Radu State

Orcid: 0000-0002-4751-9577

According to our database1, Radu State authored at least 283 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NIRWatchdog: Cross-Domain Product Quality Assessment Using Miniaturized Near-Infrared Sensors.
IEEE Internet Things J., April, 2024

A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024

Mitigating federated learning contribution allocation instability through randomized aggregation.
CoRR, 2024

Cross Domain Early Crop Mapping using CropGAN and CNN Classifier.
CoRR, 2024

Cross Domain Early Crop Mapping Using CropSTGAN.
IEEE Access, 2024

To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

A 9-dimensional Analysis of GossipSub over the XRP Ledger Consensus Protocol.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

CTQW-GraphSAGE: Trainabel Continuous-Time Quantum Walk On Graph.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

Cross-Sector Market Regime Forecasting with LLM-Augmented News Analysis.
Proceedings of the 5th ACM International Conference on AI in Finance, 2024

WallStreetFeds: Client-Specific Tokens as Investment Vehicles in Federated Learning.
Proceedings of the 5th ACM International Conference on AI in Finance, 2024

2023
Early Crop Mapping Using Dynamic Ecoregion Clustering: A USA-Wide Study.
Remote. Sens., October, 2023

Topology Analysis of the XRP Ledger.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactions.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay.
Proceedings of the NOMS 2023, 2023

A Decentralized Super App.
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023

Pub/Sub Dissemination on the XRP Ledger.
Proceedings of the IEEE Latin-American Conference on Communications, 2023

NLAC: A Self-Maintained Trust Overlay for the XRP Ledger.
Proceedings of the IEEE Latin-American Conference on Communications, 2023

Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models.
Proceedings of the IEEE International Humanitarian Technology Conference, 2023

A Ripple for Change: Analysis of Frontrunning in the XRP Ledger.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Timely Identification of Victim Addresses in DeFi Attacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Blockly2Hooks: Smart Contracts for Everyone with the XRP Ledger and Google Blockly.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

2022
Deep dive into Interledger: Understanding the Interledger ecosystem.
CoRR, 2022

Topology Analysis of the XRP Network.
CoRR, 2022

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

An Analysis of Byzantine-Tolerant Aggregation Mechanisms on Model Poisoning in Federated Learning.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022

A flash(bot) in the pan: measuring maximal extractable value in private pools.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Probabilistic Edge Multicast Routing for the XRP Network.
Proceedings of the IEEE Global Communications Conference, 2022

An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Mobile Application Behaviour Anomaly Detection based on API Calls.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2021

Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021

Know Your Model (KYM): Increasing Trust in AI and Machine Learning.
CoRR, 2021

Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
Proceedings of the 30th USENIX Security Symposium, 2021

Event-Driven Interest Detection for Task-Oriented Mobile Apps.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS).
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

What database do you choose for heterogeneous security log events analysis?
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

HSM-based Key Management Solution for Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Privacy-Preserving PayString Service.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Self-Sovereign Identity for the Financial Sector: A Case Study of PayString Service.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
BlockPGP: A Blockchain-based Framework for PGP Key Servers.
Int. J. Netw. Comput., 2020

Towards Smart Hybrid Fuzzing for Smart Contracts.
CoRR, 2020

Minority Class Oversampling for Tabular Data with Deep Generative Models.
CoRR, 2020

Blockchain Governance: An Overview and Prediction of Optimal Strategies using Nash Equilibrium.
CoRR, 2020

Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Process mining-based approach for investigating malicious login events.
Proceedings of the NOMS 2020, 2020

The rise of eBPF for non-intrusive performance monitoring.
Proceedings of the NOMS 2020, 2020

Towards Privacy Preserving Data Centric Super App.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

VaVite: Verifiable Information Exchange for Virtual Asset Service Providers.
Proceedings of the Principles, Systems and Applications of IP Telecommunications, 2020

Decentralised Compliant Data Trading for Banks.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

ROS-FM: Fast Monitoring for the Robotic Operating System(ROS).
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Oversampling Tabular Data with Deep Generative Models: Is it worth the effort?
Proceedings of the "I Can't Believe It's Not Better!" at NeurIPS Workshops, 2020

Towards Usable Protection Against Honeypots.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

A Data Science Approach for Detecting Honeypots in Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Opportunities for Blockchain Diffusion in the Agri-food Supply Chain: Case Study in Wine Sector - Abstract.
Proceedings of the 9th International Conference on Information and Communication Technologies in Agriculture, 2020

A Security and Privacy Focused KYC Data Sharing Platform.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Management Plane for Differential Privacy Preservation Through Smart Contracts.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A Data Science Approach for Honeypot Detection in Ethereum.
CoRR, 2019

SynGAN: Towards Generating Synthetic Network Attacks using GANs.
CoRR, 2019

PHom-WAE: Persitent Homology for Wasserstein Auto-Encoders.
CoRR, 2019

MQLV: Modified Q-Learning for Vasicek Model.
CoRR, 2019

VecHGrad for solving accurately complex tensor decomposition.
CoRR, 2019

Modeling Smart Contracts Activities: A Tensor Based Approach.
CoRR, 2019

Infer Your Enemies and Know Yourself, Learning in Real-Time Bidding with Partially Observable Opponents.
CoRR, 2019

Improving Missing Data Imputation with Deep Generative Models.
CoRR, 2019

The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts.
Proceedings of the 28th USENIX Security Symposium, 2019

ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

On importance weighting for electric fraud detection with dataset shifts.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Feasibility of Stellar as a Blockchain-Based Micropayment System.
Proceedings of the Smart Blockchain - Second International Conference, 2019

PHom-GeM: Persistent Homology for Generative Models.
Proceedings of the 6th Swiss Conference on Data Science, 2019

Auto Semi-supervised Outlier Detection for Malicious Authentication Events.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning.
Proceedings of the Mining Data for Financial Applications - 4th ECML PKDD Workshop, 2019

Auto-Encoding Robot State Against Sensor Spoofing Attacks.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Mobile App to SGX Enclave Secure Channel.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

A Proposal for Security Assessment of Trustzone-M Based Software.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

ROSploit: Cybersecurity Tool for ROS.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019

Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019

An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Graph-based malicious login events investigation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Blockchain-based micropayment systems: economic impact.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Know Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

BlockZoom: Large-Scale Blockchain Testbed.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Mint Centrality: A Centrality Measure for the Bitcoin Transaction Graph.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Demo: Blockchain for the Simplification and Automation of KYC Result Sharing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Standardising smart contracts: Automatically inferring ERC standards.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Sluggish Mining: Profiting from the Verifier's Dilemma.
Proceedings of the Financial Cryptography and Data Security, 2019

time series modelling of market price in real-time bidding.
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019

Whispering Botnet Command and Control Instructions.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Lightning Network: A Comparative Review of Transaction Fees and Data Analysis.
Proceedings of the Blockchain and Applications - International Congress, 2019

A Tale of Location-Based User Authentication.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment.
Proceedings of the Advances in Artificial Intelligence, 2019

2018
Generating Multi-Categorical Samples with Generative Adversarial Networks.
CoRR, 2018

On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage.
CoRR, 2018

Recycling Smart Contracts: Compression of the Ethereum Blockchain.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

A blockchain-based PKI management framework.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Blockchain orchestration and experimentation framework: A case study of KYC.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Monitoring the transaction selection policy of Bitcoin mining pools.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Visual emulation for Ethereum's virtual machine.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a management plane for smart contracts: Ethereum case study.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Detecting malicious authentication events trustfully.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Distributed C++-Python embedding for fast predictions and fast prototyping.
Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning, 2018

Visualizing the Learning Progress of Self-Driving Cars.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Blockchain-Based, Decentralized Access Control for IPFS.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

IPFS for Reduction of Chain Size in Ethereum.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

HANZO: Collaborative Network Defense for Connected Things.
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018

User-Device Authentication in Mobile Banking Using APHEN for Paratuck2 Tensor Decomposition.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

BlockPGP: A Blockchain-Based Framework for PGP Key Servers.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Impact of Biases in Big Data.
Proceedings of the 26th European Symposium on Artificial Neural Networks, 2018

Non-negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Query-able Kafka: An agile data analytics pipeline for mobile wireless networks.
Proc. VLDB Endow., 2017

The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey.
Int. J. Comput. Intell. Syst., 2017

Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms.
CoRR, 2017

Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
CoRR, 2017

Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), 2017

Advanced interest flooding attacks in named-data networking.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Optimising packet forwarding in multi-tenant networks using rule compilation.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Reliable Machine Learning for Networking: Key Issues and Approaches.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

ChainGuard - A firewall for blockchain applications using SDN with OpenFlow.
Proceedings of the 2017 Principles, Systems and Applications of IP Telecommunications, 2017

On non-parametric models for detecting outages in the mobile network.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Finding Suspicious Activities in Financial Transactions and Distributed Ledgers.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Automated Labeling of Unknown Contracts in Ethereum.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Detecting and predicting outages in mobile networks with log data.
Proceedings of the IEEE International Conference on Communications, 2017

Recurrent Dynamical Projection for Time Series-Based Fraud Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

VSOC - A Virtual Security Operating Center.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study.
Proceedings of the 25th European Symposium on Artificial Neural Networks, 2017

BotGM: Unsupervised graph mining to detect botnets in traffic flows.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Confirmation Delay Prediction of Transactions in the Bitcoin Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Rule Compilation in Multi-Tenant Networks.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Your Moves, Your Device: Establishing Behavior Profiles Using Tensors.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

Improving Real-Time Bidding Using a Constrained Markov Decision Process.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empir. Softw. Eng., 2016

Interpreting Finite Automata for Sequential Data.
CoRR, 2016

Neighborhood Features Help Detecting Electricity Theft in Big Data Sets.
CoRR, 2016

The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey.
CoRR, 2016

Research topics related to real-time communications over 5G networks.
Comput. Commun. Rev., 2016

NDN.p4: Programming information-centric data-planes.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Efficient Learning of Communication Profiles from IP Flow Records.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Large-scale detection of non-technical losses in imbalanced data sets.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

Compiling packet forwarding rules for switch pipelined architecture.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Flexible State-Merging for Learning (P)DFAs in Python.
Proceedings of the 13th International Conference on Grammatical Inference, 2016

Behavioral clustering of non-stationary IP flow record data.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Neighborhood features help detecting non-technical losses in big data sets.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

Behavior profiling for mobile advertising.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
Mitigating Mimicry Attacks Against the Session Initiation Protocol.
IEEE Trans. Netw. Serv. Manag., 2015

A policy-based per-flow mobility management system design.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015

A characterization of short-video and distributed hot-spot activity in Instagram.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015

Exploring IoT Protocols Through the Information-Centric Networking's Lens.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014

PhishStorm: Detecting Phishing With Streaming Analytics.
IEEE Trans. Netw. Serv. Manag., 2014

Real-time communications: topics for research and methods of collaboration.
Comput. Commun. Rev., 2014

RAMSES: Revealing Android Malware Through String Extraction and Selection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Analysis of large call data records with big data.
Proceedings of the Conference on Principles, 2014

Spatial and temporal analysis of Twitter: a tale of two countries.
Proceedings of the Conference on Principles, 2014

Using opcode-sequences to detect malicious Android applications.
Proceedings of the IEEE International Conference on Communications, 2014

Implications and detection of DoS attacks in OpenFlow-based networks.
Proceedings of the IEEE Global Communications Conference, 2014

A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

PhishScore: Hacking phishers' minds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data.
Proceedings of the 10th International Conference on Network and Service Management, 2014

A Big Data Architecture for Large Scale Security Monitoring.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Editorial.
J. Inf. Secur. Appl., 2013

Classification of Log Files with Limited Labeled Data.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

Identifying abnormal patterns in cellular communication flows.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking.
Proceedings of IEEE International Conference on Communications, 2013

Advanced Detection Tool for PDF Threats.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Automated source code extension for debugging of OpenFlow based networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Aggregated representations and metrics for scalable flow analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Torinj : Automated Exploitation Malware Targeting Tor Users
CoRR, 2012

Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012

Semantic based DNS forensics.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Proactive Discovery of Phishing Related Domain Names.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A distance-based method to detect anomalous attributes in log files.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

SAFEM: Scalable analysis of flows with entropic measures and SVM.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Detecting Stealthy Backdoors with Association Rule Mining.
Proceedings of the NETWORKING 2012, 2012

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Instant Degradation of Anonymity in Low-Latency Anonymisation Systems.
Proceedings of the Dependable Networks and Services, 2012

2011
Heliza: talking dirty to the attackers.
J. Comput. Virol., 2011

BotCloud: Detecting botnets using MapReduce.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

DANAK: Finding the odd!
Proceedings of the 5th International Conference on Network and System Security, 2011

Machine Learning Approach for IP-Flow Record Anomaly Detection.
Proceedings of the NETWORKING 2011, 2011

BotTrack: Tracking Botnets Using NetFlow and PageRank.
Proceedings of the NETWORKING 2011, 2011

Measuring anonymity using network coordinate systems.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

Adaptive and self-configurable honeypots.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

PTF: Passive Temporal Fingerprinting.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Enforcing security with behavioral fingerprinting.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Digging into IP Flow Records with a Visual Kernel Method.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Detection of abnormal behaviour in a surveillance environment using control charts.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011

Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Advanced fuzzing in the VoIP space.
J. Comput. Virol., 2010

Machine Learning Techniques for Passive Network Inventory.
IEEE Trans. Netw. Serv. Manag., 2010

Digital forensics in VoIP networks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

A Framework for Monitoring SIP Enterprise Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Improving Fuzz Testing Using Game Theory.
Proceedings of the Fourth International Conference on Network and System Security, 2010

FlowRank: ranking NetFlow records.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Labeled VoIP Data-Set for Intrusion Detection Evaluation.
Proceedings of the Networked Services and Applications, 2010

RiskRank: Security risk ranking for IP flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Monitoring of Spatial-Aggregated IP-Flow Records.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Semi-supervised Fingerprinting of Protocol Messages.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Mining NetFlow Records for Critical Network Activities.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

An Autonomic Testing Framework for IPv6 Configuration Protocols.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Botnets IRC et P2P pour une supervision à large échelle.
Tech. Sci. Informatiques, 2009

Self Adaptive High Interaction Honeypots Driven by Game Theory.
Proceedings of the Stabilization, 2009

Automated Behavioral Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Malware analysis with graph kernels and support vector machines.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Using game theory to configure P2P SIP.
Proceedings of the Principles, 2009

Defensive configuration with game theory.
Proceedings of the Integrated Network Management, 2009

VoIP Malware: Attack Tool & Attack Scenarios.
Proceedings of IEEE International Conference on Communications, 2009

Audit et monitorage de la sécurité. (Advanced Security Monitoring and Assessment).
, 2009

2008
Malware behaviour analysis.
J. Comput. Virol., 2008

Report on the 1st International Summer School on Network and Service Management.
J. Netw. Syst. Manag., 2008

Self-configurable fault monitoring in ad-hoc networks.
Ad Hoc Networks, 2008

Monitoring SIP Traffic Using Support Vector Machines.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Advanced Network Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Towards malware inspired management frameworks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Abusing SIP Authentication.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Malware: a future framework for device, network and service management.
J. Comput. Virol., 2007

A Probabilistic Approach for Managing Mobile Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2007

Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848.
ACM Queue, 2007

Holistic VoIP intrusion detection and prevention system.
Proceedings of the Principles, 2007

KiF: a stateful SIP fuzzer.
Proceedings of the Principles, 2007

VoIP Honeypot Architecture.
Proceedings of the Integrated Network Management, 2007

A model for checking consistency in access control policies for network management.
Proceedings of the Integrated Network Management, 2007

Assessing the security of VoIP Services.
Proceedings of the Integrated Network Management, 2007

Botnets for Scalable Management.
Proceedings of the Managing Virtualization of Networks and Services, 2007

IBGP Confederation Provisioning.
Proceedings of the Inter-Domain Management, 2007

Malware Models for Network and Service Management.
Proceedings of the Inter-Domain Management, 2007

2006
Role-Based Access Control for XML enabled multi-protocol management gateways.
IEEE Trans. Netw. Serv. Manag., 2006

Bookshelf.
IEEE Softw., 2006

Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990.
ACM Queue, 2006

Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X.
ACM Queue, 2006

Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705.
ACM Queue, 2006

Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962.
ACM Queue, 2006

Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686.
ACM Queue, 2006

XBGP-MAN: an XML management architecture for BGP.
Int. J. Netw. Manag., 2006

Intrusion detection mechanisms for VoIP applications
CoRR, 2006

A VoIP Security Management Architecture.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Probabilistic Management of Ad-Hoc Networks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Fault Monitoring in Ad-Hoc Networks Based on Information Theory.
Proceedings of the NETWORKING 2006, 2006

2005
Self-Organized Monitoring in Ad-Hoc Networks.
Telecommun. Syst., 2005

Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester".
ACM Queue, 2005

Review of "Network Security Architectures by Sean Convery".
ACM Queue, 2005

A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks.
J. Netw. Syst. Manag., 2005

Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005

A NetConf Network Management Suite: ENSUITE.
Proceedings of the Operations and Management in IP-Based Networks, 2005

An integrated security framework for XML based management.
Proceedings of the Integrated Network Management, 2005

Management of mobile ad-hoc networks: evaluating the network behavior.
Proceedings of the Integrated Network Management, 2005

Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks.
Proceedings of the Networking, 2005

2004
A Managed Bandwidth Reservation Protocol for Ad Hoc Networks.
Proceedings of the First International Workshop, 2004

An extensible agent toolkit for device management.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Role-Based Access Control for XML Enabled Management Gateways.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
Management of Wireless Dynamic Infrastructures.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Wireless Terminal Management Architectures.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

A SMIng Based Policy Access Control for SNMPv3.
Proceedings of the High Speed Networks and Multimedia Communications, 2003

Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments.
Proceedings of the Self-Managing Distributed Systems, 2003

2002
Managing Highly Dynamic Services Using Extended Temporal Information Models.
J. Netw. Syst. Manag., 2002

Designing an advanced service management platform.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics: Bridging the Digital Divide, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002

A distributed management platform for integrated multicast monitoring.
Proceedings of the Management Solutions for the New Communications World, 2002

Managing multi-configurable terminals.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

Latent multicast monitoring.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Policy based management of wireless networks.
Proceedings of the Network Control and Engineering for QoS, 2002

Service management for multi-operator heterogeneous networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
Modèles d'information étendus pour la supervision des réseaux et services dynamiques. (Extended Network Information models for the management of dynamic networks and services).
PhD thesis, 2001

Managing Highly Dynamic Services Using Extended Temporal Network Information Models.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
J<sup>TMN</sup>: a Java-based TMN development and experimentation environment.
IEEE J. Sel. Areas Commun., 2000

A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

A Java based implementation of a network level information model for the ATM/frame relay interconnection.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture.
Proceedings of the Services Management in Intelligent Networks, 2000

1996
Evolutionary/genetic programming in restricted domains.
Neural Parallel Sci. Comput., 1996

1995
And/Or Trees for Knowledge Representation.
Proceedings of the Symbolic and Quantitative Approaches to Reasoning and Uncertainty, 1995


  Loading...