FireCol: a collaborative protection network for the detection of flooding DDoS attacks J François, I Aib, R Boutaba IEEE/ACM Transactions on networking 20 (6), 1828-1841, 2012 | 174 | 2012 |
BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011, 1-14, 2011 | 139 | 2011 |
Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, R State, T Engel 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 101 | 2011 |
PhishStorm: Detecting phishing with streaming analytics S Marchal, J François, R State, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 99 | 2014 |
CCN traffic optimization for IoT J François, T Cholez, T Engel 2013 Fourth international conference on the network of the future (NOF), 1-5, 2013 | 54 | 2013 |
Anomaly traceback using software defined networking J François, O Festor 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 47 | 2014 |
Machine learning approach for ip-flow record anomaly detection C Wagner, J François, T Engel International Conference on Research in Networking, 28-39, 2011 | 44 | 2011 |
A multi-level framework to identify https services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 43 | 2016 |
Proactive discovery of phishing related domain names S Marchal, J François, T Engel International Workshop on Recent Advances in Intrusion Detection, 190-209, 2012 | 41 | 2012 |
R. State, and T. Engel,“ C Wagner, J François Machine learning approach for IP-flow record anomaly detection,” in Lecture …, 2011 | 32 | 2011 |
Network security through software defined networking: a survey J François, L Dolberg, O Festor, T Engel Proceedings of the conference on principles, systems and applications of IP …, 2014 | 31 | 2014 |
Malware analysis with graph kernels and support vector machines C Wagner, G Wagener, R State, T Engel 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 30 | 2009 |
Security monitoring for content-centric networking D Goergen, T Cholez, J François, T Engel Data privacy management and autonomous spontaneous security, 274-286, 2012 | 28 | 2012 |
DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor 2012 IEEE Network Operations and Management Symposium, 988-993, 2012 | 28 | 2012 |
PhishScore: Hacking phishers' minds S Marchal, J François, R State, T Engel 10th International Conference on Network and Service Management (CNSM) and …, 2014 | 27 | 2014 |
Ndn. p4: Programming information-centric data-planes S Signorello, R State, J François, O Festor 2016 IEEE NetSoft Conference and Workshops (NetSoft), 384-389, 2016 | 25 | 2016 |
Ptf: Passive temporal fingerprinting J François, H Abdelnur, R State, O Festor 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 25 | 2011 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J Francois 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 22 | 2016 |
Oko: Extending open vswitch with stateful filters P Chaignon, K Lazri, J François, T Delmas, O Festor Proceedings of the Symposium on SDN Research, 1-13, 2018 | 19 | 2018 |
Co-periodic stability of periodic waves in some Hamiltonian PDEs S Benzoni-Gavage, C Mietka, LM Rodrigues Nonlinearity 29 (11), 3241, 2016 | 19 | 2016 |