Name
Affiliation
Papers
REMI BADONNEL
INRIA Nancy Grand Est, LORIA, Vandoeuvre-lès-Nancy, France
44
Collaborators
Citations 
PageRank 
62
154
22.43
Referers 
Referees 
References 
339
631
357
Search Limit
100631
Title
Citations
PageRank
Year
Comparative Assessment of Process Mining for Supporting IoT Predictive Security00.342021
Towards Automating Security Enhancement For Cloud Services00.342021
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models10.352020
A Tool Suite For The Automated Synthesis Of Security Function Chains00.342019
Automated Factorization of Security Chains in Software-Defined Networks00.342019
Unikernel-based approach for software-defined security in cloud infrastructures.00.342018
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures.00.342018
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.00.342018
Synaptic: A formal checker for SDN-based security policies.00.342018
Generation of SDN policies for protecting android environments based on automata learning.00.342018
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks00.342018
Softwarization Of Networks, Clouds, And Internet Of Things10.362017
Towards a Software-Defined Security Framework for Supporting Distributed Cloud.00.342017
Using the RPL Protocol for Supporting Passive Monitoring in the Internet of Things20.382016
A Taxonomy of Attacks in RPL-based Internet of Things200.742016
Mitigation Of Topological Inconsistency Attacks In Rpl-Based Low-Power Lossy Networks100.522015
An Online Risk Management Strategy for VoIP Enterprise Infrastructures30.392015
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.00.342015
Towards cloud-based compositions of security functions for mobile devices20.432015
Behavioral and dynamic security functions chaining for Android devices20.452015
A SAT-based autonomous strategy for security vulnerability management40.442014
Vulnerability Assessment in Autonomic Networks and Services: A Survey30.672014
Outsourcing Mobile Security in the Cloud.40.402014
A Study of RPL DODAG Version Attacks.110.652014
Leveraging Countermeasures As A Service For Voip Security In The Cloud10.352014
A probabilistic cost-efficient approach for mobile security assessment20.402013
Improving present security through the detection of past hidden vulnerable states00.342013
Ovaldroid: An OVAL-based vulnerability assessment framework for Android20.402013
Dynamic exposure control in P2PSIP networks30.402012
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.30.482012
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures.30.412011
Managing risks at runtime in VoIP networks and services20.462010
Risk management in VoIP infrastructures using support vector machines70.542010
On Service Orchestration in Mobile Computing Environments20.372008
Dynamic pull-based load balancing for autonomic servers141.172008
Self-configurable fault monitoring in ad-hoc networks50.552008
Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process10.352008
Fault detection in autonomic networks using the concept of promised cooperation00.342007
Fault monitoring in ad-hoc networks based on information theory30.432006
Monitoring end-to-end connectivity in mobile ad-hoc networks50.532005
Self-Organized Monitoring in Ad-Hoc Networks40.422005
Management of mobile ad hoc networks: information model and probe-based architecture171.052005
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks10.372005
Automating the Provisioning of Application Services with the BPEL4WS Workflow Language163.242004