2025
Small Language Models in the Real World: Insights from Industrial Text Classification.
CoRR, May, 2025
Graph-level heterogeneous information network embeddings for cardholder transaction analysis.
Neural Comput. Appl., April, 2025
Is LLM the Silver Bullet to Low-Resource Languages Machine Translation?
CoRR, March, 2025
2024
NIRWatchdog: Cross-Domain Product Quality Assessment Using Miniaturized Near-Infrared Sensors.
IEEE Internet Things J., April, 2024
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024
Mitigating federated learning contribution allocation instability through randomized aggregation.
CoRR, 2024
Cross Domain Early Crop Mapping using CropGAN and CNN Classifier.
CoRR, 2024
Editorial "Blockchain Technology - A Breakthrough Innovation for Modern Industries".
Comput., 2024
Cross Domain Early Crop Mapping Using CropSTGAN.
IEEE Access, 2024
Privacy-Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
A 9-dimensional Analysis of GossipSub over the XRP Ledger Consensus Protocol.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
CTQW-GraphSAGE: Trainabel Continuous-Time Quantum Walk On Graph.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Cross-Sector Market Regime Forecasting with LLM-Augmented News Analysis.
Proceedings of the 5th ACM International Conference on AI in Finance, 2024
WallStreetFeds: Client-Specific Tokens as Investment Vehicles in Federated Learning.
Proceedings of the 5th ACM International Conference on AI in Finance, 2024
Modelling Electric Vehicle Routing Problem with Heterogeneous Fleet for Simultaneous Pickup and Delivery.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2024 - 19th International Conference, Las Palmas de Gran Canaria, Spain, February 25, 2024
Causal AI for XRPL/GossipSub network configuration.
Proceedings of the 20th International Conference on Network and Service Management, 2024
LongKey: Keyphrase Extraction for Long Documents.
Proceedings of the IEEE International Conference on Big Data, 2024
Whistleblowers' Protection with XRP Ledger.
Proceedings of the 6th International Conference on Blockchain Computing and Applications, 2024
Federated Learning-Based Tokenizer for Domain-Specific Language Models in Finance.
Proceedings of the Social Networks Analysis and Mining - 16th International Conference, 2024
2023
Early Crop Mapping Using Dynamic Ecoregion Clustering: A USA-Wide Study.
Remote. Sens., October, 2023
Topology Analysis of the XRP Ledger.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactions.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
FLAIRS: Federated Learning AI Regulatory Sandbox.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2023
XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay.
Proceedings of the NOMS 2023, 2023
A Decentralized Super App.
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023
Pub/Sub Dissemination on the XRP Ledger.
Proceedings of the IEEE Latin-American Conference on Communications, 2023
NLAC: A Self-Maintained Trust Overlay for the XRP Ledger.
Proceedings of the IEEE Latin-American Conference on Communications, 2023
Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models.
Proceedings of the IEEE International Humanitarian Technology Conference, 2023
A Ripple for Change: Analysis of Frontrunning in the XRP Ledger.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Timely Identification of Victim Addresses in DeFi Attacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Blockly2Hooks: Smart Contracts for Everyone with the XRP Ledger and Google Blockly.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023
2022
Deep dive into Interledger: Understanding the Interledger ecosystem.
CoRR, 2022
Topology Analysis of the XRP Network.
CoRR, 2022
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
An Analysis of Byzantine-Tolerant Aggregation Mechanisms on Model Poisoning in Federated Learning.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022
A flash(bot) in the pan: measuring maximal extractable value in private pools.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Probabilistic Edge Multicast Routing for the XRP Network.
Proceedings of the IEEE Global Communications Conference, 2022
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Mobile Application Behaviour Anomaly Detection based on API Calls.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2021
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021
Know Your Model (KYM): Increasing Trust in AI and Machine Learning.
CoRR, 2021
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
Proceedings of the 30th USENIX Security Symposium, 2021
Event-Driven Interest Detection for Task-Oriented Mobile Apps.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021
Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS).
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
What database do you choose for heterogeneous security log events analysis?
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
HSM-based Key Management Solution for Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Privacy-Preserving PayString Service.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Self-Sovereign Identity for the Financial Sector: A Case Study of PayString Service.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
BlockPGP: A Blockchain-based Framework for PGP Key Servers.
Int. J. Netw. Comput., 2020
Towards Smart Hybrid Fuzzing for Smart Contracts.
CoRR, 2020
Minority Class Oversampling for Tabular Data with Deep Generative Models.
CoRR, 2020
Blockchain Governance: An Overview and Prediction of Optimal Strategies using Nash Equilibrium.
CoRR, 2020
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Process mining-based approach for investigating malicious login events.
Proceedings of the NOMS 2020, 2020
The rise of eBPF for non-intrusive performance monitoring.
Proceedings of the NOMS 2020, 2020
Towards Privacy Preserving Data Centric Super App.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020
VaVite: Verifiable Information Exchange for Virtual Asset Service Providers.
Proceedings of the Principles, Systems and Applications of IP Telecommunications, 2020
Decentralised Compliant Data Trading for Banks.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
ROS-FM: Fast Monitoring for the Robotic Operating System(ROS).
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Oversampling Tabular Data with Deep Generative Models: Is it worth the effort?
Proceedings of the "I Can't Believe It's Not Better!" at NeurIPS Workshops, 2020
Towards Usable Protection Against Honeypots.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
A Data Science Approach for Detecting Honeypots in Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Opportunities for Blockchain Diffusion in the Agri-food Supply Chain: Case Study in Wine Sector - Abstract.
Proceedings of the 9th International Conference on Information and Communication Technologies in Agriculture, 2020
A Security and Privacy Focused KYC Data Sharing Platform.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
Management Plane for Differential Privacy Preservation Through Smart Contracts.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
A Data Science Approach for Honeypot Detection in Ethereum.
CoRR, 2019
SynGAN: Towards Generating Synthetic Network Attacks using GANs.
CoRR, 2019
PHom-WAE: Persitent Homology for Wasserstein Auto-Encoders.
CoRR, 2019
MQLV: Modified Q-Learning for Vasicek Model.
CoRR, 2019
VecHGrad for solving accurately complex tensor decomposition.
CoRR, 2019
Modeling Smart Contracts Activities: A Tensor Based Approach.
CoRR, 2019
Infer Your Enemies and Know Yourself, Learning in Real-Time Bidding with Partially Observable Opponents.
CoRR, 2019
Improving Missing Data Imputation with Deep Generative Models.
CoRR, 2019
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts.
Proceedings of the 28th USENIX Security Symposium, 2019
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
On importance weighting for electric fraud detection with dataset shifts.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Feasibility of Stellar as a Blockchain-Based Micropayment System.
Proceedings of the Smart Blockchain - Second International Conference, 2019
PHom-GeM: Persistent Homology for Generative Models.
Proceedings of the 6th Swiss Conference on Data Science, 2019
Auto Semi-supervised Outlier Detection for Malicious Authentication Events.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019
MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning.
Proceedings of the Mining Data for Financial Applications - 4th ECML PKDD Workshop, 2019
Auto-Encoding Robot State Against Sensor Spoofing Attacks.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Mobile App to SGX Enclave Secure Channel.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
A Proposal for Security Assessment of Trustzone-M Based Software.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
ROSploit: Cybersecurity Tool for ROS.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Graph-based malicious login events investigation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Blockchain-based micropayment systems: economic impact.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Know Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019
BlockZoom: Large-Scale Blockchain Testbed.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Mint Centrality: A Centrality Measure for the Bitcoin Transaction Graph.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Standardising smart contracts: Automatically inferring ERC standards.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Sluggish Mining: Profiting from the Verifier's Dilemma.
Proceedings of the Financial Cryptography and Data Security, 2019
time series modelling of market price in real-time bidding.
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019
Whispering Botnet Command and Control Instructions.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019
Lightning Network: A Comparative Review of Transaction Fees and Data Analysis.
Proceedings of the Blockchain and Applications - International Congress, 2019
A Tale of Location-Based User Authentication.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019
Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment.
Proceedings of the Advances in Artificial Intelligence, 2019
2018
Generating Multi-Categorical Samples with Generative Adversarial Networks.
CoRR, 2018
On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage.
CoRR, 2018
Recycling Smart Contracts: Compression of the Ethereum Blockchain.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
A blockchain-based PKI management framework.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Blockchain orchestration and experimentation framework: A case study of KYC.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Monitoring the transaction selection policy of Bitcoin mining pools.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Visual emulation for Ethereum's virtual machine.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Towards a management plane for smart contracts: Ethereum case study.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Detecting malicious authentication events trustfully.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Distributed C++-Python embedding for fast predictions and fast prototyping.
Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning, 2018
Visualizing the Learning Progress of Self-Driving Cars.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018
Blockchain-Based, Decentralized Access Control for IPFS.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
IPFS for Reduction of Chain Size in Ethereum.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
HANZO: Collaborative Network Defense for Connected Things.
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018
User-Device Authentication in Mobile Banking Using APHEN for Paratuck2 Tensor Decomposition.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
BlockPGP: A Blockchain-Based Framework for PGP Key Servers.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Impact of Biases in Big Data.
Proceedings of the 26th European Symposium on Artificial Neural Networks, 2018
Non-negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Query-able Kafka: An agile data analytics pipeline for mobile wireless networks.
Proc. VLDB Endow., 2017
The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey.
Int. J. Comput. Intell. Syst., 2017
Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms.
CoRR, 2017
Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
CoRR, 2017
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), 2017
Advanced interest flooding attacks in named-data networking.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Optimising packet forwarding in multi-tenant networks using rule compilation.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Reliable Machine Learning for Networking: Key Issues and Approaches.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
ChainGuard - A firewall for blockchain applications using SDN with OpenFlow.
Proceedings of the 2017 Principles, Systems and Applications of IP Telecommunications, 2017
On non-parametric models for detecting outages in the mobile network.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Finding Suspicious Activities in Financial Transactions and Distributed Ledgers.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Automated Labeling of Unknown Contracts in Ethereum.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Detecting and predicting outages in mobile networks with log data.
Proceedings of the IEEE International Conference on Communications, 2017
Recurrent Dynamical Projection for Time Series-Based Fraud Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017
VSOC - A Virtual Security Operating Center.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study.
Proceedings of the 25th European Symposium on Artificial Neural Networks, 2017
BotGM: Unsupervised graph mining to detect botnets in traffic flows.
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Confirmation Delay Prediction of Transactions in the Bitcoin Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Rule Compilation in Multi-Tenant Networks.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017
Your Moves, Your Device: Establishing Behavior Profiles Using Tensors.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
Improving Real-Time Bidding Using a Constrained Markov Decision Process.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
2016
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empir. Softw. Eng., 2016
Interpreting Finite Automata for Sequential Data.
CoRR, 2016
Neighborhood Features Help Detecting Electricity Theft in Big Data Sets.
CoRR, 2016
The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey.
CoRR, 2016
Research topics related to real-time communications over 5G networks.
Comput. Commun. Rev., 2016
NDN.p4: Programming information-centric data-planes.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Efficient Learning of Communication Profiles from IP Flow Records.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Large-scale detection of non-technical losses in imbalanced data sets.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016
Compiling packet forwarding rules for switch pipelined architecture.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Flexible State-Merging for Learning (P)DFAs in Python.
Proceedings of the 13th International Conference on Grammatical Inference, 2016
Behavioral clustering of non-stationary IP flow record data.
Proceedings of the 12th International Conference on Network and Service Management, 2016
Neighborhood features help detecting non-technical losses in big data sets.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
Behavior profiling for mobile advertising.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
2015
Mitigating Mimicry Attacks Against the Session Initiation Protocol.
IEEE Trans. Netw. Serv. Manag., 2015
A policy-based per-flow mobility management system design.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015
A characterization of short-video and distributed hot-spot activity in Instagram.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015
Exploring IoT Protocols Through the Information-Centric Networking's Lens.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015
2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014
PhishStorm: Detecting Phishing With Streaming Analytics.
IEEE Trans. Netw. Serv. Manag., 2014
Real-time communications: topics for research and methods of collaboration.
Comput. Commun. Rev., 2014
RAMSES: Revealing Android Malware Through String Extraction and Selection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Analysis of large call data records with big data.
Proceedings of the Conference on Principles, 2014
Spatial and temporal analysis of Twitter: a tale of two countries.
Proceedings of the Conference on Principles, 2014
Using opcode-sequences to detect malicious Android applications.
Proceedings of the IEEE International Conference on Communications, 2014
Implications and detection of DoS attacks in OpenFlow-based networks.
Proceedings of the IEEE Global Communications Conference, 2014
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
PhishScore: Hacking phishers' minds.
Proceedings of the 10th International Conference on Network and Service Management, 2014
Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data.
Proceedings of the 10th International Conference on Network and Service Management, 2014
A Big Data Architecture for Large Scale Security Monitoring.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
J. Inf. Secur. Appl., 2013
Classification of Log Files with Limited Labeled Data.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013
Identifying abnormal patterns in cellular communication flows.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013
ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking.
Proceedings of IEEE International Conference on Communications, 2013
Advanced Detection Tool for PDF Threats.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Automated source code extension for debugging of OpenFlow based networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013
Aggregated representations and metrics for scalable flow analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Torinj : Automated Exploitation Malware Targeting Tor Users
CoRR, 2012
Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012
Semantic based DNS forensics.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proactive Discovery of Phishing Related Domain Names.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
A distance-based method to detect anomalous attributes in log files.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
SAFEM: Scalable analysis of flows with entropic measures and SVM.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Detecting Stealthy Backdoors with Association Rule Mining.
Proceedings of the NETWORKING 2012, 2012
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems.
Proceedings of the Dependable Networks and Services, 2012
2011
Heliza: talking dirty to the attackers.
J. Comput. Virol., 2011
BotCloud: Detecting botnets using MapReduce.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Machine Learning Approach for IP-Flow Record Anomaly Detection.
Proceedings of the NETWORKING 2011, 2011
BotTrack: Tracking Botnets Using NetFlow and PageRank.
Proceedings of the NETWORKING 2011, 2011
Measuring anonymity using network coordinate systems.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011
Adaptive and self-configurable honeypots.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
PTF: Passive Temporal Fingerprinting.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Enforcing security with behavioral fingerprinting.
Proceedings of the 7th International Conference on Network and Service Management, 2011
Digging into IP Flow Records with a Visual Kernel Method.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Detection of abnormal behaviour in a surveillance environment using control charts.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance.
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
Advanced fuzzing in the VoIP space.
J. Comput. Virol., 2010
Machine Learning Techniques for Passive Network Inventory.
IEEE Trans. Netw. Serv. Manag., 2010
Digital forensics in VoIP networks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010
A Framework for Monitoring SIP Enterprise Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Improving Fuzz Testing Using Game Theory.
Proceedings of the Fourth International Conference on Network and System Security, 2010
FlowRank: ranking NetFlow records.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Labeled VoIP Data-Set for Intrusion Detection Evaluation.
Proceedings of the Networked Services and Applications, 2010
RiskRank: Security risk ranking for IP flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010
Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010
Monitoring of Spatial-Aggregated IP-Flow Records.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Semi-supervised Fingerprinting of Protocol Messages.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Mining NetFlow Records for Critical Network Activities.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
An Autonomic Testing Framework for IPv6 Configuration Protocols.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
Botnets IRC et P2P pour une supervision à large échelle.
Tech. Sci. Informatiques, 2009
Self Adaptive High Interaction Honeypots Driven by Game Theory.
Proceedings of the Stabilization, 2009
Automated Behavioral Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Malware analysis with graph kernels and support vector machines.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Using game theory to configure P2P SIP.
Proceedings of the Principles, 2009
Defensive configuration with game theory.
Proceedings of the Integrated Network Management, 2009
VoIP Malware: Attack Tool & Attack Scenarios.
Proceedings of IEEE International Conference on Communications, 2009
Audit et monitorage de la sécurité. (Advanced Security Monitoring and Assessment).
, 2009
2008
Malware behaviour analysis.
J. Comput. Virol., 2008
Report on the 1st International Summer School on Network and Service Management.
J. Netw. Syst. Manag., 2008
Self-configurable fault monitoring in ad-hoc networks.
Ad Hoc Networks, 2008
Monitoring SIP Traffic Using Support Vector Machines.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Advanced Network Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Towards malware inspired management frameworks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Abusing SIP Authentication.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Malware: a future framework for device, network and service management.
J. Comput. Virol., 2007
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2007
Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848.
ACM Queue, 2007
Holistic VoIP intrusion detection and prevention system.
Proceedings of the Principles, 2007
KiF: a stateful SIP fuzzer.
Proceedings of the Principles, 2007
VoIP Honeypot Architecture.
Proceedings of the Integrated Network Management, 2007
A model for checking consistency in access control policies for network management.
Proceedings of the Integrated Network Management, 2007
Assessing the security of VoIP Services.
Proceedings of the Integrated Network Management, 2007
Botnets for Scalable Management.
Proceedings of the Managing Virtualization of Networks and Services, 2007
IBGP Confederation Provisioning.
Proceedings of the Inter-Domain Management, 2007
Malware Models for Network and Service Management.
Proceedings of the Inter-Domain Management, 2007
2006
Role-Based Access Control for XML enabled multi-protocol management gateways.
IEEE Trans. Netw. Serv. Manag., 2006
Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990.
ACM Queue, 2006
Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X.
ACM Queue, 2006
Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705.
ACM Queue, 2006
Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962.
ACM Queue, 2006
Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686.
ACM Queue, 2006
XBGP-MAN: an XML management architecture for BGP.
Int. J. Netw. Manag., 2006
Intrusion detection mechanisms for VoIP applications
CoRR, 2006
A VoIP Security Management Architecture.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Probabilistic Management of Ad-Hoc Networks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Fault Monitoring in Ad-Hoc Networks Based on Information Theory.
Proceedings of the NETWORKING 2006, 2006
2005
Self-Organized Monitoring in Ad-Hoc Networks.
Telecommun. Syst., 2005
Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester".
ACM Queue, 2005
Review of "Network Security Architectures by Sean Convery".
ACM Queue, 2005
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks.
J. Netw. Syst. Manag., 2005
Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005
A NetConf Network Management Suite: ENSUITE.
Proceedings of the Operations and Management in IP-Based Networks, 2005
An integrated security framework for XML based management.
Proceedings of the Integrated Network Management, 2005
Management of mobile ad-hoc networks: evaluating the network behavior.
Proceedings of the Integrated Network Management, 2005
Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks.
Proceedings of the Networking, 2005
2004
A Managed Bandwidth Reservation Protocol for Ad Hoc Networks.
Proceedings of the First International Workshop, 2004
An extensible agent toolkit for device management.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Role-Based Access Control for XML Enabled Management Gateways.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004
2003
Management of Wireless Dynamic Infrastructures.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Wireless Terminal Management Architectures.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
A SMIng Based Policy Access Control for SNMPv3.
Proceedings of the High Speed Networks and Multimedia Communications, 2003
Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments.
Proceedings of the Self-Managing Distributed Systems, 2003
2002
Managing Highly Dynamic Services Using Extended Temporal Information Models.
J. Netw. Syst. Manag., 2002
Designing an advanced service management platform.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics: Bridging the Digital Divide, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002
A distributed management platform for integrated multicast monitoring.
Proceedings of the Management Solutions for the New Communications World, 2002
Managing multi-configurable terminals.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002
Latent multicast monitoring.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Policy based management of wireless networks.
Proceedings of the Network Control and Engineering for QoS, 2002
Service management for multi-operator heterogeneous networks.
Proceedings of the Global Telecommunications Conference, 2002
2001
Modèles d'information étendus pour la supervision des réseaux et services dynamiques. (Extended Network Information models for the management of dynamic networks and services).
PhD thesis, 2001
Managing Highly Dynamic Services Using Extended Temporal Network Information Models.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
J<sup>TMN</sup>: a Java-based TMN development and experimentation environment.
IEEE J. Sel. Areas Commun., 2000
A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
A Java based implementation of a network level information model for the ATM/frame relay interconnection.
Proceedings of the Networked Planet: Management Beyond 2000, 2000
Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture.
Proceedings of the Services Management in Intelligent Networks, 2000
1996
Evolutionary/genetic programming in restricted domains.
Neural Parallel Sci. Comput., 1996
1995
And/Or Trees for Knowledge Representation.
Proceedings of the Symbolic and Quantitative Approaches to Reasoning and Uncertainty, 1995