Name
Affiliation
Papers
JÉRÔME FRANÇOIS
MADYNES - INRIA Nancy-Grand Est France
50
Collaborators
Citations 
PageRank 
78
170
21.81
Referers 
Referees 
References 
509
1185
500
Search Limit
1001000
Title
Citations
PageRank
Year
LINT: Accuracy-adaptive and Lightweight In-band Network Telemetry00.342021
Comparative Assessment of Process Mining for Supporting IoT Predictive Security00.342021
Leveraging in-network real-value computation for home network device recognition00.342021
HSL: a Cyber Security Research Facility for Sensitive Data Experiments00.342021
Software-Based Analysis Of The Security By Design In Embedded Devices00.342021
InREC: In-network REal Number Computation00.342021
Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification00.342020
A Process Mining Tool for Supporting IoT Security.00.342020
BPP over P4: Exploring Frontiers and Limits in Programmable Packet Processing00.342020
Deep mining port scans from darknet10.362019
Deep mining port scans from darknet10.362019
Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis00.342019
Port2dist: Semantic Port Distances For Network Analytics00.342019
SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic00.342019
Efficient Resource Allocation for Multi-Tenant Monitoring of Edge Infrastructures00.342019
Passive Inference Of User Actions Through Iot Gateway Encrypted Traffic Analysis00.342019
BlockZoom: Large-Scale Blockchain Testbed10.352019
Blockchain orchestration anpriority bionic competition ork: A case study of KYC.00.342018
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates00.342018
Utilizing attack enumerations to study SDN/NFV vulnerabilities00.342018
Towards a management plane for smart contracts: Ethereum case study.00.342018
Oko: Extending Open vSwitch with Stateful Filters70.552018
Offloading Security Services to the Cloud Infrastructure.00.342018
Special Issue On Security For Emerging Open Networking Technologies00.342018
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.00.342017
A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study10.342017
Knowledge discovery of port scans from darknet.30.442017
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.20.382017
NDN.p4: Programming information-centric data-planes60.522016
A multi-level framework to identify HTTPS services.60.742016
Improving SNI-Based HTTPS Security Monitoring00.342016
A generic framework to support application-level flow management in software-defined networks10.352016
RAMSES: Revealing Android Malware Through String Extraction and Selection.10.342014
Network security through software defined networking: a survey30.372014
Semantic exploration of DNS20.382012
Security Monitoring for Content-Centric Networking.110.642012
Proactive discovery of phishing related domain names180.732012
Efficient multidimensional aggregation for large scale monitoring40.412012
DNSSM: A large scale passive DNS security monitoring framework70.582012
Machine learning approach for IP-flow record anomaly detection180.742011
DANAK: Finding the odd!20.362011
BotTrack: tracking botnets using NetFlow and PageRank541.932011
Cleaning your house first: shifting the paradigm on how to secure networks50.552011
Enforcing security with behavioral fingerprinting20.452011
Semi-supervised Fingerprinting of Protocol Messages.10.372010
Automated Behavioral Fingerprinting70.562009
Botnets IRC et P2P pour une supervision à large échelle00.342009
Policy-based security configuration management application to intrusion detection and prevention40.522009
Malware Models for Network and Service Management10.352007
Botnets for scalable management10.352007