Name
Affiliation
Papers
ABDELKADER LAHMADI
INRIA Nancy Grand Est, 615 Rue Jardin Bot, F-54602 Villers Les Nancy, France
43
Collaborators
Citations 
PageRank 
64
90
18.46
Referers 
Referees 
References 
248
691
310
Search Limit
100691
Title
Citations
PageRank
Year
Reinforcement And Deep Reinforcement Learning For Wireless Internet Of Things: A Survey30.402021
HSL: a Cyber Security Research Facility for Sensitive Data Experiments00.342021
Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT Networks00.342020
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms00.342020
Using Information Centric Networking in Internet of Things: A Survey30.462019
A Tool Suite For The Automated Synthesis Of Security Function Chains00.342019
Automated Factorization of Security Chains in Software-Defined Networks00.342019
Demonstration Of Synchronization Attacks On Distributed And Cooperative Control In Microgrids00.342019
Poster : Minimizing range rules for packet filtering using a double mask representation00.342019
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates00.342018
On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid Systems10.372018
Synaptic: A formal checker for SDN-based security policies.00.342018
Towards a management plane for smart contracts: Ethereum case study.00.342018
Generation of SDN policies for protecting android environments based on automata learning.00.342018
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks00.342018
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.20.382017
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study00.342016
Extracting Markov chain models from protocol execution traces for end to end delay evaluation in wireless sensor networks20.352015
A platform for the analysis and visualization of network flow data of android environments40.442015
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment00.342015
Towards cloud-based compositions of security functions for mobile devices20.432015
Behavioral and dynamic security functions chaining for Android devices20.452015
Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case50.572014
Outsourcing Mobile Security in the Cloud.40.402014
Towards performance analysis of wireless sensor networks using Process Mining Techniques20.442014
Named data aggregation in wireless sensor networks40.432014
Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC Performance20.382013
Efficient distributed monitoring in 6LoWPAN networks.10.402013
Routing based roles assignment for monitoring 6LowPAN networks00.342012
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services40.392012
Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks10.352012
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks50.602012
Hinky: Defending against Text-Based Message Spam on Smartphones30.392011
YANG-based configuration modeling - The SecSIP IPS case study -.00.342011
VeTo: An exploit prevention language from known vulnerabilities in SIP services50.692010
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits30.502009
SecSip: a stateful firewall for SIP-based networks30.392009
Performance of network and service monitoring frameworks30.782009
Survey of SNMP performance analysis studies141.062009
Modeling and Performance Evaluation of the Network and Service Management Plane00.342007
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study20.462007
On delays in management frameworks: metrics, models and analysis40.522006
On the impact of management on the performance of a managed system: a JMX-Based management case study60.692005