Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
- [1]
- H. Abdelnur.
Architecture de Sécurité sur la Voix sur IP, Université Henri Poincaré - Nancy 1, 03 2009
http://tel.archives-ouvertes.fr/tel-00436270/en/, Ph. D. Thesis. - [2]
- J. François.
Robustesse et Identification des Applications Communicantes, Université Henri Poincaré - Nancy I, 12 2009
http://tel.archives-ouvertes.fr/tel-00442008/en/, Ph. D. Thesis. - [3]
- M. Nassar.
Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP, Université Henri Poincaré - Nancy I, 03 2009
http://tel.archives-ouvertes.fr/tel-00376831/en/, Ph. D. Thesis. - [4]
- R. State.
Audit et monitorage de la sécurité, Université Henri Poincaré - Nancy I, 12 2009
http://tel.archives-ouvertes.fr/tel-00442530/en/, HDR.
Articles in International Peer-Reviewed Journal
- [5]
- H. Abdelnur, T. Avanesov, M. Rusinowitch, R. State.
Abusing SIP authentication, in: Journal of Information Assurance and Security, 2009, vol. 4, no 4, p. 311-318
http://hal.inria.fr/inria-00405356/en/. - [6]
- H. Abdelnur, R. State, O. Festor.
Fuzzing for vulnerabilities in the VoIP space, in: ACM International Journal of Computer Virology, 2009
http://hal.inria.fr/inria-00436373/en/. - [7]
- L. Andrey, O. Festor, A. Lahmadi, A. Pras, J. Schoenwaelder.
Survey of SNMP performance analysis studies, in: International Journal of Network Management, 2009, vol. 19, no 6, p. 527-548
http://hal.inria.fr/inria-00432582/en/. - [8]
- T. Leclerc, A. Andronache, L. Ciarletta, S. Rothkugel.
Stabilizing cluster structures in mobile networks for OLSR and WCPD as Basis for Service Discovery, in: International Journal on Advances in Internet Technologies, 2009, vol. 2, no 1, p. 206-214
http://hal.inria.fr/inria-00406472/en/.
Articles in National Peer-Reviewed Journal
- [9]
- J. François, R. State, O. Festor.
Botnets IRC et P2P pour une supervision à large échelle, in: Technique et Science Informatiques, 2009, vol. 28, no 4, p. 433-458
http://hal.inria.fr/inria-00392573/en/. - [10]
- A. Lahmadi, L. Andrey, O. Festor.
Caractéristiques des délais dans les applications de supervision de réseaux et de services, in: Technique et Science Informatiques (TSI), 2009, vol. 28, no 4/2009, p. 479 - 502
http://hal.inria.fr/inria-00404847/en/. - [11]
- J. Siebert, L. Ciarletta, V. Chevrier.
De l'intérêt du couplage de modèles pour appréhender les interactions utilisateurs-réseaux dynamiques., in: Revue d'Intelligence Artificielle, 2009
http://hal.inria.fr/inria-00398679/en/.
International Peer-Reviewed Conference/Proceedings
- [12]
- R. Badonnel, O. Festor, K. Hamlaoui.
Monitoring and Counter-Profiling for Voice over IP Networks and Services, in: IEEE International Symposium on Integrated Network Management - IM'2009, USA, New York, I. Press (editor), IEEE Press, 2009-06-01, 8 p
http://hal.archives-ouvertes.fr/hal-00406537/en/. - [13]
- T. Cholez, I. Chrisment, O. Festor.
Evaluation of Sybil Attacks Protection Schemes in KAD, in: 3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, Pays-Bas Enschede, R. Sadre, A. Pras (editors), Springer, University of Twente, 2009, vol. 5637, p. 70-82
http://hal.inria.fr/inria-00405381/en/. - [14]
- T. Cholez, I. Chrisment, O. Festor.
Fighting against paedophile activities in the KAD P2P network, in: Advances in the Analysis of Online Paedophile Activity, France Paris, Laboratoire d'Informatique de Paris 6, 2009
http://hal.inria.fr/inria-00405636/en/. - [15]
- T. Cholez, I. Chrisment, O. Festor.
Une architecture de honeypots distribués pour superviser le réseau P2P KAD, in: 9e Conféence Internationale sur Les NOuvelles TEchnologies de la REpartition, Canada Montréal, A. ObaÃd (editor), Université du Québec à Montréal, 2009, p. 76-82
http://hal.inria.fr/inria-00405771/en/. - [16]
- J. François, H. Abdelnur, R. State, O. Festor.
Automated Behavioral Fingerprinting, in: 12th International Symposium on Recent Advances in Intrusion Detection - RAID 2009, France St Malo, E. Kirda, S. J. D. Balzarotti (editors), Springer Berlin / Heidelberg, 2009-09-30, vol. 5758
http://hal.inria.fr/inria-00428972/en/. - [17]
- P. Gratz, T. Leclerc.
Delay-Tolerant Collaborative Filtering, in: 7th ACM International Symposium on Mobility Management and Wireless Access (MobiWac), Espagne Tenerife, ACM, 2009-10-26, p. Pages 109-113
http://hal.inria.fr/inria-00433769/en/. - [18]
- A. Lahmadi, L. Andrey, O. Festor.
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits, in: The Eighth International Conference on Networks - ICN 2009, Mexique Cancun, 2009
http://hal.inria.fr/inria-00404862/en/. - [19]
- A. Lahmadi, L. Andrey, O. Festor.
Performance of Network and Service Monitoring Frameworks, in: 11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, USA, Long Island, 2009
http://hal.inria.fr/inria-00404856/en/. - [20]
- A. Lahmadi, O. Festor.
SecSip: A Stateful Firewall for SIP-based Networks, in: 11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, USA, Long Island, 2009
http://hal.inria.fr/inria-00404853/en/. - [21]
- M. E. B. Nassar, R. State, O. Festor.
VoIP Malware: Attack Tool & Attack Scenarios, in: IEEE ICC 09, Allemagne Dresden, I. C. Society (editor), IEEE Communications Society, IEEE, 2009
http://hal.inria.fr/inria-00404837/en/. - [22]
- C. Popi, O. Festor.
Flow Monitoring in Wireless Mesh Networks, in: International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, Pays-Bas Enschede, R. Sadre, A. Pras (editors), Springer, 2009, vol. 5637, p. 134-146
http://hal.inria.fr/inria-00404956/en/. - [23]
- C. Popi, I. Diaz, O. Festor, J. Tourino, D. Ramon.
Ontological Configuration Management for Wireless Mesh Routers, in: IEEE International Workshop on IP Operations and Management Volume 5843/2009, Venice Italie, S. B. /. Heidelberg (editor), Lecture Notes in Computer Science, 10 2009
http://hal.inria.fr/inria-00436280/en/. - [24]
- P. Saqui-Sannes, T. Villemur, B. Fontan, S. Mota, M. S. Bouassida, N. Chridi, I. Chrisment, L. Vigneron.
UML Modeling and Formal Verification of Secure Group Communication Protocols, in: Second IEEE International workshop UML and Formal Methods - UML&FM'2009, Brésil Rio de Janeiro, 2009
http://hal.inria.fr/inria-00429747/en/.
Workshops without Proceedings
- [25]
- T. Cholez, I. Chrisment, O. Festor.
Exploiting KAD Vulnerabilities to Build an Efficient Honeypot Architecture, in: 2nd EMANICS Workshop on Peer-to-Peer Management, Royaume-Uni London, University College London, 2009
http://hal.inria.fr/inria-00405850/en/.
Scientific Books (or Scientific Book chapters)
- [26]
- M. S. Bouassida, I. Chrisment, O. Festor.
Key Management in Ad-Hoc Networks, in: Wireless and Mobile Networks Security, H. Chaouchi, M. Laurent-Maknavicius (editors), ISTE Ltd and John Wiley & Sons Inc, 2009-07
http://hal.inria.fr/inria-00434423/en/.
Internal Reports
- [27]
- F. Beck, I. Chrisment, O. Festor.
Automatic IPv4 to IPv6 Transition D1.1 - Network Topologies and Transition Procedures, 2009
http://hal.inria.fr/inria-00407630/en/, Contrat. - [28]
- F. Beck, I. Chrisment, O. Festor.
Automatic IPv4 to IPv6 Transition D1.2 - Network representation and pre-requisites, 2009
http://hal.inria.fr/inria-00407632/en/, Contrat. - [29]
- F. Beck, O. Festor.
Syscall Interception in Xen Hypervisor, 2009
http://hal.inria.fr/inria-00431031/en/, Rapport Technique. - [30]
- T. Cholez, I. Chrisment, O. Festor.
HAMACK: a Honeynet Architecture against MAlicious Contents in KAD, 2009
http://hal.inria.fr/inria-00406477/en/, RR-6994. - [31]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Periodic Activity Report January 1, 2008 - December 31, 2008, 2009
http://hal.inria.fr/inria-00436060/en/, Contrat. - [32]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #12, 2009
http://hal.inria.fr/inria-00436061/en/, Contrat. - [33]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #13, 2009
http://hal.inria.fr/inria-00436054/en/, Contrat. - [34]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #14, 2009
http://hal.inria.fr/inria-00436055/en/, Contrat. - [35]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Quarterly Management Report #15, 2009
http://hal.inria.fr/inria-00436056/en/, Contrat. - [36]
- O. Festor, G. Dreo, D. Hausheer, G. Pavlou, A. Pras, R. Sadre, J. Serrat, J. Schoenwaelder, B. Stiller.
EMANICS Updated Joint Programme of Activities (Month 37-48), 2009
http://hal.inria.fr/inria-00436058/en/, Contrat. - [37]
- O. Festor.
EMANICS D6.4 Open Source Support and Joint Software Development, 2009
http://hal.inria.fr/inria-00436062/en/, Contrat. - [38]
- J. François, H. Abdelnur, R. State, O. Festor.
Advanced Fingerprinting For Inventory Management, 2009
http://hal.inria.fr/inria-00419766/en/, RR-7044. - [39]
- J. François, H. Abdelnur, R. State, O. Festor.
Behavioral and Temporal Fingerprinting, 2009
http://hal.inria.fr/inria-00406482/en/, RR-6995. - [40]
- C. Jelger, T. Noël, I. Diaz, C. Popi, O. Festor.
Wireless Mesh Network Configuration Platform Specification, 2008
http://hal.inria.fr/inria-00338243/en/, Interne. - [41]
- E. Nataf, O. Festor.
jYang : A YANG parser in java, 2009
http://hal.inria.fr/inria-00411261/en/, Rapport Technique. - [42]
- C. Popi, O. Festor.
Wireless Mesh Network Monitoring Management Platform Specification, 2009
http://hal.inria.fr/inria-00436104/en/, Research Report. - [43]
- C. Popi, O. Festor, D.-E. Meddour, H. Aïache, S. Rousseau.
Prototypes de protocoles d'interopérabilité, de supervision et d'auto-organisation, 2009
http://hal.inria.fr/inria-00436241/en/, Interne. - [44]
- S. Radu, F. Olivier, A. Humberto, V. Pascual, J. Kuthan, R. Coeffic.
SIP digest authentication relay attack, 2009
http://hal.inria.fr/inria-00441987/en/, Technical Report. - [45]
- J. Siebert, J. Rehm, V. Chevrier, L. Ciarletta, D. Méry.
AA4MM coordination model: Event-B specification, 2009
http://hal.inria.fr/inria-00435569/en/, Rapport de recherche.
Other Publications
- [46]
- L. Ciarletta, T. Leclerc, L. Reynaud.
Architecture pour la découverte de services avancée, 2009
http://hal.inria.fr/inria-00417677/en/. - [47]
- O. Dabbebi.
Intégration d'un modèle de risques à un outil de gestion automatique, 2009-07-15
http://hal.archives-ouvertes.fr/hal-00406543/en/. - [48]
- L. Debricon.
Gestion adaptative des risques dans les infrastructures voix sur IP, 2009-07-01
http://hal.archives-ouvertes.fr/hal-00406540/en/. - [49]
- G. Vijay, B. Eric, A. T., H. Abdelnur, O. Festor.
The Common Log File (CLF) format for the Session Initiation Protocol (SIP) - draft-gurbani-sipping-clf-01, 2009
http://hal.inria.fr/inria-00436075/en/, Draft. - [50]
- G. Vijay, B. Eric, A. T., H. Abdelnur, O. Festor.
The Common Log Format (CLF) for the Session Initiation Protocol (SIP) - draft-gurbani-sipclf-problem-statement-00, 2009
http://hal.inria.fr/inria-00436073/en/, Draft.