CrowdOut: A mobile crowdsourcing service for road safety in digital cities E Aubry, T Silverston, A Lahmadi, O Festor 2014 IEEE International Conference on Pervasive Computing and Communication …, 2014 | 56 | 2014 |
CCNx for Contiki: implementation details B Saadallah, A Lahmadi, O Festor INRIA, 2012 | 43 | 2012 |
Survey of SNMP performance analysis studies L Andrey, O Festor, A Lahmadi, A Pras, J Schönwälder International journal of network management 19 (6), 527-548, 2009 | 37 | 2009 |
Secsip: A stateful firewall for sip-based networks A Lahmadi, O Festor 2009 IFIP/IEEE International Symposium on Integrated Network Management, 172-179, 2009 | 35 | 2009 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J Francois 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 25 | 2016 |
A testing framework for discovering vulnerabilities in 6LoWPAN networks A Lahmadi, C Brandin, O Festor 2012 IEEE 8th International Conference on Distributed Computing in Sensor …, 2012 | 25 | 2012 |
Powering monitoring analytics with elk stack A Lahmadi, F Beck 9th International Conference on Autonomous Infrastructure, Management and …, 2015 | 17 | 2015 |
BotGM: Unsupervised graph mining to detect botnets in traffic flows S Lagraa, J François, A Lahmadi, M Miner, C Hammerschmidt, R State 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 15 | 2017 |
A platform for the analysis and visualization of network flow data of android environments A Lahmadi, F Beck, E Finickel, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 15 | 2015 |
On the impact of management on the performance of a managed system: A jmx-based management case study A Lahmadi, L Andrey, O Festor International Workshop on Distributed Systems: Operations and Management, 24-35, 2005 | 15 | 2005 |
Using information centric networking in internet of things: a survey D Mars, SM Gammar, A Lahmadi, LA Saidane Wireless Personal Communications 105 (1), 87-103, 2019 | 14 | 2019 |
A universal controller to take over a z-wave network L Rouch, J François, F Beck, A Lahmadi Black Hat Europe 2017, 1-9, 2017 | 13 | 2017 |
Outsourcing mobile security in the cloud G Hurel, R Badonnel, A Lahmadi, O Festor IFIP International Conference on Autonomous Infrastructure, Management and …, 2014 | 13 | 2014 |
Named data aggregation in wireless sensor networks Y Abidy, B Saadallahy, A Lahmadi, O Festor 2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014 | 13 | 2014 |
Huma: A multi-layer framework for threat analysis in a heterogeneous log environment J Navarro, V Legrand, S Lagraa, J François, A Lahmadi, G De Santis, ... International Symposium on Foundations and Practice of Security, 144-159, 2017 | 12 | 2017 |
Modelling and performance analysis of wireless sensor networks using process mining techniques: Contikimac use case F Despaux, YQ Song, A Lahmadi 2014 IEEE International Conference on Distributed Computing in Sensor …, 2014 | 12 | 2014 |
Veto: An exploit prevention language from known vulnerabilities in sip services A Lahmadi, O Festor 2010 IEEE Network Operations and Management Symposium-NOMS 2010, 216-223, 2010 | 12 | 2010 |
Automated verification of security chains in software-defined networks with Synaptic N Schnepf, R Badonnel, A Lahmadi, S Merz 2017 IEEE Conference on Network Softwarization (NetSoft), 1-9, 2017 | 11 | 2017 |
Behavioral and dynamic security functions chaining for android devices G Hurel, R Badonnel, A Lahmadi, O Festor 2015 11th International Conference on Network and Service Management (CNSM …, 2015 | 11 | 2015 |
Towards cloud-based compositions of security functions for mobile devices G Hurel, R Badonnel, A Lahmadi, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 11 | 2015 |