Abdelkader Lahmadi

Orcid: 0000-0003-3882-1560

According to our database1, Abdelkader Lahmadi authored at least 75 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in Microgrid.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Vulnet: Learning Navigation in an Attack Graph.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

In-Network ACL Rules Placement using Deep Reinforcement Learning.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2024

In-Band ARP-based Man-in-the-Middle Attack Detection Using P4 Programmable Switches.
Proceedings of the IEEE Latin-American Conference on Communications, 2024

An Empirical Study of Ransomware Vulnerabilities Descriptions.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
ML Models for Detecting QoE Degradation in Low-Latency Applications: A Cloud-Gaming Case Study.
IEEE Trans. Netw. Serv. Manag., September, 2023

An Experimental Testbed for 5G Network Security Assessment.
Proceedings of the NOMS 2023, 2023

Automated Placement of In-Network ACL Rules.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

2022
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks.
Wirel. Networks, 2022

BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services.
Int. J. Netw. Manag., 2022

Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey.
Comput. Commun., 2021

Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward.
Proceedings of the 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2021

HSL: a Cyber Security Research Facility for Sensitive Data Experiments.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT Networks.
Proceedings of the 16th International Conference on Wireless and Mobile Computing, 2020

MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques.
Proceedings of the ECML PKDD 2020 Workshops, 2020

Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

Double Mask: An Efficient Rule Encoding for Software Defined Networking.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

Management Plane for Differential Privacy Preservation Through Smart Contracts.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
Using Information Centric Networking in Internet of Things: A Survey.
Wirel. Pers. Commun., 2019

Poster : Minimizing range rules for packet filtering using a double mask representation.
Proceedings of the 2019 IFIP Networking Conference, 2019

SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Tool Suite for the Automated Synthesis of Security Function Chains.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Automated Factorization of Security Chains in Software-Defined Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2018

On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Generation of SDN policies for protecting android environments based on automata learning.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Synaptic: A formal checker for SDN-based security policies.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a management plane for smart contracts: Ethereum case study.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Automated verification of security chains in software-defined networks with synaptic.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

BotGM: Unsupervised graph mining to detect botnets in traffic flows.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Topological analysis and visualisation of network monitoring data: Darknet case study.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Optimizing internet scanning for assessing industrial systems exposure.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2015
Extracting Markov chain models from protocol execution traces for end to end delay evaluation in wireless sensor networks.
Proceedings of the IEEE World Conference on Factory Communication Systems, 2015

A platform for the analysis and visualization of network flow data of android environments.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards cloud-based compositions of security functions for mobile devices.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Behavioral and dynamic security functions chaining for Android devices.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
CrowdOut: A mobile crowdsourcing service for road safety in digital cities.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Named data aggregation in wireless sensor networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Towards performance analysis of wireless sensor networks using Process Mining Techniques.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Empirical analysis of Android logs using self-organizing maps.
Proceedings of the IEEE International Conference on Communications, 2014

Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Outsourcing Mobile Security in the Cloud.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC Performance.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Efficient distributed monitoring in 6LoWPAN networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services.
IEEE Trans. Netw. Serv. Manag., 2012

A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Routing based roles assignment for monitoring 6LowPAN networks.
Proceedings of the Third International Conference on Communications and Networking, 2012

2011
YANG-based configuration modeling - The SecSIP IPS case study -.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Hinky: Defending against Text-Based Message Spam on Smartphones.
Proceedings of IEEE International Conference on Communications, 2011

2010
VeTo: An exploit prevention language from known vulnerabilities in SIP services.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
Caractérisation des délais dans les applications de supervision de réseaux et de services.
Tech. Sci. Informatiques, 2009

Survey of SNMP performance analysis studies.
Int. J. Netw. Manag., 2009

SecSip: A stateful firewall for SIP-based networks.
Proceedings of the Integrated Network Management, 2009

Performance of network and service monitoring frameworks.
Proceedings of the Integrated Network Management, 2009

Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits.
Proceedings of the Eighth International Conference on Networks, 2009

2007
Performances des fonctions et architectures de supervision de réseaux et de services. (Performance Evaluation of the Network and Service Management Plane).
PhD thesis, 2007

On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study.
Proceedings of the Inter-Domain Management, 2007

Modeling and Performance Evaluation of the Network and Service Management Plane.
Proceedings of the Inter-Domain Management, 2007

2006
On Delays in Management Frameworks: Metrics, Models and Analysis.
Proceedings of the Large Scale Management of Distributed Systems, 2006

2005
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study.
Proceedings of the Ambient Networks, 2005

2004
Deployment and test of IPv6 services in the VTHD network.
IEEE Commun. Mag., 2004

2002
A secure SSM architecture.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002


  Loading...