Name
Papers
Collaborators
THIBAULT CHOLEZ
26
43
Citations 
PageRank 
Referers 
100
11.89
248
Referees 
References 
436
176
Search Limit
100436
Title
Citations
PageRank
Year
An Open Measurement Dataset On The Bitcoin P2p Network00.342021
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.00.342019
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic30.392019
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.00.342018
μNDN: an orchestrated microservice architecture for named data networking00.342018
Implementation of content poisoning attack detection and reaction in virtualized NDN networks10.342018
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment40.382017
A multi-level framework to identify HTTPS services.60.742016
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.00.342016
Improving SNI-Based HTTPS Security Monitoring00.342016
PIT matching from unregistered remote faces: a critical NDN vulnerability.10.362016
Server-side performance evaluation of NDN.20.392016
Evaluation of the anonymous I2P network's design choices against performance and security10.362015
Efficiently bypassing SNI-based HTTPS filtering30.412015
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment00.342015
CCN traffic optimization for IoT161.042013
A semantic firewall for Content-Centric Networking40.432013
Detection and mitigation of localized attacks in a widely deployed P2P network.80.562013
Security Monitoring for Content-Centric Networking.110.642012
Comparing paedophile activity in different P2P systems10.342012
When KAD Meets BitTorrent - Building a Stronger P2P Network10.372011
BitTorrent's Mainline DHT Security Assessment100.672011
Content pollution quantification in large P2P networks : A measurement study on KAD.70.512011
Efficient DHT attack mitigation through peers' ID distribution20.402010
Evaluation of Sybil Attacks Protection Schemes in KAD140.712009
A Distributed and Adaptive Revocation Mechanism for P2P Networks50.472008