Name
Affiliation
Papers
OLIVIER FESTOR
Centre de Recherche INRIA Nancy Grand Est 615, rue du jardin botanique Villers-les-Nancy France
161
Collaborators
Citations 
PageRank 
148
665
85.40
Referers 
Referees 
References 
1468
2209
1320
Search Limit
1001000
Title
Citations
PageRank
Year
Leveraging in-network real-value computation for home network device recognition00.342021
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking30.362019
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN00.342019
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds00.342019
Unikernel-based approach for software-defined security in cloud infrastructures.00.342018
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures.00.342018
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.00.342018
Towards a security monitoring plane for named data networking and its application against content poisoning attack.10.342018
μNDN: an orchestrated microservice architecture for named data networking00.342018
A Security Monitoring Plane for Named Data Networking Deployment.60.442018
NDN.p4: Programming information-centric data-planes60.522016
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study00.342016
A platform for the analysis and visualization of network flow data of android environments40.442015
An Online Risk Management Strategy for VoIP Enterprise Infrastructures30.392015
Evaluation of the anonymous I2P network's design choices against performance and security10.362015
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.00.342015
Anomaly traceback using software defined networking100.562014
SONETOR: A social network traffic generator10.372014
Group-Based Characterization for the I2P Anonymous File-Sharing Environment00.342014
Empirical analysis of Android logs using self-organizing maps10.352014
A SAT-based autonomous strategy for security vulnerability management40.442014
Vulnerability Assessment in Autonomic Networks and Services: A Survey30.672014
Outsourcing Mobile Security in the Cloud.40.402014
A Pin is worth a thousand words: Characterization of publications in Pinterest30.372014
Named data aggregation in wireless sensor networks40.432014
Monitoring anonymous P2P file-sharing systems00.342013
A probabilistic cost-efficient approach for mobile security assessment20.402013
MPC: Popularity-based caching strategy for content centric networks541.832013
Efficient distributed monitoring in 6LoWPAN networks.10.402013
Improving present security through the detection of past hidden vulnerable states00.342013
Detection and mitigation of localized attacks in a widely deployed P2P network.80.562013
Routing based roles assignment for monitoring 6LowPAN networks00.342012
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services40.392012
Improving content availability in the i2p anonymous file-sharing environment10.462012
Dynamic exposure control in P2PSIP networks30.402012
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.30.482012
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks50.602012
Online Estimation of Battery Lifetime for Wireless Sensors Network30.422012
A bird's eye view on the I2P anonymous file-sharing environment40.482012
PTF: Passive Temporal Fingerprinting60.552011
Econometric feedback for runtime risk management in VoIP architectures20.392011
Towards vulnerability prevention in autonomic networks and systems00.342011
Hinky: Defending against Text-Based Message Spam on Smartphones30.392011
When KAD Meets BitTorrent - Building a Stronger P2P Network10.372011
A survey on fraud and service misuse in voice over IP (VoIP) networks40.502011
Supporting vulnerability awareness in autonomic networks and systems with OVAL60.552011
Artemisa: An open-source honeypot back-end to support security in VoIP domains70.492011
YANG-based configuration modeling - The SecSIP IPS case study -.00.342011
BitTorrent's Mainline DHT Security Assessment100.672011
Special Issue On Virtualization00.342010
  • 1
  • 2