 2010, Mannheim, Germany. pp.220 - 225, ⟨10.1109/PERCOMW.2010.5470664⟩. ⟨hal-01356722⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Daniel Migault, Cédric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Energy-aware and fast handoff relying on wireless sensor/actuator networks and RFID. ANT 2010 : The International Conference on Ambient Systems, Networks and Technologies, Nov 2010, Paris, France. ⟨hal-01305738⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Handoff management relying on RFID technology. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sydney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506534⟩. ⟨hal-01306764⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Deploying wireless sensor/actuator networks and RFID for handoff enhancement. CIMSiM 2010 : 2nd International Conference on Computational Intelligence, Modelling and Simulation, Sep 2010, Bali Indonesia. pp.457 - 463, ⟨10.1109/CIMSiM.2010.57⟩. ⟨hal-01306767⟩
- Accès au bibtex
-
- ref_biblio
- Petros Ramantanis, Jordi Vuong, Yann Frignac, Badr-Eddine Benkelfat. Impact de la séquence de données sur la dégradation des signaux QPSK dans les systèmes de transmission optique. JNOG 2010 : 29e Journées Nationales d'Optique Guidée, Oct 2010, Besançon, France. pp.81 - 83. ⟨hal-01306008⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Wajdi Louati, Ines Houidi, Houssem Medhioub. A framework to describe and search for virtual resource objects. AST 2010 : 2010 International Conference on Advanced Science and Technology, Jun 2010, Miyazaki, Japan. pp.208 - 219, ⟨10.1007/978-3-642-17569-5_22⟩. ⟨hal-01308156⟩
- Accès au bibtex
-
- ref_biblio
- Peter Schoo, Volker Fusenig, Victor Souza, Marcio Daniel Tavares De Melo, Paul Murray, et al.. Challenges for cloud networking security. MONAMI 2010 : 2nd International ICST Conference on Mobile Networks & Management, Sep 2010, Santander, Spain. pp.298 - 313, ⟨10.1007/978-3-642-21444-8_26⟩. ⟨hal-01306886⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sivasothy Shanmugalingam, Noel Crespi, Paul Labrogere. User mobility in a web-based communication system. 4th International Conference on Internet Multimedia Systems Architecture and Applications (IMSAA 2010), Dec 2010, Bangalore, India. pp.1-6, ⟨10.1109/IMSAA.2010.5729395⟩. ⟨hal-01305754⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sivasothy Shanmugalingam, Noel Crespi, Paul Labrogere. My own communication service provider. ICUMT 2010 : International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Oct 2010, Moscow, Russia. pp.260 - 266, ⟨10.1109/ICUMT.2010.5676628⟩. ⟨hal-01308993⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Transmit and reserve (tar) : a coordinated channel access for IEEE 802.11 networks. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sidney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506240⟩. ⟨hal-01306741⟩
- Accès au bibtex
-
- ref_biblio
- Mariem Zekri, Badii Jouaber, Djamal Zeghlache. On the use of network QoS reputation for vertical handover decision making. FUSECO 2010 : IEEE Globecom Future Seamless Communication Workshop, Dec 2010, Miami, United States. pp.2006 - 2011, ⟨10.1109/GLOCOMW.2010.5700296⟩. ⟨hal-01308057⟩
- Accès au bibtex
-
- ref_biblio
- Mariem Zekri, Badii Jouaber, Djamal Zeghlache. Context aware vertical handover decision making in heterogeneous wireless networks. P2MNet 2010 : 6th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Oct 2010, Denver, United States. pp.780 - 784, ⟨10.1109/LCN.2010.5735809⟩. ⟨hal-01308022⟩
- Accès au bibtex
-
- ref_biblio
- Hongguang Zhang, Hang Nguyen, Noel Crespi, Sivasothy Shanmugalingam, Tien Anh Le, et al.. A metadata-based approach for multimedia service mashup in IMS. CNSR 2010 : 8th Conference on Communication Networks and Services Research, May 2010, Montreal, Canada. pp.356 - 360, ⟨10.1109/CNSR.2010.30⟩. ⟨hal-01354667⟩
- Accès au bibtex
-
- ref_biblio
- Hongguang Zhang, Marc Girod-Genet, Djamal Zeghlache, Tien Anh Le, Hang Nguyen, et al.. Collaborative home media community with semantic support. NIME 2010 : 6th IEEE International Workshop on Networking Issues in Multimedia Entertainment, Jul 2010, Singapore, Singapore. pp.1387 - 1392, ⟨10.1109/ICME.2010.5582945⟩. ⟨hal-01356677⟩
- Accès au bibtex
-
2009
- ref_biblio
- Ahmad Ahmad, Hossam Afifi, Aroua Biri, Djamal Zeghlache. TIBC : Trade-off between Identity-Based and Certificateless Cryptography for future internet. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.2866 - 2870, ⟨10.1109/PIMRC.2009.5450118⟩. ⟨hal-01366510⟩
- Accès au bibtex
-
- ref_biblio
- Tara Ali Yahiya, Hakima Chaouchi. Zone switching diversity for hierarchical resource allocation in mobile WiMAX networks. MWS 2009 : IEEE Mobile Wimax Symposium , Jul 2009, Napa Valley, Ca, United States. pp.69 - 74, ⟨10.1109/MWS.2009.9⟩. ⟨hal-01367450⟩
- Accès au bibtex
-
- ref_biblio
- Tara Ali Yahiya, Hakima Chaouchi. An optimized handover decision for heterogenous wireless networks. MSWiM 2009 : 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct 2009, Tenerife, Canary Islands, Spain. pp.137 - 142, ⟨10.1145/1641913.1641933⟩. ⟨hal-01361032⟩
- Accès au bibtex
-
- ref_biblio
- Ebtisam Amar, Selma Boumerdassi, Eric Renault. Predictive scheme for location service in mobile ad-hoc networks. MoWiN 2009 : 1st International Workshop on Mobile & Wireless Networks, Jun 2009, Seoul, South Korea. pp.522 - 531, ⟨10.1007/978-3-642-02617-1_53⟩. ⟨hal-00447548⟩
- Accès au bibtex
-
- ref_biblio
- Shiddhartha Raj Bhandari, Gyu Myoung Lee, Noel Crespi. Peer to peer proxy based IPTV services. GLOBECOM WORKSHOPS 2009 : 3rd Workshop on Enabling the Future Service-Oriented Internet : Towards Socially-Aware Networks, Nov 2009, Honolulu, United States. pp.1 - 6, ⟨10.1109/GLOCOMW.2009.5360711⟩. ⟨hal-01317645⟩
- Accès au bibtex
-
- ref_biblio
- Mathieu Boussard, Vincent Hiribarren, Jean Pierre Le Rouzic, Stephanie Fodor, Ivan Bedini, et al.. Servery : web telco marketplace. ICT - MobileSummit 2009 : ICT Mobile and Wireless Communications Summit, Jun 2009, Santander, Spain. ⟨hal-01316463⟩
- Accès au bibtex
-
- ref_biblio
- Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Evaluation of Two Privacy-Preserving Protocols for the DNS. 2009 Sixth International Conference on Information Technology: New Generations, Apr 2009, Las Vegas, United States. pp.411-416, ⟨10.1109/ITNG.2009.195⟩. ⟨hal-03628760⟩
- Accès au bibtex
-
- ref_biblio
- Ismehene Chahbi, Badii Jouaber, Djamal Zeghlache. Improving performance of ad hoc and vehicular networks using the LCMV Beamformer. WiMob 2009 : 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2009, Marrakech, Morocco. pp.98 - 103, ⟨10.1109/WiMob.2009.26⟩. ⟨hal-00441326⟩
- Accès au bibtex
-
- ref_biblio
- Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Amélioration des performances des adresses CGA et du protocole SEND : étude comparée de RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4ème Conférence sur la sécurité des architectures réseaux et des systèmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Khadija Daoud, Philippe Herbelin, Karine Guillouard, Noel Crespi. Performance and implementation of UFA : a SIP-based ultra flat mobile network architecture. PIMRC 2009 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2009, Tokyo, Japan. pp.793 - 797, ⟨10.1109/PIMRC.2009.5450117⟩. ⟨hal-01368589⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, M. Barbeau, E. Kranakis. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. 2009 Seventh Annual Communication Networks and Services Research Conference (CNSR), May 2009, Moncton, Canada. pp.86-93, ⟨10.1109/CNSR.2009.23⟩. ⟨hal-03628765⟩
- Accès au bibtex
-
- ref_biblio
- Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim. eHIP: early update for Host Identity Protocol. MOBILITY 2009 : 6th International Conference on Mobile Technology, Applications and Systems, Sep 2009, Nice, France. pp.1 - 4, ⟨10.1145/1710035.1710090⟩. ⟨hal-01317690⟩
- Accès au bibtex
-
- ref_biblio
- Leïla Harfouche, Selma Boumerdassi, Eric Renault. Towards a social mobility model. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.2876 - 2880, ⟨10.1109/PIMRC.2009.5450050⟩. ⟨hal-00447551⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Djamal Zeghlache, Stephan Baucke. Virtual resource description and clustering for virtual network discovery. ICC 2009 : IEEE International Conference on Communications, Jun 2009, Dresden, Germany. pp.1 - 6, ⟨10.1109/ICCW.2009.5207979⟩. ⟨hal-01368460⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Cuiting Huang, Noel Crespi. Extended policies for automatic service composition in IMS. APSCC 2009 : IEEE Asia-Pacific Services Computing Conference, Dec 2009, Biopolis, Singapore. pp.254 - 259, ⟨10.1109/APSCC.2009.5394116⟩. ⟨hal-01368599⟩
- Accès au bibtex
-
- ref_biblio
- Cuiting Huang, Noel Crespi. Enriched SCIM for service composition within IMS environment. MASS 2009 : International Conference on Management and Service Science, Sep 2009, Wuhan, China. pp.1 - 4, ⟨10.1109/ICMSS.2009.5303641⟩. ⟨hal-01360942⟩
- Accès au bibtex
-
- ref_biblio
- Willy Ronald Jimenez Freitez, Hakima Chaouchi. On AAA framework in opportunistic ad-hoc networks : OLSR usecase. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.37 - 49. ⟨hal-01333267⟩
- Accès au bibtex
-
- ref_biblio
- Nassim Laga, Emmanuel Bertin, Noel Crespi. Building a user friendly service dashboard : automatic and non-intrusive chaining between widgets. WebX 2009 : 3rd IEEE International Workshop on Web X.o, Jul 2009, Los Angeles, United States. pp.484 - 491, ⟨10.1109/SERVICES-I.2009.62⟩. ⟨hal-01317663⟩
- Accès au bibtex
-
- ref_biblio
- Sondes Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Architecture for IPTV content delivery. ICAIT 2009 : International Conference on Advanced Infocomm Technology, Jul 2009, Xi'An, China. ⟨hal-01364284⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Noel Crespi. Object identification for ubiquitous networking. ICACT 2009 : 11th International Conference on Advanced Communication Technology, Feb 2009, Phoenix Park, South Korea. pp.255 - 259. ⟨hal-01360143⟩
- Accès au bibtex
-
- ref_biblio
- Jongmin Lee, S. H. Shah Newaz, Jun Kyun Choi, Gyu Myoung Lee, Noel Crespi. QoS mapping over hybrid optical and wireless access networks. HOWAN 2009 : 1st International Workshop on Hybrid Optical and Wireless Access Networks (workshop part of INTERNET 2009), Aug 2009, Cannes/La Bocca, France. pp.139 - 141, ⟨10.1109/INTERNET.2009.28⟩. ⟨hal-01316415⟩
- Accès au bibtex
-
- ref_biblio
- Abderrahmane Maaradji, Cuiting Huang, Noel Crespi. Towards personalized services composition on IMS : a basic approach. ICAIT 2009 : International Conference on Advanced Infocomm Technology, Jul 2009, Xi'An, China. ⟨hal-01368581⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Mani, Anh Minh Nguyen, Noel Crespi. What's up 2.0 : P2P spontaneous social networking. INFOCOM 2009 : 28th IEEE Conference on Computer Communications, Apr 2009, Rio De Janiero, Brazil. pp.1 - 2. ⟨hal-01360807⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Mani, Anh Minh Nguyen, Noel Crespi. What's up : P2P spontaneous social networking. PERCOM 2009 : 7th International Conference on Pervasive Computing and Communications, Mar 2009, Galveston, United States. pp.1 - 2, ⟨10.1109/PERCOM.2009.4912800⟩. ⟨hal-01316831⟩
- Accès au bibtex
-
- ref_biblio
- Benjamin Molina, Carlos E. Palau, Stephanie Fodor, Jean-Pierre Lerouzic, Oscar Lorenzo Dueñas, et al.. SERVERY : future Internet, telco and user convergence. FIA 2009 : Future Internet Assembly, Nov 2009, Stockholm, Sweden. ⟨hal-01316422⟩
- Accès au bibtex
-
- ref_biblio
- Guillermo Navarro-Arribas, Joaquin Garcia‐alfaro. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. 24th IFIP TC-11 International Information Security Conference (IFIPsec2009), May 2009, Pafos, Cyprus. pp.164-175, ⟨10.1007/978-3-642-01244-0_15⟩. ⟨hal-03628762⟩
- Accès au bibtex
-
- ref_biblio
- Anh Minh Nguyen, Muhammad Qaisar Choudhary, Mehdi Mani, Noel Crespi. What's UP 3.0 : spontaneous social networking in challenged networks. CHANTS 2009 : 5th Workshop on Challenged Networks, Sep 2009, Beijing, China. ⟨hal-01361008⟩
- Accès au bibtex
-
- ref_biblio
- Anh Minh Nguyen, Noel Crespi. SOCIAL-DTN : why social networking services is more fruitful to mobile delay-tolerant networks ?. E-DTN 2009 : Workshop on the Emergence of Delay-/Disruption-Tolerant Networks, Oct 2009, Saint Petersbourg, Russia. pp.1 - 2, ⟨10.1109/ICUMT.2009.5345436⟩. ⟨hal-01364338⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. RFID-assisted movement detection improvement in IP mobility. NTMS 2009 : 3rd International Conference on New Technologies, Mobility and Security, Dec 2009, Cairo, Egypt. pp.1 - 6, ⟨10.1109/NTMS.2009.5384701⟩. ⟨hal-01367458⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Orientation-based radio map extensions for improving positioning system accuracy. IWCMC 2009 : 5th International Wireless Communications and Mobile Computing Conference, Jun 2009, Leipzig, Germany. pp.947 - 951, ⟨10.1145/1582379.1582586⟩. ⟨hal-01366502⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Exploiting multi-modality and diversity for localization enhancement : WiFi & RFID usecase. PIMRC 2009 : IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, Sep 2009, Tokyo, Japan. pp.1903 - 1907, ⟨10.1109/PIMRC.2009.5449853⟩. ⟨hal-01360206⟩
- Accès au bibtex
-
- ref_biblio
- Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro, Laurent Toutain, et al.. Semantic context aware security policy deployment. the 4th International Symposium, Mar 2009, Sydney, France. pp.251, ⟨10.1145/1533057.1533092⟩. ⟨hal-03628758⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Djamal Zeghlache. The metalist model : a simple and extensible information model for the future Internet. EUNICE 2009 : 15th Open European Summer School, Sep 2009, Barcelona, Spain. pp.88 - 97, ⟨10.1007/978-3-642-03700-9_10⟩. ⟨hal-00447549⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Ahmad Ahmad, Mohamed Abid. Toward a security model for the future network of information. IWUCA 2009 : International Workshop on Ubiquitous Computing & Applications, Dec 2009, Fukuoka, Japan. pp.432 - 437, ⟨10.1109/ICUT.2009.5405676⟩. ⟨hal-00447552⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Selma Boumerdassi. Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards. ICUFN 2009 : 1st International Conference on Ubiquitous and Future Networks, Jun 2009, Hong-Kong, Hong Kong SAR China. pp.106 - 111, ⟨10.1109/ICUFN.2009.5174294⟩. ⟨hal-00447380⟩
- Accès au bibtex
-
- ref_biblio
- Sivasothy Shanmugalingam, Gyu Myoung Lee, Noel Crespi, Emmanuel Bertin. An enabler gateway for service composition using SIP. ICIN 2009 : 13th International Conference on Intelligence in Next Generation Networks, Oct 2009, Bordeaux, France. pp.1 - 6, ⟨10.1109/ICIN.2009.5357077⟩. ⟨hal-01317670⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sivasothy Shanmugalingam, Gyu Myoung Lee, Noel Crespi. A unified session control protocol for IPTV services. ICACT 2009 : 11th International Conference on Advanced Communication Technology, Feb 2009, Phoenix Park, South Korea. pp.961 - 965. ⟨hal-00435130⟩
- Accès au bibtex
-
- ref_biblio
- Mirza Tayyab Mehmood, Abdelwaheb Marzouki, Djamal Zeghlache. Decentralized link adaptation for multi-link MIMO interference system. WONS 2009 : 6th International Conference on Wireless On-demand Network Systems and Services, Feb 2009, Snowbird, Utah, United States. pp.71 - 77, ⟨10.1109/WONS.2009.4801845⟩. ⟨hal-01366252⟩
- Accès au bibtex
-
- ref_biblio
- Vincent Verdot, Noel Crespi. Demo - dSM : distributed Service Manager for seamless mobility. INFOCOM 2009 : 28th IEEE Conference on Computer Communications, Apr 2009, Rio De Janiero, Brazil. pp.1 - 3. ⟨hal-01367802⟩
- Accès au bibtex
-
- ref_biblio
- Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
- Accès au bibtex
-
2008
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
- Accès au bibtex
-
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sergio Castillo-Perez, Joaquin Garcia‐alfaro. Anonymous Resolution of DNS Queries. International Workshop on Information Security (IS'08), International OTM Conference, Nov 2008, Monterrey, Mexico. pp.987-1000, ⟨10.1007/978-3-540-88873-4_5⟩. ⟨hal-03628757⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Christian Dannewitz, Kostas Pentikousis, René Rembarz, Eric Renault, Ove Stranberg, et al.. Scenarios and research issues for a network of information. MOBIMEDIA 2008 : 4th International Mobile Multimedia Communications Conference, Jul 2008, Oulu, Finland. pp.451 - 482, ⟨10.4108/ICST.MOBIMEDIA2008.3980⟩. ⟨hal-01395075⟩
- Accès au bibtex
-
- ref_biblio
- Khadija Daoud, Philippe Herbelin, Noel Crespi. One-node-based mobile architecture for a better QoS control. WD 2008 : 1st IFIP Wireless Days Conference, Nov 2008, Dubai, United Arab Emirates. pp.1 - 5, ⟨10.1109/WD.2008.4812874⟩. ⟨hal-00435069⟩
- Accès au bibtex
-
- ref_biblio
- Khadija Daoud, Philippe Herbelin, Noel Crespi. UFA : Ultra Flat Architecture for High Bitrate Services in mobile networks. PIMRC 2008 : 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2008, Cannes, France. pp.1 - 6, ⟨10.1109/PIMRC.2008.4699577⟩. ⟨hal-00435009⟩
- Accès au bibtex
-
- ref_biblio
- Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
- Accès au bibtex
-
- ref_biblio
- Bassam El Saghir, Noel Crespi. A generic layer model for context-aware communication adaptation. WCNC 2008 : IEEE Wireless Communications & Networking Conference, Mar 2008, Las Vegas, United States. pp.3027 - 3032, ⟨10.1109/WCNC.2008.529⟩. ⟨hal-00435011⟩
- Accès au bibtex
-
- ref_biblio
- Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. Mobile wireless sensor networks using MDSAP, model for a hospital application. WiCOM 2008 : 4th international conference on Wireless Communications, Networking and Mobile Computing, Oct 2008, Dalian, China. pp.1 - 6, ⟨10.1109/WiCom.2008.835⟩. ⟨hal-01326192⟩
- Accès au bibtex
-
- ref_biblio
- Samir El-Haddad, Marc Girod-Genet, Bachar El Hassan. MDSAP simulation using TinyOs and hospital application modeling. ICADIWT 2008 : 1st IEEE International Conference on the Applications of Digital Information and Web Technologies , Aug 2008, Ostrava, Czech Republic. pp.133 - 138, ⟨10.1109/ICADIWT.2008.4664332⟩. ⟨hal-01326194⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Analysis of Threats to the Security of EPC Networks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR), May 2008, Halifax, Canada. pp.67-74, ⟨10.1109/CNSR.2008.69⟩. ⟨hal-03628754⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, M. Jaeger, G. Muhl, I. Barrera, J. Borrell. Distributed Exchange of Alerts for the Detection of Coordinated Attacks. 2008 6th Annual Communication Networks and Services Research Conference (CNSR '08), May 2008, Halifax, Canada. pp.96-103, ⟨10.1109/CNSR.2008.70⟩. ⟨hal-03628753⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Security Threats on EPC Based RFID Systems. 2008 Fifth International Conference on Information Technology: New Generations (ITNG), Apr 2008, Las Vegas, United States. pp.1242-1244, ⟨10.1109/ITNG.2008.206⟩. ⟨hal-03628751⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Evaluation of Anonymized ONS Queries. Workshop on Security of Autonomous and Spontaneous Networks (SETOP 2008), Oct 2008, Loctudy, France. ⟨hal-03628755⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Djamal Zeghlache. A distributed virtual network mapping algorithm. ICC 2008 : IEEE International Conference on Communications, May 2008, Beijing, China. pp.5634 - 5640, ⟨10.1109/ICC.2008.1056⟩. ⟨hal-01343135⟩
- Accès au bibtex
-
- ref_biblio
- Ines Houidi, Wajdi Louati, Djamal Zeghlache. A distributed and autonomic virtual network mapping framework. ICAS 2008 : 4th International Conference on Autonomic and Autonomous System , Mar 2008, Gosier, France. pp.241 - 247, ⟨10.1109/ICAS.2008.40⟩. ⟨hal-01343126⟩
- Accès au bibtex
-
- ref_biblio
- Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
- Accès au bibtex
-
- ref_biblio
- Satish Chandra Jha, Badii Jouaber, Kazi M. Ahmed. Dynamic-address-allocation based scalable routing protocol in context of node mobility. WHNC 2008 : IEEE Wireless Hive Networks Conference, Aug 2008, Austin, Texas, United States. pp.1 - 6, ⟨10.1109/WHNC.2008.4629491⟩. ⟨hal-01343138⟩
- Accès au bibtex
-
- ref_biblio
- Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sondes Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
- Accès au bibtex
-
- ref_biblio
- Wassef Louati, Djamal Zeghlache. Personal overlay networks management using a P2P-based publish/subscribe naming system. PDP 2008 : 16th Euromicro Conference on Parallel, Distributed and network-based Processing, Feb 2008, Toulouse, France. pp.95 - 99, ⟨10.1109/PDP.2008.78⟩. ⟨hal-01326477⟩
- Accès au bibtex
-
- ref_biblio
- Wassef Louati, Djamal Zeghlache. A P2P-based middleware for wide-area service discovery. ASWN 2008 : 8th International Workshop on Applications and Services in Wireless Networks, Oct 2008, Kassel, Germany. pp.57 - 65, ⟨10.1109/ASWN.2008.11⟩. ⟨hal-01380282⟩
- Accès au bibtex
-
- ref_biblio
- Abderrahmane Maaradji, Arnaud Gonguet, Noel Crespi, Johann Daigremont. La composition de service dans l'IMS, un premier pas vers "l'Ubiquitous Computing" dans les réseaux télécoms. DNAC 2008 : 22ème Congrès "De Nouvelles Architectures pour les Communications" : la convergence des réseaux IP et le Post-IP, Dec 2008, Paris, France. ⟨hal-00435097⟩
- Accès au bibtex
-
- ref_biblio
- Mehdi Mani, Anh Minh Nguyen, Noel Crespi. SCOPE- service classified overlay for P2P environment, a service platform for P2P services over ad-hoc networks. MASS 2008 : 5th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Sep 2008, Atlanta, Georgia, United States. pp.541 - 543, ⟨10.1109/MAHSS.2008.4660083⟩. ⟨hal-00435070⟩
- Accès au bibtex
-
- ref_biblio
- Moshe Timothy Masonta, Marc Girod-Genet, Olufemi James Oyedapo, Damien Chatelain. Light-weight IP Multimedia Subsystem (IMS) client for mobile devices. CCECE 2008 : IEEE 21st Canadian Conference on Electrical and Computer Engineering, May 2008, Niagara Falls, Ontario, Canada. pp.453 - 458, ⟨10.1109/CCECE.2008.4564575⟩. ⟨hal-01395068⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Charles Ancelin, Willy Ronald Jimenez Freitez, Oscar Javier Botero Gomez. Using source-to-source transformation tools to provide distributed parallel applications from OpenMP source code. ISPDC 2008 : 7th International Symposium on Parallel and Distributed Computing, Jul 2008, Krakow, Poland. pp.197 - 204, ⟨10.1109/ISPDC.2008.65⟩. ⟨hal-00447557⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Charles Ancelin, Oscar Javier Botero Gomez, Willy Ronald Jimenez Freitez. Executing OpenMP programs on distributed resources using a source-to-source transformation tool. PDCCS 2008 : 21st International Conference on Parallel and Distributed Computing and Communication Systems, Sep 2008, New Orleans, United States. pp.199 - 204. ⟨hal-00447581⟩
- Accès au bibtex
-
- ref_biblio
- Luis Sanchez, Jorge Lanza, Ingrid Moerman, Jeroen Hoebeke, Kimmo Ahola, et al.. Assessing personal networks on a Pan-European testbed. ICT-MobileSummit 2008, Jun 2008, Stockholm, Sweden. pp.1 - 8. ⟨hal-01326498⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Badii Jouaber, Djamal Zeghlache. Improving energy consumption in large scale wireless sensor networks with multiple mobile sinks deployment. WINSYS 2008 : International Conference on Wireless Information Networks and Systems, Jul 2008, Porto, Portugal. pp.29 - 37, ⟨10.5220/0002024700290037⟩. ⟨hal-00441316⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Badii Jouaber, Djamal Zeghlache. Energy efficient scheme for large scale wireless sensor networks with multiple sinks. WCNC 2008 : IEEE Wireless Communications & Networking Conference, Mar 2008, Las Vegas, United States. pp.2367 - 2372, ⟨10.1109/WCNC.2008.417⟩. ⟨hal-01343132⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache. A hybrid MAC with prioritization for wireless sensor networks. LCN 2008 : 33rd IEEE Conference on Local Computer Networks, Oct 2008, Montréal, Canada. pp.274 - 281, ⟨10.1109/LCN.2008.4664180⟩. ⟨hal-01392802⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache, Tapio J. Erke. DNIB : distributed neighborhood information based TDMA scheduling for wireless sensor networks. VTC Fall 2008: IEEE 68th Vehicular Technology Conference, Sep 2008, Calgary, Alberta, Canada. pp.1 - 5, ⟨10.1109/VETECF.2008.25⟩. ⟨hal-01395273⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Badii Jouaber, Djamal Zeghlache. A free collision and distributed slot assignment algorithm for wireless sensor networks. GLOBECOM 2008 : IEEE Global Telecommunications Conference, Nov 2008, New Orleans, Louisiana, United States. pp.367 - 372, ⟨10.1109/GLOCOM.2008.ECP.78⟩. ⟨hal-01395249⟩
- Accès au bibtex
-
- ref_biblio
- Zhenzhen Zhao, Jie Chen, Noel Crespi. A policy-based framework for autonomic reconfiguration management in heterogeneous networks. MUM 2008 : 7th International Conference on Mobile and Ubiquitous Multimedia, Dec 2008, Umea, Sweden. pp.71 - 78, ⟨10.1145/1543137.1543150⟩. ⟨hal-00435079⟩
- Accès au bibtex
-
2007
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP 2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de sécurité dans un réseau mesh multi sauts. GRES 2007 : 8ème Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des réseaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Sondes Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Frederic Cuppens, Nora Cuppens-Boulahia. Aggregating and Deploying Network Access Control Policies. The Second International Conference on Availability, Reliability and Security (ARES'07), Apr 2007, Vienna, France. pp.532-542, ⟨10.1109/ARES.2007.34⟩. ⟨hal-03628743⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. 2nd International Symposium on Information Security (IS'07), International OTM Conference (OTM 2007), Nov 2007, Vilamoura, Portugal. pp.1770-1784, ⟨10.1007/978-3-540-76843-2_45⟩. ⟨hal-03628749⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Guillermo Navarro-Arribas. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. IFIP IEEE CRITIS'07 2nd International Workshop on Critical Information Infrastructures Security, Oct 2007, Malaga, Spain. pp.287-298, ⟨10.1007/978-3-540-89173-4_24⟩. ⟨hal-03628748⟩
- Accès au bibtex
-
- ref_biblio
- Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia‐alfaro, Laurent Toutain. Reliable Process for Security Policy Deployment. International Conference on Security and Cryptography, Jul 2007, Barcelona, France. pp.5-15, ⟨10.5220/0002119200050015⟩. ⟨hal-03628747⟩
- Accès au bibtex
-
2006
- ref_biblio
- Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection of Network Security Component Misconfiguration by Rewriting and Correlation. 5th Conference on Security and Network Architectures (SAR-SSI2006), Jun 2006, Seignose, France. ⟨hal-03628721⟩
- Accès au texte intégral et bibtex
-
2005
- ref_biblio
- J. Castella-Roca, G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro. Digital chips for an on-line casino. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.494-499 Vol. 1, ⟨10.1109/ITCC.2005.130⟩. ⟨hal-03628687⟩
- Accès au bibtex
-
- ref_biblio
- Frederic Cuppens, Nora Boulahia Cuppens, Joaquin Garcia‐alfaro. Detection and Removal of Firewall Misconfiguration. 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005 ), Nov 2005, Phoenix, United States. ⟨hal-03628708⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia‐alfaro. Misconfiguration Management of Network Security Components. 7th International Symposium on System and Information Security (SSI 2005), Nov 2005, Sao Paolo, Brazil. ⟨hal-03628705⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, F. Cuppens, F. Autrel, J. Castella-Roca, J. Borrell, et al.. Protecting on-line casinos against fraudulent player drop-out. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, Apr 2005, Las Vegas, France. pp.500-505 Vol. 1, ⟨10.1109/ITCC.2005.232⟩. ⟨hal-03628680⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, S. Castillo, G. Navarro, J. Borrell. Mechanisms for attack protection on a prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.137-140, ⟨10.1109/CCST.2005.1594872⟩. ⟨hal-03628695⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, J. Borrell, M.A. Jaeger, G. Muhl. An alert communication infrastructure for a decentralized attack prevention framework. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.234-237, ⟨10.1109/CCST.2005.1594878⟩. ⟨hal-03628691⟩
- Accès au bibtex
-
- ref_biblio
- G. Navarro, J.A. Ortega-Ruiz, Joaquin Garcia‐alfaro, S. Robles. Secure agent-based management for pervasive environments. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct 2005, Las Palmas, France. pp.133-136, ⟨10.1109/CCST.2005.1594864⟩. ⟨hal-03628681⟩
- Accès au bibtex
-
2004
- ref_biblio
- André-Luc Beylot, Riadh Dhaou, Vincent Gauthier, Monique Becker. Cross Layer Simulation and Optimization for Mobile ad-hoc Networks. IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), IFIP Technical Committee 6 : TC6 - Communications Systems, Oct 2004, Paris, France. pp.13-22, ⟨10.1007/0-387-23150-1_2⟩. ⟨hal-03924175⟩
- Accès au bibtex
-
Book sections
2020
- ref_biblio
- Christophe Kiennert, Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro. Security and privacy in the TeSLA architecture. Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩. ⟨hal-02393547⟩
- Accès au bibtex
-
2018
- ref_biblio
- Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : l’impact des labels sur la gestion des données personnelles. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
- Accès au bibtex
-
- ref_biblio
- Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-Télécom, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
- Accès au texte intégral et bibtex
-
2015
- ref_biblio
- Maryline Laurent, Julie Denouël, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
- Accès au bibtex
-
2013
- ref_biblio
- Gyu Myoung Lee, Noel Crespi, Jun Kyun Choi, Matthieu Boussard. Internet of Things. Evolution of Telecommunication Services, 7768, Springer-Verlag, pp.257 - 282, 2013, Lecture Notes in Computer Science, 978-3-642-41568-5. ⟨10.1007/978-3-642-41569-2_13⟩. ⟨hal-01335108⟩
- Accès au bibtex
-
- ref_biblio
- Antonio Manzalini, Roberto Minerva, Noel Crespi, Uddin Shah Muhammad Emad. Software networks at the edge. Evolution of cognitive networks and self-adaptive communication systems, IGI Global, pp.199 - 226, 2013, Advances in wireless technologies and telecommunication series, 978-1-4666-4189-1. ⟨10.4018/978-1-4666-4189-1.ch008⟩. ⟨hal-01335120⟩
- Accès au bibtex
-
2011
- ref_biblio
- Marc Roelands, Johan Plomb, Diego Casado Mansilla, Juan R. Velasco, Ismail Salhi, et al.. The DiY smart experiences project : a European endeavour removing barriers for user-generated Internet of Things applications. Architecting the internet of things, Springer-Verlag, pp.279 - 315, 2011, 978-3-642-19156-5. ⟨10.1007/978-3-642-19157-2_11⟩. ⟨hal-01335619⟩
- Accès au bibtex
-
2010
- ref_biblio
- Houssem Jarraya, Maryline Laurent. Sécurité des réseaux P2P. Evolution des technologies pair-à-pair : optimisation, sécurité et application, Hermès science; Lavoisier, pp.135 - 154, 2010, IC2 : Traité réseaux et télécoms, 978-2-7462-2579-4. ⟨hal-01355245⟩
- Accès au bibtex
-
2009
- ref_biblio
- Kimmo Ahola, Mikko Alutoin, Martin Bauer, Sandford Bessler, Marc Girod-Genet, et al.. PN platforms. My personal Adaptive Global NET (MAGNET), Springer, pp.337 - 408, 2009, Signals and Communication Technology, 978-90-481-3436-6. ⟨10.1007/978-90-481-3437-3_7⟩. ⟨hal-01359040⟩
- Accès au bibtex
-
- ref_biblio
- Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Tara Ali Yahiya. Introduction to wireless and mobile networks. Mobile and wireless network security, ISTE/Wiley, pp.3 - 46, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch1⟩. ⟨hal-00472917⟩
- Accès au bibtex
-
- ref_biblio
- Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
- Accès au bibtex
-
- ref_biblio
- José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. Considerations for RFID-based indoor simultaneous tracking. Wireless and Mobile Networking : Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, 308, Springer, pp.309 - 320, 2009, IFIP Advances in Information and Communication Technology, 978-3-642-03840-2. ⟨10.1007/978-3-642-03841-9_28⟩. ⟨hal-00472958⟩
- Accès au bibtex
-
- ref_biblio
- Apostolia Papapostolou, Hakima Chaouchi. WIFE : Wireless Indoor positioning based on Fingerprint Evaluation. Networking 2009 : 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009, 5550, Springer, pp.234 - 247, 2009, Lecture notes in computer science, 978-3-642-01398-0. ⟨10.1007/978-3-642-01399-7_19⟩. ⟨hal-00472945⟩
- Accès au bibtex
-
- ref_biblio
- Luis Sanchez, Jorge Lanza, Jeroen Hoebeke, Marc Girod-Genet, Martin Bauer, et al.. PN networking. My personal Adaptive Global NET (MAGNET), Springer, pp.75 - 134, 2009, Signals and Communication Technology, 978-90-481-3436-6. ⟨10.1007/978-90-481-3437-3_3⟩. ⟨hal-01359064⟩
- Accès au bibtex
-
- ref_biblio
- Ines Slama, Badii Jouaber, Djamal Zeghlache. Multiple mobile sinks deployment for energy efficiency in large scale wireless sensor networks. e-Business and Telecommunications, International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, 48, Springer, pp.412 - 427, 2009, Communications in Computer and Information Science, 978-3-642-05196-8. ⟨10.1007/978-3-642-05197-5_30⟩. ⟨hal-00441321⟩
- Accès au bibtex
-
2008
- ref_biblio
- Miguel Castro, Dominique Gaïti, Abdallah M'Hamed, Djamal Zeghlache. Adaptive and programmable management of IP quality of service. Autonomic networks, ISTE, pp.23-59, 2008, 9781848210028. ⟨10.1002/9780470610879.ch2⟩. ⟨hal-02272040⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi. Mobilité dans Wi-Fi0-IEEE 802.11 r. Réseaux sans fil émergents : standards IEEE, Hermès science publications; Lavoisier, pp.249 - 278, 2008, IC2 : information, commande, communication, Réseaux et télécoms, 978-2-7462-1889-5. ⟨hal-01342750⟩
- Accès au bibtex
-
- ref_biblio
- Providence Salumu Munga, Hakima Chaouchi. Technologie MIH-IEEE 802.21. Réseaux sans fil émergents : standards IEEE, Hermès science publications; Lavoisier, pp.413 - 455, 2008, IC2 : information, commande, communication, Réseaux et télécoms, 978-2-7462-1889-5. ⟨hal-01342748⟩
- Accès au bibtex
-
2007
- ref_biblio
- Chakib Bekara, Maryline Laurent. Gestion de clés dans les réseaux de capteurs. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328150⟩
- Accès au bibtex
-
- ref_biblio
- Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Sécurité des réseaux mobiles IP. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328154⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, F. Cuppens, N. Cuppens-Boulahia. Management of Exceptions on Access Control Policies. New Approaches for Security, Privacy and Trust in Complex Environments, 232, Springer US, pp.97-108, 2007, IFIP International Federation for Information Processing, ⟨10.1007/978-0-387-72367-9_9⟩. ⟨hal-03628745⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Hakima Chaouchi, Olivier Paul. Mécanismes de sécurité fondamentaux. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1697-6. ⟨hal-01328102⟩
- Accès au bibtex
-
- ref_biblio
- José-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Sécurité dans les réseaux de capteurs sans fil. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01328149⟩
- Accès au bibtex
-
2006
- ref_biblio
- Joaquin Garcia‐alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Computer Safety, Reliability, and Security, 4166, Springer Berlin Heidelberg, pp.182-194, 2006, Lecture Notes in Computer Science, ⟨10.1007/11875567_14⟩. ⟨hal-03628725⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. Protection of Components Based on a Smart-Card Enhanced Security Module. Critical Information Infrastructures Security, 4347, Springer Berlin Heidelberg, pp.128-139, 2006, Lecture Notes in Computer Science, ⟨10.1007/11962977_11⟩. ⟨hal-03628730⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security Components. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 4277, Springer Berlin Heidelberg, pp.415-424, 2006, Lecture Notes in Computer Science, ⟨10.1007/11915034_65⟩. ⟨hal-03628734⟩
- Accès au bibtex
-
2005
- ref_biblio
- Joaquin Garcia‐alfaro, Michael Jaeger, Gero Mühl, Joan Borrell. Decoupling Components of an Attack Prevention System Using Publish/Subscribe. Intelligence in Communication Systems, Springer-Verlag, pp.87-97, 2005, ⟨10.1007/0-387-32015-6_9⟩. ⟨hal-03628700⟩
- Accès au bibtex
-
- ref_biblio
- G. Navarro, J. Peñalver, J.A. Ortega-Ruiz, J. Ametller, Joaquin Garcia‐alfaro, et al.. Amapola: a simple infrastructure for ubiquitous computing. Roch Glitho; Ahmed Karmouch; Samuel Pierre. Intelligence in Communication Systems, 190, Springer-Verlag, pp.77-86, 2005, IFIP — The International Federation for Information Processing book series (IFIPAICT), ⟨10.1007/0-387-32015-6_8⟩. ⟨hal-03628697⟩
- Accès au bibtex
-
2004
- ref_biblio
- Joaquin Garcia‐alfaro, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, et al.. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. Information and Communications Security, 3269, Springer Berlin Heidelberg, pp.223-235, 2004, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-30191-2_18⟩. ⟨hal-03628684⟩
- Accès au bibtex
-
Habilitation à diriger des recherches
2013
- ref_biblio
- Joaquin Garcia‐alfaro. Contributions to the security of EPC/RFID wireless technologies. Cryptography and Security [cs.CR]. Université Pierre et Marie Curie, Paris VI; Télécom SudParis (Institut Mines-Télécom), 2013. ⟨tel-03646853⟩
- Accès au texte intégral et bibtex
-
Special issue
2020
- ref_biblio
- Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro. Foundations and practice of security: 12th international symposium, FPS 2019, Toulouse, France, November 5–7, 2019, revised selected papers. Benzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin. FPS 2019: 12th International Symposium on Foundations and Practice of Security, Nov 2019, Toulouse, France. Lecture Notes in Computer Science, 12056, Springer, 408 p., 2020, Lecture Notes in Computer Science book series (LNCS), 978-3-030-45370-1. ⟨10.1007/978-3-030-45371-8⟩. ⟨hal-03001571⟩
- Accès au bibtex
-
2018
- ref_biblio
- Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro. Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers. FPS 2017 - 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. Lecture Notes in Computer Science, 10723, Springer, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. ⟨10.1007/978-3-319-75650-9⟩. ⟨hal-01869014⟩
- Accès au bibtex
-
Other publications
2019
- ref_biblio
- Marc Girod-Genet. Standard to facilitate Smart Body Area Networks. 2019, pp.12. ⟨hal-02277000⟩
- Accès au bibtex
-
- ref_biblio
- Marc Girod-Genet. Standardizing Smart Body Area Networks. 2019. ⟨hal-02277398⟩
- Accès au bibtex
-
2009
- ref_biblio
- Joaquin Garcia‐alfaro, Michel Barbeau, Evangelos Kranakis. Les composants RFID, sont-ils vulnerables ?. 2009. ⟨hal-03628767⟩
- Accès au bibtex
-
Books
2022
- ref_biblio
- Joaquin Garcia‐alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2021 international workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, revised selected papers. Springer, 13140, pp.xiii-342, 2022, Lecture Notes in Computer Science (LNCS), 978-3-030-93943-4. ⟨10.1007/978-3-030-93944-1⟩. ⟨hal-03628440⟩
- Accès au bibtex
-
2021
- ref_biblio
- Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, José Francisco Ruiz, et al.. Cybersecurity research analysis report for Europe and Japan: cybersecurity and privacy dialogue between Europe and Japan. Springer, 75, pp.172, 2021, Studies in Big Data, 978-3-030-62311-1. ⟨10.1007/978-3-030-62312-8⟩. ⟨hal-03124036⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part I. Springer, 398, pp.xvii-539, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90018-2. ⟨10.1007/978-3-030-90019-9⟩. ⟨hal-03628450⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (Dir.). Security and privacy in communication networks: 17th EAI international conference, SecureComm 2021, virtual event, September 6–9, 2021, proceedings, part II. Springer, 399, pp.xvii-527, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 978-3-030-90021-2. ⟨10.1007/978-3-030-90022-9⟩. ⟨hal-03628451⟩
- Accès au bibtex
-
2020
- ref_biblio
- Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
- Accès au texte intégral et bibtex
-
2019
- ref_biblio
- Hamza Baqa, Martin Bauer, Sonia Bilbao, Aitor Corchero, Laura Daniele, et al.. Semantic IoT Solutions -A Developer Perspective: Semantic Interoperability White Paper. 51p, 2019, ⟨10.13140/RG.2.2.16339.53286⟩. ⟨emse-02345694⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamza Baqa, Martin Bauer, Sonia Bilbao, Aitor Corchero, Laura Daniele, et al.. Towards semantic interoperability standards based on ontologies: Semantic Interoperability White Paper. 26 p., 2019, ⟨10.13140/RG.2.2.26825.29282⟩. ⟨emse-02352822⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hamid Brahim, Gallina Barbara, Shabtai Asaf, Elovici Yuval, Joaquin Garcia-Alfaro (Dir.). Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papers. Springer, pp.173, 2019, Security and Cryptology, LNCS, vol. 11552, Security and Cryptology, LNCS, vol. 11552, 978-3-030-16873-5. ⟨hal-02086531⟩
- Accès au bibtex
-
2018
- ref_biblio
- Nora Cuppens-Bouhlahia, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro (Dir.). Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers. Springer, 10694, pp.269, 2018, Lecture Notes in Computer Science, Lecture Notes in Computer Science (vol. 10694), 978-3-319-76686-7. ⟨hal-01865019⟩
- Accès au bibtex
-
- ref_biblio
- Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens-Bouhlahia, Frédéric Cuppens, et al. (Dir.). Interoperability, Safety and Security in IoT: Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Springer, pp.165, 2018, LNICST, volume 242, LNICST, volume 242, ISSN 1867-8211. ⟨hal-01993862⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios (Dir.). Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, proceedings. Springer, pp.442, 2018, Lecture Notes in Computer Science book series (LNCS, volume 11025), Lecture Notes in Computer Science book series (LNCS, volume 11025), 978-3-030-00304-3. ⟨hal-02014097⟩
- Accès au bibtex
-
- ref_biblio
- Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc (Dir.). Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2018, Saclay, France, June 28-29, 2018, proceedings. Springer, pp.405, 2018, Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), Lecture Notes in Computer Science (vol. 10885); Security and Cryptology (vol. 10885), 978-3-319-93410-5. ⟨hal-01864973⟩
- Accès au bibtex
-
- ref_biblio
- Ali Miri, Xiaodai Dong, Masoud Ardakani, Joaquin Garcia-Alfaro (Dir.). 29th biennial symposium on communications : Toronto, Ontario, Canada, June 6-7, 2018. IEEE Computer Society, pp.128, 2018, Biennial Symposium on Communications proceedings, Biennial Symposium on Communications proceedings, 978-1-5386-5735-5. ⟨hal-02014409⟩
- Accès au bibtex
-
- ref_biblio
- David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, et al. (Dir.). Information and communications security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Springer, pp.818, 2018, Lecture Notes in Computer Science, Security and Cryptology, 11149, Lecture Notes in Computer Science, Security and Cryptology, 11149, 978-3-030-01949-5. ⟨hal-01987497⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Selma Boumerdassi, Samia Bouzefrane (Dir.). Mobile, secure, and programmable networking: 4th international conference, MSPN 2018, Paris, France, June 18-20, 2018, revised selected papers. Springer, pp.340, 2018, Lecture Notes in Computer Science, volume 11005, Lecture Notes in Computer Science, volume 11005, 978-3-030-03100-8. ⟨10.1007/978-3-030-03101-5⟩. ⟨hal-01997524⟩
- Accès au bibtex
-
- ref_biblio
- Leye Wang, Vincent Gauthier, Guanling Chen, Luis moreira‑matias (Dir.). Special issue on extracting crowd intelligence from pervasive and social big data. Springer, 9, n°2, pp.411, 2018. ⟨hal-01823619⟩
- Accès au bibtex
-
2017
- ref_biblio
- Samia Bouzefrane, Soumya Banerjee, Françoise Sailhan, Selma Boumerdassi, Eric Renault (Dir.). Mobile, secure, and programmable networking : third international conference, MSPN 2017, Paris, France, June 29-30, 2017, revised selected papers. Springer, pp.237, 2017, Lecture Notes in Computer Science, volume 10566, Lecture Notes in Computer Science, volume 10566, 978-3-319-67806-1. ⟨10.1007/978-3-319-67807-8⟩. ⟨hal-01997506⟩
- Accès au bibtex
-
- ref_biblio
- Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Bouhlahia, Nadia Tawbi, Joaquin Garcia-Alfaro (Dir.). Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Springer, 10128, pp.361, 2017, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-51965-4. ⟨hal-01449657⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomarti (Dir.). Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Springer, 10436, pp.446, 2017, Lecture Notes in Computer Science, 978-3-319-67815-3. ⟨10.1007/978-3-319-67816-0⟩. ⟨hal-01740241⟩
- Accès au bibtex
-
- ref_biblio
- Anis Laouiti, Amir Qayyum, Mohamad Naufal Mohamad Saad (Dir.). Vehicular Ad-hoc Networks for smart cities : second international workshop, 2016. Springer, 548, pp.97, 2017, Advances in Intelligent Systems and Computing, Advances in Intelligent Systems and Computing, 978-981-10-3502-9. ⟨hal-01496657⟩
- Accès au bibtex
-
- ref_biblio
- Roberto Minerva, Noel Crespi. Networks and new services : a complete story. Springer international publishing, pp.186, 2017, Internet of things, Internet of things, 978-3-319-33993-1. ⟨hal-01464422⟩
- Accès au bibtex
-
- ref_biblio
- Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, et al. (Dir.). Interoperability, safety and security in IoT : second international conference, InterIoT 2016 and third international conference, SaSeIoT 2016. Springer, 190, pp.139, 2017, LNICST, LNICST, 978-3-319-52726-0. ⟨hal-01647101⟩
- Accès au bibtex
-
- ref_biblio
- Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent (Dir.). Security, and privacy in emerging wireless networks : security and communication networks journal. Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal. ⟨hal-01682207⟩
- Accès au bibtex
-
2016
- ref_biblio
- Selma Boumerdassi, Eric Renault, Samia Bouzefrane (Dir.). Mobile, secure, and programmable networking : second international conference, MSPN 2016, Paris, France, June 1-3, 2016, revised selected papers. Springer, 10026, pp.225, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-50462-9. ⟨10.1007/978-3-319-50463-6⟩. ⟨hal-01452777⟩
- Accès au bibtex
-
- ref_biblio
- Didier El Baz, Julien Bourgeois, Bruno Defude, Zhangbing Zhou, Guangjie Han, et al. (Dir.). ATC 2016 : 13th Annual International Conference on Advanced and Trusted Computing. IEEE Computer Society, pp.1242, 2016, 978-1-5090-2770-5. ⟨hal-01449669⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (Dir.). Foundations and practice of security : 8th international symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers. Springer International Publishing, 9482, pp.323, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-30302-4. ⟨hal-01333422⟩
- Accès au bibtex
-
- ref_biblio
- Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Dir.). Data privacy management, and security assurance : 10th international workshop, DPM 2015, and 4th international workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers. Springer International Publishing, 9481, pp.291, 2016, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-29882-5. ⟨hal-01333425⟩
- Accès au bibtex
-
- ref_biblio
- Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Caganova, Hakima Chaouchi, et al. (Dir.). Internet of Things: IoT Infrastructures: Second international summit, IoT 360°. Springer, 169-170, pp.547, 2016, LNICST, LNICST, 978-3-319-47062-7. ⟨hal-01646503⟩
- Accès au bibtex
-
- ref_biblio
- Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro (Dir.). Research in attacks, intrusions, and defenses : 19th international symposium, RAID 2016, Paris, France, September 19-21, 2016, proceedings. Springer, 9854, pp.482, 2016, Lecture notes in computer science, Lecture notes in computer science, 978-3-319-45718-5. ⟨hal-01450264⟩
- Accès au bibtex
-
2015
- ref_biblio
- Selma Boumerdassi, Samia Bouzefrane, Eric Renault (Dir.). Mobile, secure, and programmable networking : first international conference, MSPN 2015, Paris, France, June 15-17, 2015, selected papers. Springer international publishing, 9395, pp.175, 2015, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-25743-3. ⟨hal-01269566⟩
- Accès au bibtex
-
- ref_biblio
- Ali Ghorbani, Vicenç Torra, Huseyin Hisil, Ali Miri, Ahmet Koltuksuz, et al. (Dir.). 2015 Thirteenth annual conference on privacy, security and trust. IEEE, pp.200, 2015, 978-1-4673-7828-4. ⟨hal-01332268⟩
- Accès au bibtex
-
2014
- ref_biblio
- Joaquin Garcia-Alfaro, Gürkan Gür (Dir.). Proceedings 2014 : International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science, 165, pp.58, 2014. ⟨hal-01740931⟩
- Accès au bibtex
-
2013
- ref_biblio
- Emmanuel Bertin, Noel Crespi, Thomas Magedanz (Dir.). Evolution of telecommunication services : the convergence of telecom and internet: technologies and ecosystems. Springer-Verlag, 7768, pp.325, 2013, Information Systems and Applications, incl. Internet/Web, and HCI, Information Systems and Applications, incl. Internet/Web, and HCI, 978-3-642-41568-5. ⟨hal-01281478⟩
- Accès au bibtex
-
2010
- ref_biblio
- Moshe Timothy Masonta, Olufemi James Oyedapo, Marc Girod-Genet. A light-weight Internet protocol multimedia subsystem (IMS) client : development for smart mobile devices. LAP LAMBERT Academic Publishing, pp.108, 2010, 978-3-8433-7301-2. ⟨hal-01354824⟩
- Accès au bibtex
-
2009
- ref_biblio
- Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. ⟨hal-01370512⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. ⟨hal-01370514⟩
- Accès au bibtex
-
2008
- ref_biblio
- Hakima Chaouchi, Guy Pujolle. Réseaux sans fil émergents : standards IEEE. Hermès science publications; Lavoisier, pp.466, 2008, Traité IC2, série réseaux et télécommunications, Traité IC2, série réseaux et télécommunications, 978-2-7462-1889-5. ⟨hal-01342759⟩
- Accès au bibtex
-
- ref_biblio
- Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
- Accès au bibtex
-
2007
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 3, Technologies émergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1699-0. ⟨hal-01329422⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 2, Technologies du marché. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. Réseaux et télécoms, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1698-3. ⟨hal-01328157⟩
- Accès au bibtex
-
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, Série Réseaux et Télécoms IC2, Série Réseaux et Télécoms 978-2-7462-1697-6. ⟨hal-01328159⟩
- Accès au bibtex
-
Patents
2017
- ref_biblio
- Vincent Gauthier, Fereshteh Asgari, Mounim El Yacoubi, Alexis Sultan. Procédé d'estimation de trajectoires utilisant des données mobiles. France, N° de brevet: FR3046006. 16609. 2017, pp.34. ⟨hal-01582154⟩
- Accès au bibtex
-
2013
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. Procédé pour crypter des données dans un cryptosystème NTRU (N,p,q). France, N° de brevet: FR2992510. 12959. 2013, pp.27. ⟨hal-01275262⟩
- Accès au bibtex
-
2012
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. Procédé d'authentification d'un tag. France, N° de brevet: FR2971905. 12982. 2012, pp.24. ⟨hal-01343576⟩
- Accès au bibtex
-
- ref_biblio
- Zhenzhen Zhao, Noel Crespi. Systems and methods for service provision based on events. United States, Patent n° : US20120102408. 13455. 2012, pp.19. ⟨hal-01336032⟩
- Accès au bibtex
-
2010
- ref_biblio
- Abdelwaheb Marzouki, Djamal Zeghlache. Orientation and localization system. France, Patent n° : WO/2010/122370. 9966. 2010, pp.38. ⟨hal-01343574⟩
- Accès au bibtex
-
- ref_biblio
- Abdelwaheb Marzouki, Djamal Zeghlache. Communication system comprising a plurality of nodes having a location and an orientation to be determined. France, Patent n° : WO/2010/092418. 9964. 2010, pp.35. ⟨hal-01343146⟩
- Accès au bibtex
-
2009
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Procédé d'échange de données dans un réseau ad hoc. France, N° de brevet: FR2919137. 7091. 2009, pp.50. ⟨hal-01354850⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi, Bassam El Saghir. Architecture informatique hiérarchisée à couches multiples. France, N° de brevet: FR2929474. 13447. 2009, pp.27. ⟨hal-01336020⟩
- Accès au bibtex
-
- ref_biblio
- Houssem Jarraya, Maryline Laurent. Procédé de sauvegarde/restauration de fichiers dans un réseau pair à pair. France, N° de brevet: FR2929792. 5331. 2009, pp.36. ⟨hal-01343149⟩
- Accès au bibtex
-
2008
- ref_biblio
- Noel Crespi, Bassam El Saghir, Mehdi Mani. Mécanismes SIP pour l'indication des capacités des terminaux. France, N° de brevet: FR2909245. 13448. 2008, pp.29. ⟨hal-01336056⟩
- Accès au bibtex
-
- ref_biblio
- Wajdi Louati, Djamal Zeghlache. Autonomic network node system. France, Patent n° : WO/2008/093174. 13006. 2008, pp.62. ⟨hal-01343575⟩
- Accès au bibtex
-
Poster communications
2017
- ref_biblio
- Marouen Mechtri, Chaima Ghribi, Oussama Soualah, Djamal Zeghlache. ETSO : End-To-end SFC Orchestration framework. IM 2017 : IFIP/IEEE Symposium on Integrated Network and Service Management, May 2017, Lisbon, Portugal. IEEE Computer Society, pp.903 - 904, 2017, ⟨10.23919/INM.2017.7987405⟩. ⟨hal-01630098⟩
- Accès au bibtex
-
2015
- ref_biblio
- Samir El-Haddad, Marc Girod-Genet, Bachar El-Hassan, Lina Nachabe Ismail. Clustering energy based routing protocol for Wireless Sensor Networks. BLACKSEACOM 2015 : 3rd International Black Sea Conference on Communications and Networking, May 2015, Constanta, Romania. 2015. ⟨hal-01358334⟩
- Accès au bibtex
-
2013
- ref_biblio
- Yannick Le Louedec, Angel Cuevas Rumin, Danny de Vleeschlauwer, Joerg Widmer, Noel Crespi, et al.. eCOUSIN : enhanced COntent distribUtion with Social INformation. Future Network & Mobile Summit 2013, Jul 2013, Lisbon, Portugal. 2013. ⟨hal-01369474⟩
- Accès au bibtex
-
- ref_biblio
- Aurelien Wailly, Marc Lacoste, Hervé Debar. RetroVisor : nested virtualization for multi IaaS VM availability. ComPAS 2013 : Conférence en Parallélisme, Architecture et Système, Jan 2013, Grenoble, France. 2013. ⟨hal-01287046⟩
- Accès au bibtex
-
2011
- ref_biblio
- Sonia Elwardi-Ben Amor, Badr-Eddine Benkelfat, Mourad Zghal. Multiplex coding for real-time optical image processing. SPIE 2011 : Optical Design and Engineering IV, Sep 2011, Marseille, France. SPIE, 8167, 2011, ⟨10.1117/12.899570⟩. ⟨hal-01302374⟩
- Accès au bibtex
-
Proceedings
2022
- ref_biblio
- Hakim Hacid, Monther Aldwairi, Mohamed Reda Bouadjenek, Marinella Petrocchi, Noura Faci, et al.. Service-oriented computing – ICSOC 2021 Workshops. 13236, Springer International Publishing, pp.XIV, 378, 2022, Lecture Notes in Computer Science, 978-3-031-14134-8. ⟨10.1007/978-3-031-14135-5⟩. ⟨hal-04063064⟩
- Accès au bibtex
-
- ref_biblio
- Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, et al.. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. pp.1-16, 2022. ⟨hal-03775466⟩
- Accès au texte intégral et bibtex
-
2021
- ref_biblio
- Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28–29, 2020, revised selected papers. MSPN 2020: International Conference on Mobile, Secure, and Programmable Networking, Oct 2021, Paris, France. 12605, Springer, pp.X, 251, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-67549-3. ⟨10.1007/978-3-030-67550-9⟩. ⟨hal-03494288⟩
- Accès au bibtex
-
- ref_biblio
- Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, et al.. Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense). pp.1-152, 2021. ⟨hal-03535661⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Joaquin Garcia‐alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich. Risks and security of internet and systems: 15th international conference, CRiSIS 2020, Paris, France, November 4–6, 2020, revised selected papers. CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩. ⟨hal-03628457⟩
- Accès au bibtex
-
2020
- ref_biblio
- Apostolos Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, et al.. Computer security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, revised selected papers. ESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11981, Springer, pp.279, 2020, Lecture Notes in Computer Science(LNCS), 978-3-030-42050-5. ⟨10.1007/978-3-030-42051-2⟩. ⟨hal-03125783⟩
- Accès au bibtex
-
- ref_biblio
- Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, et al.. Computer security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 revised selected papers. ESORICS 2019: European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. 11980, Springer, pp.440, 2020, Lecture Notes in Computer Science (LNCS), 978-3-030-42047-5. ⟨10.1007/978-3-030-42048-2⟩. ⟨hal-03125793⟩
- Accès au bibtex
-
- ref_biblio
- Anis Laouiti, Amir Qayyum, M.Naufalb.M. Saad. Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop, 2019. IWVSC 2019: 3rd International Workshop on Vehicular Ad-hoc Networks for Smart Cities, Nov 2019, Paris, France. 1144, Springer, 120 p., 2020, Advances in Intelligent Systems and Computing. ⟨hal-02454413⟩
- Accès au bibtex
-
2019
- ref_biblio
- Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia Alfaro. Data privacy management, cryptocurrencies and blockchain technology. ESORICS 2019, DPM 2019 and CBT 2019 : Data Privacy Management, Cryptocurrencies and Blockchain Technology, Sep 2019, Luxembourg, Luxembourg. 11737, Springer, 400 p., 2019, Lecture Notes in Computer Science book series: Security and Cryptology book sub series, 978-3-030-31499-6. ⟨10.1007/978-3-030-31500-9⟩. ⟨hal-02390284⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Selma Boumerdassi, Leghris Cherkaoui, Samia Bouzefrane. Mobile, Secure, and Programmable Networking: 5th international conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, revised selected papers. MSPN 2019: International Conference on Mobile, Secure, and Programmable Networking, Apr 2019, Mohammedia, Morocco. 11557, Springer, 277 p., 2019, Lecture Notes in Computer Science (LNCS), 978-3-030-22884-2. ⟨10.1007/978-3-030-22885-9⟩. ⟨hal-02445391⟩
- Accès au bibtex
-
- ref_biblio
- Eric Renault, Paul Mühlethaler, Selma Boumerdassi. Machine Learning for Networking: first international conference, MLN 2018, Paris, France, November 27-29, 2018, revised selected papers. MLN 2018: 1st international conference on Machine Learning for Networking, Nov 2018, Paris, France. 11407, Springer, 388 p., 2019, Lecture Notes in Computer Science (LNCS), 978-3-030-19944-9. ⟨10.1007/978-3-030-19945-6⟩. ⟨hal-02445117⟩
- Accès au bibtex
-
2018
- ref_biblio
- Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, et al.. Interoperability, Safety and Security in IoT: Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Nov 2017, Valence, Spain. Springer, XIV-165 p., 2018, 978-3-319-93797-7. ⟨10.1007/978-3-319-93797-7⟩. ⟨hal-02145072⟩
- Accès au bibtex
-
Reports
2020
- ref_biblio
- Marc Girod-Genet, Lina Nachabe Ismail, Maxime Lefrançois, João Moreira, Mauro Dragoni. SmartM2M; Extension to SAREF; Part 8: eHealth/Ageing-well Domain. [Research Report] ETSI TS 103 410-8 V1.1.1, ETSI SmartM2M. 2020, pp.38. ⟨hal-02937318⟩
- Accès au bibtex
-
2019
- ref_biblio
- Marc Girod-Genet, Haissam Kharboutly, Lina Nachabe Ismail, Bachar El Hassan. Smart Body Area Networks (SmartBAN) : service and application standardized enablers and interfaces, APIs and infrastructure for interoperability management. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); American University of Culture & Education (.); Faculté de Génie / Faculty of Engineering (Université Libanaise / Lebanese University (UL)). 2019, pp.56. ⟨hal-02277563⟩
- Accès au bibtex
-
- ref_biblio
- Jordi Herrera-Joancomarti, Guillermo Navarro-Arribas, Alejandro Ranchal Pedrosa, Perez-Sola Cristina, Joaquin Garcia-Alfaro. On the difficulty of hiding the balance of lightning network channels. [Research Report] Dépt. Réseaux et Service de Télécom (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Department of Information and Communications Engineering (Autonomous University of Barcelona). 2019, pp.13. ⟨hal-02086536⟩
- Accès au texte intégral et bibtex
-
2017
- ref_biblio
- Omar Elloumi, Jean-Pierre Desbenoit, Patrick Wetterwald, Georgios Karagiannis, Juergen Heiles, et al.. High Level Architecture (HLA) : release 3.0 : AIOTI WG03 - loT Standardisation. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Eurecat - Centro tecnológico de Cataluña (La Généralité de Catalogne = La Generalitat de Catalunya); Gemalto [Meudon] (.); Nokia Bell Labs [Paris Saclay] (Nokia); Schneider Electric (.); Cisco systems [France] (Cisco); Huawei Technologies [Dusseldorf] (Huawei ); Siemens AG [Munich] (.); Landis+Gyr (Toshiba); NEC Europe Ltd.[Middlesex] (NEC); Stiftelsen for INdustriell og TEknisk Forskning [Trondheim] (.); Insight Centre for Data Analytics [Galway] (National University of Ireland Galway (NUIG)); Telefonica Investigación y Desarrollo (Telefónica Group); Arthur’s Legal B.V. (.); Easy Global Market [Sophia-Antipolis] (.); IBM Germany (IBM); Tecnalia research and Innovation [Zamudio] (Tecnalia Corporación Tecnológica); European Software Institute (Tecnalia Corporación Tecnológica); Commledge (.). 2017, pp.40. ⟨hal-01592086⟩
- Accès au bibtex
-
2016
- ref_biblio
- Antonio Manzalini, Cagatay Buyukkoc, Prosper Chemouil, Slawomir Kuklinski, Franco Callegati, et al.. Towards 5G software-defined ecosystems. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); University College of London [London] (.); Hewlett Packard Enterprise (Hewlett Packard); China Mobile Research Institute (China Mobile); Intel UK (Intel); Department of electrical, electronic and information engineering "GUGLIELMO MARCONI" (Università di Bologna [Bologna]); Future Centre (Telecom Italia); pdvWireless (.); Telemates UK (Telemates); Orange Labs; AT&T Labs Research (AT&T). 2016, pp.16. ⟨hal-01419600⟩
- Accès au bibtex
-
- ref_biblio
- Paul Murdock, Louay Bassbouss, Martin Bauer, Mahdi Ben Alaya, Rajdeep Bhowmik, et al.. Semantic interoperability for the Web of Things. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); TNO [Netherlands] (.); National Institute of Standards and Technology [Gaithersburg] (Agency of the U.S. Department of Commerce); British Telecom Research & Technology (British Telecom); Intel corporation [USA] (Intel corporation); Krypton Brothers (.); EURECOM [Sophia Antipolis] (Institut Mines-Télécom); Fraunhofer-Institut für Offene Kommunikationssysteme (FOKUS Fraunhofer); LG Group (.); Rockwell automation (.); Huawei Technologies [Nanjing] (Huawei Technologies Co. Ltd.); Ericsson Research (Ericsson ); Insight Centre for Data Analytics [Galway] (National University of Ireland Galway (NUIG)); Network Research Division, NEC Laboratories Europe (NEC Europe Ltd.); Sensinov (.); Huawei Technologies [San Francisco] (Huawei Technologies Co. Ltd.); Department of Computer Science [Binghamton] (Binghamton University); Honeywell Process Solutions (Honeywell International Inc.); Senslytics (Senslytics Corporation); Telecom Orange (.); Laboratoire d'analyse et d'architecture des systèmes (CNRS (UPR8001)-Université Toulouse 3-INPT-Institut National des Sciences Appliquées de Toulouse); OpenDOF (Panasonic); Deutsche Telekom Laboratories (Deutsche Telekom); Schneider Electric (.); Nokia Bell Labs [Paris Saclay] (Nokia); Institut de Recherche en Informatique de Toulouse (CNRS : UMR5505; INPT de Toulouse; Universités de Toulouse I, II et III); FESTO (.); Landis+Gyr (Toshiba); IoTecha (.); Comcast (.); Orange Labs [Issy les Moulineaux] (France Télécom); InterDigital Communications (.); World Wide Web Consortium (.). 2016, pp.18. ⟨hal-01362033⟩
- Accès au bibtex
-
2014
- ref_biblio
- Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi. Discussion on energy efficient protocols. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2014. ⟨hal-01334216⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi, Byung-Hun Song, Junho Shin, et al.. Proposal for design principles on scalability in TS-0004. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Korea Electronics Technology Institute (.). 2014. ⟨hal-01334693⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Noel Crespi, Eric Farnier. Proposal for design principles on extensibility. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Ecometering (GDF-Suez). 2014. ⟨hal-01334679⟩
- Accès au bibtex
-
- ref_biblio
- Antonio M. Ortiz, Gyu Myoung Lee, Noel Crespi. Proposal for design principles and requirements on energy efficient protocols. [Rapport de recherche] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2014. ⟨hal-01334204⟩
- Accès au bibtex
-
2012
- ref_biblio
- Gyu Myoung Lee, Noel Crespi. Emerging cloud-based internet of things. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2012, pp.23. ⟨hal-00861826⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 04. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences). 2012, pp.18. ⟨hal-00849850⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi, Ilyoung Chong. The internet of things : concept and problem statement : 05. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Hankuk University of Foreign Studies (Hankuk University of Foreign Studies). 2012, pp.19. ⟨hal-00849881⟩
- Accès au bibtex
-
2011
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.34. ⟨hal-00665099⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Updated text of Draft Recommendation Y.energy-hn. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011. ⟨hal-01334192⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 03. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences). 2011, pp.20. ⟨hal-00849851⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 01. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.21. ⟨hal-00634616⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN (2). [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.30. ⟨hal-00665290⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 02. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.21. ⟨hal-00634610⟩
- Accès au bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jun Kyun Choi, Jeong Yun Kim, Noel Crespi. Revised draft recommendation Y.NGN-web : functional requirements and architecture of web service component in NGN (3). [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Department of Electrical Engineering [Korea Advanced Institute of Science and Technology] (College of Information Science & Technology, Korea Advanced Institute of Science and Technology); Electronics and Telecommunications Research Institute (.); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2011, pp.29. ⟨hal-00665292⟩
- Accès au bibtex
-
2010
- ref_biblio
- Chakib Bekara, Maryline Laurent, Wassim Drira, Rahim Kacimi, André-Luc Beylot, et al.. Tests, Mesures et Validation. [Contrat] Institut National Polytechnique de Toulouse. 2010. ⟨hal-03970390⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. IMS services interaction. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.12. ⟨hal-01346458⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Gyu Myoung Lee, Jungsoo Park, Ning Kong, Noel Crespi. The internet of things : concept and problem statement : 00. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Electronics and Telecommunications Research Institute (.); China Internet Network Information Center (Chinese Academy of Sciences); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.17. ⟨hal-00634613⟩
- Accès au bibtex
-
- ref_biblio
- Mohamed-Haykel Zayani, Vincent Gauthier, Djamal Zeghlache. Quantifying spatiotemporal stability by means of entropy : approach and motivations. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2010, pp.10. ⟨hal-01356335⟩
- Accès au texte intégral et bibtex
-
2009
- ref_biblio
- Nahla Abid, Maryline Laurent. A new authentication method based on cryptographic identifiers CGAs. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.29. ⟨hal-01360031⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Monique Becker, Chakib Bekara, André-Luc Beylot, Alexandre Delye, Riadh Dhaou, et al.. Cold chain monitoring using wireless sensor networks : design & experimental feedback. [Research Report] RR-09007–RST, Télécom Sud Paris. 2009. ⟨hal-03975329⟩
- Accès au bibtex
-
- ref_biblio
- Wassim Drira, Chakib Bekara, Maryline Laurent. Secure aggregation in wireless sensor networks. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.58. ⟨hal-01360043⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sondes Larafa, Maryline Laurent. Distributed AAA framework for MANET: performance analysis. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.34. ⟨hal-01360029⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Amina Mekki Mokhtar, Kheira Bekara, Maryline Laurent. Un protocole pour la négociation des politiques de privacy. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2009, pp.55. ⟨hal-01369889⟩
- Accès au texte intégral et bibtex
-
2008
- ref_biblio
- Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental experience with Host Identity Protocol (HIP). [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.58. ⟨hal-01373423⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aymen Boudguiga, Tony Cheneau, Maryline Laurent. Usage and performance of cryptographically generated addresses. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.94. ⟨hal-01373433⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Noel Crespi. Revision of Section 4.2. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335939⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Revision in Section 4.1. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335943⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Conclusion derived from Sections 4.2.1 and 4.2.2 for clarification of scope for release 8. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.6. ⟨hal-01335909⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Clean-up & conclusion of sections 5.1.2-5.1.4. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.8. ⟨hal-01335900⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. ICS termination with UE assisted T-ADS in case of no simultaneous PS and CS support. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.4. ⟨hal-01335888⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Use case to illustrate functions of release 8 ISB. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.3. ⟨hal-01335931⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. 2. References. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.1. ⟨hal-01335908⟩
- Accès au bibtex
-
- ref_biblio
- Noel Crespi. Inclusion of ISC enhancements to support SB for service class based SB. [Research Report] Dépt. Réseaux et Service Multimédia Mobiles (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.2. ⟨hal-01335935⟩
- Accès au bibtex
-
- ref_biblio
- Wassim Drira, Chakib Bekara, Maryline Laurent. Sécurité dans les réseaux de capteurs sans fil : conception et implémentation. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55. ⟨hal-01373430⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Houssem Jarraya, Maryline Laurent. Un système de sauvegarde P2P sécurisé s'appuyant sur une architecture AAA. [Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55. ⟨hal-01373441⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Willy Ronald Jimenez Freitez, Hakima Chaouchi, Maryline Laurent. Authentication services in mobile ad hoc networks. [Research Report] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.41. ⟨hal-01373823⟩
- Accès au texte intégral et bibtex
-
Theses
2022
- ref_biblio
- Faraz Malik Awan. Towards synthetic sensing for smart cities : a machine/deep learning-based approach. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS006⟩. ⟨tel-03722891⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aicha Dridi. A novel efficient time series deep learning approach using classification, prediction and reinforcement : energy and telecom use case. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS010⟩. ⟨tel-03957284⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- van Quan Pham. Cloud-native optical network automation platforms. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS005⟩. ⟨tel-03702081⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Sara Rabhi. Optimized deep learning-based multimodal method for irregular medical timestamped data. Neural and Evolutionary Computing [cs.NE]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS003⟩. ⟨tel-03600526⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Koosha Zarei. Fake identity & fake activity detection in online social networks based on transfer learning. Computation and Language [cs.CL]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAS008⟩. ⟨tel-03936643⟩
- Accès au texte intégral et bibtex
-
2021
- ref_biblio
- Antoine Bernard. Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutions. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS012⟩. ⟨tel-03517087⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Hicham Hossayni. Enabling industrial maintenance knowledge sharing by using knowledge graphs. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS017⟩. ⟨tel-03545734⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Franklin Leukam Lako. Protection des données à caractère personnel pour les services énergétiques. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS004⟩. ⟨tel-03249688⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Paul Marillonnet. User centric personal data management. Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS011⟩. ⟨tel-03523081⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Marzieh Mozafari. Hate speech and offensive language detection using transfer learning approaches. Document and Text Processing. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS007⟩. ⟨tel-03276023⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Nahit Pawar. Conception d'une architecture complète pour l'interopérabilité des objets connectés hétérogènes et des services de l'Internet des Objets. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS009⟩. ⟨tel-03353645⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mariana Segovia-Ferreira. Cyber-resilience and attack tolerance for cyber-physical systems. Cryptographie et sécurité [cs.CR]. Institut Polytechnique de Paris, 2021. Français. ⟨NNT : 2021IPPAS005⟩. ⟨tel-03881707⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mustafizur Rahman Shahid. Deep learning for Internet of Things (IoT) network security. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAS003⟩. ⟨tel-03193266⟩
- Accès au texte intégral et bibtex
-
2020
- ref_biblio
- Shanay Behrad. Slice specific authentication and access control for 5G. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS007⟩. ⟨tel-02614232⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fabien Charmet. Security characterization of SDN virtual network migration : formal approach and resource optimization. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS008⟩. ⟨tel-02860894⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Aïda Abdou Diop. Cryptographic mechanisms for device authentication and attestation in the internet of things. Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS023⟩. ⟨tel-03051732⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Omar Houidi. Algorithmes exacts et heuristiques pour le chainage de services réseaux virtualisés. Réseaux et télécommunications [cs.NI]. Institut Polytechnique de Paris, 2020. Français. ⟨NNT : 2020IPPAS005⟩. ⟨tel-02905778⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Mohamed Emine Laarouchi. A safety approach for CPS-IoT. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS010⟩. ⟨tel-03051734⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Asma Lahbib. Distributed management framework based on the blockchain technology for industry 4.0 environments. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS017⟩. ⟨tel-03121199⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Lionel Nganyewou Tidjon. Formal modeling of intrusion detection systems. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris; Université de Sherbrooke (Québec, Canada), 2020. English. ⟨NNT : 2020IPPAS021⟩. ⟨tel-03137661⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Rajapaksha Waththe Vidanelage Praboda Chathurangani Rajapaksha. Clickbait detection using multimodel fusion and transfer learning. Social and Information Networks [cs.SI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS025⟩. ⟨tel-03139880⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Yasir Saleem Shaikh. Privacy preserving internet of things recommender systems for smart cities. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS001⟩. ⟨tel-02500640⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Abdallah Sobehy. Machine learning based localization in 5G. Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS012⟩. ⟨tel-03092322⟩
- Accès au texte intégral et bibtex
-
2019
- ref_biblio
- Pierre-Marie Bajan. Simulation of activities and attacks : application to cyberdefense. Cryptography and Security [cs.CR]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL014⟩. ⟨tel-02316915⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Filipe Conceicao. Network survival with energy harvesting : secure cooperation and device assisted networking. Networking and Internet Architecture [cs.NI]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL020⟩. ⟨tel-02437270⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Montida Pattaranantakul. Moving towards software-defined security in the era of NFV and SDN. Cryptography and Security [cs.CR]. Université Paris Saclay (COmUE), 2019. English. ⟨NNT : 2019SACLL009⟩. ⟨tel-02186875⟩
- Accès au texte intégral et bibtex
-
2006
- ref_biblio
- Joaquin Garcia‐alfaro. Platform of intrusion management : design and implementation. Cryptography and Security [cs.CR]. Telecom Bretagne; Universitat Autònoma de Barcelona, 2006. English. ⟨NNT : ⟩. ⟨tel-03628739⟩
- Accès au bibtex
-
Preprints, Working Papers, ...
2020
- ref_biblio
- Koosha Zarei, Reza Farahbakhsh, Noel Crespi, Gareth Tyson. A first Instagram dataset on COVID-19. 2020. ⟨hal-02557003⟩
- Accès au texte intégral et bibtex
-
2019
- ref_biblio
- Asma Berriri, Natalia Kushik, Djamal Zeghlache. Extended Finite State Machine based test generation for an OpenFlow switch. 2019. ⟨hal-02263575⟩
- Accès au texte intégral et bibtex
-