Quentin Jacquemart

Orcid: 0000-0001-8745-7481

Affiliations:
  • Laboratoire I3S - UMR 7271 - UNS CRNS, Sophia Antipolis, France


According to our database1, Quentin Jacquemart authored at least 14 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Hy-FiX: Fast In-Place Upgrades of KVM Hypervisors.
IEEE Trans. Cloud Comput., 2022

2019
Inferring the Deployment of Top Domains over Public Clouds using DNS Data.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

Hy-FiX: Fast In-place upgrade of KVM hypervisors.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

2018
Towards Massive Consolidation in Data Centers with SEaMLESS.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2017
SEaMLESS: a SErvice migration cLoud architecture for energy saving and memory releaSing capabilities.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
HEAP: Reliable Assessment of BGP Hijacking Attacks.
IEEE J. Sel. Areas Commun., 2016

Behind IP Prefix Overlaps in the BGP Routing Table.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Container-Based Service Chaining: A Performance Perspective.
Proceedings of the 5th IEEE International Conference on Cloud Networking, 2016

2015
Towards uncovering BGP hijacking attacks. (Déceler les attaques par détournement BGP).
PhD thesis, 2015

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Demystifying the IP Blackspace.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2014
A Longitudinal Study of BGP MOAS Prefixes.
Proceedings of the Traffic Monitoring and Analysis - 6th International Workshop, 2014

Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

2012
Visual analytics for BGP monitoring and prefix hijacking identification.
IEEE Netw., 2012


  Loading...