Olivier Festor
Orcid: 0000-0002-3181-7967Affiliations:
- INRIA, France
According to our database1,
Olivier Festor
authored at least 204 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services.
J. Netw. Syst. Manag., March, 2024
Improving Cloud Gaming Traffic QoS: A Comparison Between Class-Based Queuing Policy and L4S.
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
2023
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions.
J. Netw. Syst. Manag., April, 2023
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions.
IEEE Trans. Netw. Serv. Manag., March, 2023
Proceedings of the NOMS 2023, 2023
Proceedings of the NOMS 2023, 2023
Proceedings of the NOMS 2023, 2023
2022
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge.
Proceedings of the 17th International Conference on Network and Service Management, 2021
Proceedings of the 17th International Conference on Network and Service Management, 2021
2020
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models.
Comput. Secur., 2020
2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019
2018
IEEE Commun. Mag., 2018
Proceedings of the Symposium on SDN Research, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 5th ACM Conference on Information-Centric Networking, 2018
2017
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Security of Networks and Services in an All-Connected World, 2017
2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
2015
J. Netw. Syst. Manag., 2015
A platform for the analysis and visualization of network flow data of android environments.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
Proceedings of the ICISSP 2015, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 11th International Conference on Network and Service Management, 2015
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015
2014
Int. J. Netw. Manag., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the Conference on Principles, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014
2013
The Common Log Format (CLF) for the Session Initiation Protocol (SIP): Framework and Information Model.
RFC, February, 2013
Peer-to-Peer Netw. Appl., 2013
Accurate Online Estimation of Battery Lifetime for Wireless Sensors Network.
Proceedings of the SENSORNETS 2013, 2013
Energy-based Metric for the Routing Protocol in Low-power and Lossy Network.
Proceedings of the SENSORNETS 2013, 2013
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 9th International Conference on Network and Service Management, 2013
Proceedings of the 9th International Conference on Network and Service Management, 2013
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013
2012
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services.
IEEE Trans. Netw. Serv. Manag., 2012
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Towards the assessment of distributed vulnerabilities in autonomic networks and systems.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Third International Conference on Communications and Networking, 2012
Collaborative remediation of configuration vulnerabilities in autonomic networks and systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012
2011
Inf. Secur. Tech. Rep., 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the Managing the Dynamics of Networks and Services, 2011
Proceedings of the Managing the Dynamics of Networks and Services, 2011
2010
IEEE Trans. Netw. Serv. Manag., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Multi-modeling and Co-simulation-Based Mobile Ubiquitous Protocols and Services Development and Assessment.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
Proceedings of the Networked Services and Applications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
Caractérisation des délais dans les applications de supervision de réseaux et de services.
Tech. Sci. Informatiques, 2009
Tech. Sci. Informatiques, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of the Integrated Network Management, 2009
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits.
Proceedings of the Eighth International Conference on Networks, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Management of the Future Internet, 27.01. - 30.01.2009, 2009
Proceedings of the Scalability of Networks and Services, 2009
Proceedings of the Scalability of Networks and Services, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
2007
J. Comput. Virol., 2007
IEEE Trans. Netw. Serv. Manag., 2007
Automated verification of a key management architecture for hierarchical group protocols.
Ann. des Télécommunications, 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Managing Virtualization of Networks and Services, 2007
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study.
Proceedings of the Inter-Domain Management, 2007
Proceedings of the Inter-Domain Management, 2007
Proceedings of the Inter-Domain Management, 2007
2006
IEEE Trans. Netw. Serv. Manag., 2006
Ann. des Télécommunications, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the NETWORKING 2006, 2006
Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Large Scale Management of Distributed Systems, 2006
2005
J. Netw. Syst. Manag., 2005
Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the EUNICE 2005: Networks and Applications Towards a Ubiquitously Connected World, 2005
Proceedings of the Networking, 2005
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study.
Proceedings of the Ambient Networks, 2005
A Hierarchical Architecture for a Distributed Management of P2P Networks and Services.
Proceedings of the Ambient Networks, 2005
2004
IEEE Commun. Mag., 2004
Proceedings of the First International Workshop, 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the NETWORKING 2004, 2004
A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework.
Proceedings of the Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, 2004
Proceedings of the Telecommunications and Networking, 2004
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004
2003
Proceedings of the Management of Multimedia Networks and Services, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A Highly Distributed Dynamic IP Multicast Accounting and Management Framework.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the High Speed Networks and Multimedia Communications, 2003
Proceedings of the Self-Managing Distributed Systems, 2003
2002
J. Netw. Syst. Manag., 2002
J. Netw. Syst. Manag., 2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of the Management Solutions for the New Communications World, 2002
2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
IEEE J. Sel. Areas Commun., 2000
A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
A Java based implementation of a network level information model for the ATM/frame relay interconnection.
Proceedings of the Networked Planet: Management Beyond 2000, 2000
Proceedings of the Networked Planet: Management Beyond 2000, 2000
Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture.
Proceedings of the Services Management in Intelligent Networks, 2000
1999
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999
1998
1997
A practical experience on validating GDMO-based information models with SDL'88 and SDL'92.
Proceedings of the SDL '97 Time for Testing, 1997
RelMan: A GRM-based Relationship Manager.
Proceedings of the Integrated Network Management V, 1997
1996
Proceedings of the 1996 Network Operations and Management Symposium, 1996
1995
MODE: a development environment for managed objects based on formal methods.
Proceedings of the Integrated Network Management IV, 1995
1994
Formalisation du comportement des objets gérés dans le cadre du modele OSI. (Formal description of managed object behaviour in the osi management framework).
PhD thesis, 1994
1993
Formal Description of Managed Object Behavior - A Rule Based Approach.
Proceedings of the Integrated Network Management III, 1993