Name
Affiliation
Papers
ISABELLE CHRISMENT
INRIA
56
Collaborators
Citations 
PageRank 
69
225
25.75
Referers 
Referees 
References 
464
1094
496
Search Limit
1001000
Title
Citations
PageRank
Year
Mitigating TCP Protocol Misuse With Programmable Data Planes00.342021
Comparative Assessment of Process Mining for Supporting IoT Predictive Security00.342021
Empowering mobile crowdsourcing apps with user privacy control00.342021
Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification00.342020
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms00.342020
Capturing Privacy-preserving User Contexts with IndoorHash00.342020
A Process Mining Tool for Supporting IoT Security.00.342020
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic30.392019
Testing nearby peer-to-peer mobile apps at large00.342019
Demonstration Of Synchronization Attacks On Distributed And Cooperative Control In Microgrids00.342019
ANDROFLEET: testing WiFi peer-to-peer mobile apps in the large.00.342017
A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks.90.472017
Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN20.362017
Using the RPL Protocol for Supporting Passive Monitoring in the Internet of Things20.382016
A Taxonomy of Attacks in RPL-based Internet of Things200.742016
A multi-level framework to identify HTTPS services.60.742016
Improving SNI-Based HTTPS Security Monitoring00.342016
Exploring Smartphone Application Usage Logs with Declared Sociological Information00.342016
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture10.372016
Mitigation Of Topological Inconsistency Attacks In Rpl-Based Low-Power Lossy Networks100.522015
Refining smartphone usage analysis by combining crowdsensing and survey10.392015
Evaluation of the anonymous I2P network's design choices against performance and security10.362015
Efficiently bypassing SNI-based HTTPS filtering30.412015
SRSC: SDN-based routing scheme for CCN120.562015
Group-Based Characterization for the I2P Anonymous File-Sharing Environment00.342014
Addressing DODAG inconsistency attacks in RPL networks80.552014
A Study of RPL DODAG Version Attacks.110.652014
Monitoring anonymous P2P file-sharing systems00.342013
Monitoring and security for the internet of things40.492013
Detection and mitigation of localized attacks in a widely deployed P2P network.80.562013
Improving content availability in the i2p anonymous file-sharing environment10.462012
A bird's eye view on the I2P anonymous file-sharing environment40.482012
I2P's usage characterization30.522012
Comparing paedophile activity in different P2P systems10.342012
When KAD Meets BitTorrent - Building a Stronger P2P Network10.372011
BitTorrent's Mainline DHT Security Assessment100.672011
Content pollution quantification in large P2P networks : A measurement study on KAD.70.512011
Formal verification of secure group communication protocols modelled in UML30.402010
Autonomic renumbering in the future internet170.622010
Automated and secure IPv6 configuration in enterprise networks10.372010
Efficient DHT attack mitigation through peers' ID distribution20.402010
Evaluation of Sybil Attacks Protection Schemes in KAD140.712009
Group Key Management in MANETs190.842008
A Distributed and Adaptive Revocation Mechanism for P2P Networks50.472008
Automated verification of a key management architecture for hierarchical group protocols.20.412007
Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique70.532006
Mobility-awareness in group key management protocols within MANETs.00.342006
Efficient clustering for multicast key distribution in MANETs70.602005
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks70.632004
Gestion efficace de la sécurité des communications de groupe pour le service SSM00.342004
  • 1
  • 2