Team Madynes

Members
Overall Objectives
Scientific Foundations
Application Domains
Software
New Results
Contracts and Grants with Industry
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
H. Abdelnur.
Architecture de Sécurité sur la Voix sur IP, Université Henri Poincaré - Nancy 1, 03 2009
http://tel.archives-ouvertes.fr/tel-00436270/en/, Ph. D. Thesis.
[2]
J. François.
Robustesse et Identification des Applications Communicantes, Université Henri Poincaré - Nancy I, 12 2009
http://tel.archives-ouvertes.fr/tel-00442008/en/, Ph. D. Thesis.
[3]
M. Nassar.
Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP, Université Henri Poincaré - Nancy I, 03 2009
http://tel.archives-ouvertes.fr/tel-00376831/en/, Ph. D. Thesis.
[4]
R. State.
Audit et monitorage de la sécurité, Université Henri Poincaré - Nancy I, 12 2009
http://tel.archives-ouvertes.fr/tel-00442530/en/, HDR.

Articles in International Peer-Reviewed Journal

[5]
H. Abdelnur, T. Avanesov, M. Rusinowitch, R. State.
Abusing SIP authentication, in: Journal of Information Assurance and Security, 2009, vol. 4, no 4, p. 311-318
http://hal.inria.fr/inria-00405356/en/.
[6]
H. Abdelnur, R. State, O. Festor.
Fuzzing for vulnerabilities in the VoIP space, in: ACM International Journal of Computer Virology, 2009
http://hal.inria.fr/inria-00436373/en/.
[7]
L. Andrey, O. Festor, A. Lahmadi, A. Pras, J. Schoenwaelder.
Survey of SNMP performance analysis studies, in: International Journal of Network Management, 2009, vol. 19, no 6, p. 527-548
http://hal.inria.fr/inria-00432582/en/.
[8]
T. Leclerc, A. Andronache, L. Ciarletta, S. Rothkugel.
Stabilizing cluster structures in mobile networks for OLSR and WCPD as Basis for Service Discovery, in: International Journal on Advances in Internet Technologies, 2009, vol. 2, no 1, p. 206-214
http://hal.inria.fr/inria-00406472/en/.

Articles in National Peer-Reviewed Journal

[9]
J. François, R. State, O. Festor.
Botnets IRC et P2P pour une supervision à large échelle, in: Technique et Science Informatiques, 2009, vol. 28, no 4, p. 433-458
http://hal.inria.fr/inria-00392573/en/.
[10]
A. Lahmadi, L. Andrey, O. Festor.
Caractéristiques des délais dans les applications de supervision de réseaux et de services, in: Technique et Science Informatiques (TSI), 2009, vol. 28, no 4/2009, p. 479 - 502
http://hal.inria.fr/inria-00404847/en/.
[11]
J. Siebert, L. Ciarletta, V. Chevrier.
De l'intérêt du couplage de modèles pour appréhender les interactions utilisateurs-réseaux dynamiques., in: Revue d'Intelligence Artificielle, 2009
http://hal.inria.fr/inria-00398679/en/.

International Peer-Reviewed Conference/Proceedings

[12]
R. Badonnel, O. Festor, K. Hamlaoui.
Monitoring and Counter-Profiling for Voice over IP Networks and Services, in: IEEE International Symposium on Integrated Network Management - IM'2009, USA, New York, I. Press (editor), IEEE Press, 2009-06-01, 8 p
http://hal.archives-ouvertes.fr/hal-00406537/en/.
[13]
T. Cholez, I. Chrisment, O. Festor.
Evaluation of Sybil Attacks Protection Schemes in KAD, in: 3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, Pays-Bas Enschede, R. Sadre, A. Pras (editors), Springer, University of Twente, 2009, vol. 5637, p. 70-82
http://hal.inria.fr/inria-00405381/en/.
[14]
T. Cholez, I. Chrisment, O. Festor.
Fighting against paedophile activities in the KAD P2P network, in: Advances in the Analysis of Online Paedophile Activity, France Paris, Laboratoire d'Informatique de Paris 6, 2009
http://hal.inria.fr/inria-00405636/en/.
[15]
T. Cholez, I. Chrisment, O. Festor.
Une architecture de honeypots distribués pour superviser le réseau P2P KAD, in: 9e Conféence Internationale sur Les NOuvelles TEchnologies de la REpartition, Canada Montréal, A. ObaÔd (editor), Université du Québec à Montréal, 2009, p. 76-82
http://hal.inria.fr/inria-00405771/en/.
[16]
J. François, H. Abdelnur, R. State, O. Festor.
Automated Behavioral Fingerprinting, in: 12th International Symposium on Recent Advances in Intrusion Detection - RAID 2009, France St Malo, E. Kirda, S. J. D. Balzarotti (editors), Springer Berlin / Heidelberg, 2009-09-30, vol. 5758
http://hal.inria.fr/inria-00428972/en/.
[17]
P. Gratz, T. Leclerc.
Delay-Tolerant Collaborative Filtering, in: 7th ACM International Symposium on Mobility Management and Wireless Access (MobiWac), Espagne Tenerife, ACM, 2009-10-26, p. Pages 109-113
http://hal.inria.fr/inria-00433769/en/.
[18]
A. Lahmadi, L. Andrey, O. Festor.
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits, in: The Eighth International Conference on Networks - ICN 2009, Mexique Cancun, 2009
http://hal.inria.fr/inria-00404862/en/.
[19]
A. Lahmadi, L. Andrey, O. Festor.
Performance of Network and Service Monitoring Frameworks, in: 11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, USA, Long Island, 2009
http://hal.inria.fr/inria-00404856/en/.
[20]
A. Lahmadi, O. Festor.
SecSip: A Stateful Firewall for SIP-based Networks, in: 11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, USA, Long Island, 2009
http://hal.inria.fr/inria-00404853/en/.
[21]
M. E. B. Nassar, R. State, O. Festor.
VoIP Malware: Attack Tool & Attack Scenarios, in: IEEE ICC 09, Allemagne Dresden, I. C. Society (editor), IEEE Communications Society, IEEE, 2009
http://hal.inria.fr/inria-00404837/en/.
[22]
C. Popi, O. Festor.
Flow Monitoring in Wireless Mesh Networks, in: International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, Pays-Bas Enschede, R. Sadre, A. Pras (editors), Springer, 2009, vol. 5637, p. 134-146
http://hal.inria.fr/inria-00404956/en/.
[23]
C. Popi, I. Diaz, O. Festor, J. Tourino, D. Ramon.
Ontological Configuration Management for Wireless Mesh Routers, in: IEEE International Workshop on IP Operations and Management Volume 5843/2009, Venice Italie, S. B. /. Heidelberg (editor), Lecture Notes in Computer Science, 10 2009
http://hal.inria.fr/inria-00436280/en/.
[24]
P. Saqui-Sannes, T. Villemur, B. Fontan, S. Mota, M. S. Bouassida, N. Chridi, I. Chrisment, L. Vigneron.
UML Modeling and Formal Verification of Secure Group Communication Protocols, in: Second IEEE International workshop UML and Formal Methods - UML&FM'2009, Brésil Rio de Janeiro, 2009
http://hal.inria.fr/inria-00429747/en/.

Workshops without Proceedings

[25]
T. Cholez, I. Chrisment, O. Festor.
Exploiting KAD Vulnerabilities to Build an Efficient Honeypot Architecture, in: 2nd EMANICS Workshop on Peer-to-Peer Management, Royaume-Uni London, University College London, 2009
http://hal.inria.fr/inria-00405850/en/.

Scientific Books (or Scientific Book chapters)

[26]
M. S. Bouassida, I. Chrisment, O. Festor.
Key Management in Ad-Hoc Networks, in: Wireless and Mobile Networks Security, H. Chaouchi, M. Laurent-Maknavicius (editors), ISTE Ltd and John Wiley & Sons Inc, 2009-07
http://hal.inria.fr/inria-00434423/en/.

Internal Reports

[27]
F. Beck, I. Chrisment, O. Festor.
Automatic IPv4 to IPv6 Transition D1.1 - Network Topologies and Transition Procedures, 2009
http://hal.inria.fr/inria-00407630/en/, Contrat.
[28]
F. Beck, I. Chrisment, O. Festor.
Automatic IPv4 to IPv6 Transition D1.2 - Network representation and pre-requisites, 2009
http://hal.inria.fr/inria-00407632/en/, Contrat.
[29]
F. Beck, O. Festor.
Syscall Interception in Xen Hypervisor, 2009
http://hal.inria.fr/inria-00431031/en/, Rapport Technique.
[30]
T. Cholez, I. Chrisment, O. Festor.
HAMACK: a Honeynet Architecture against MAlicious Contents in KAD, 2009
http://hal.inria.fr/inria-00406477/en/, RR-6994.
[31]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Periodic Activity Report January 1, 2008 - December 31, 2008, 2009
http://hal.inria.fr/inria-00436060/en/, Contrat.
[32]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #12, 2009
http://hal.inria.fr/inria-00436061/en/, Contrat.
[33]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #13, 2009
http://hal.inria.fr/inria-00436054/en/, Contrat.
[34]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #14, 2009
http://hal.inria.fr/inria-00436055/en/, Contrat.
[35]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #15, 2009
http://hal.inria.fr/inria-00436056/en/, Contrat.
[36]
O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Updated Joint Programme of Activities (Month 37-48), 2009
http://hal.inria.fr/inria-00436058/en/, Contrat.
[37]
O. Festor.
EMANICS D6.4 Open Source Support and Joint Software Development, 2009
http://hal.inria.fr/inria-00436062/en/, Contrat.
[38]
J. François, H. Abdelnur, R. State, O. Festor.
Advanced Fingerprinting For Inventory Management, 2009
http://hal.inria.fr/inria-00419766/en/, RR-7044.
[39]
J. François, H. Abdelnur, R. State, O. Festor.
Behavioral and Temporal Fingerprinting, 2009
http://hal.inria.fr/inria-00406482/en/, RR-6995.
[40]
C. Jelger, T. Noël, I. Diaz, C. Popi, O. Festor.
Wireless Mesh Network Configuration Platform Specification, 2008
http://hal.inria.fr/inria-00338243/en/, Interne.
[41]
E. Nataf, O. Festor.
jYang : A YANG parser in java, 2009
http://hal.inria.fr/inria-00411261/en/, Rapport Technique.
[42]
C. Popi, O. Festor.
Wireless Mesh Network Monitoring Management Platform Specification, 2009
http://hal.inria.fr/inria-00436104/en/, Research Report.
[43]
C. Popi, O. Festor, D.-E. Meddour, H. Aïache, S. Rousseau.
Prototypes de protocoles d'interopérabilité, de supervision et d'auto-organisation, 2009
http://hal.inria.fr/inria-00436241/en/, Interne.
[44]
S. Radu, F. Olivier, A. Humberto, V. Pascual, J. Kuthan, R. Coeffic.
SIP digest authentication relay attack, 2009
http://hal.inria.fr/inria-00441987/en/, Technical Report.
[45]
J. Siebert, J. Rehm, V. Chevrier, L. Ciarletta, D. Méry.
AA4MM coordination model: Event-B specification, 2009
http://hal.inria.fr/inria-00435569/en/, Rapport de recherche.

Other Publications

[46]
L. Ciarletta, T. Leclerc, L. Reynaud.
Architecture pour la découverte de services avancée, 2009
http://hal.inria.fr/inria-00417677/en/.
[47]
O. Dabbebi.
Intégration d'un modèle de risques à un outil de gestion automatique, 2009-07-15
http://hal.archives-ouvertes.fr/hal-00406543/en/.
[48]
L. Debricon.
Gestion adaptative des risques dans les infrastructures voix sur IP, 2009-07-01
http://hal.archives-ouvertes.fr/hal-00406540/en/.
[49]
G. Vijay, B. Eric, A. T., H. Abdelnur, O. Festor.
The Common Log File (CLF) format for the Session Initiation Protocol (SIP) - draft-gurbani-sipping-clf-01, 2009
http://hal.inria.fr/inria-00436075/en/, Draft.
[50]
G. Vijay, B. Eric, A. T., H. Abdelnur, O. Festor.
The Common Log Format (CLF) for the Session Initiation Protocol (SIP) - draft-gurbani-sipclf-problem-statement-00, 2009
http://hal.inria.fr/inria-00436073/en/, Draft.

previous
next