Abdelkader Lahmadi
113
Documents
Publications
|
An Experimental Study of Denial of Service Attacks on a 5G COTS Hardware2023 7th Cyber Security in Networking Conference (CSNet), Oct 2023, Montreal, Canada. pp.12-18, ⟨10.1109/CSNet59123.2023.10339752⟩
Communication dans un congrès
hal-04364309v1
|
|
An Experimental Testbed for 5G Network Security AssessmentNOMS 2023 IEEE/IFIP Network Operations and Management Symposium, May 2023, Miami, United States. pp.1-6, ⟨10.1109/NOMS56928.2023.10154283⟩
Communication dans un congrès
hal-04364306v1
|
Automatically Distributing and Updating In-Network Management Rules for Software Defined NetworksNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-9, ⟨10.1109/NOMS54207.2022.9789807⟩
Communication dans un congrès
hal-03850745v1
|
|
|
Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions2022 18th International Conference on Network and Service Management (CNSM), Oct 2022, Thessaloniki, Greece. pp.367-373, ⟨10.23919/CNSM55787.2022.9964533⟩
Communication dans un congrès
hal-03884367v1
|
|
HSL: a Cyber Security Research Facility for Sensitive Data ExperimentsDISSECT - 7th IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, May 2021, Bordeaux, France
Communication dans un congrès
hal-03245054v1
|
|
Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised RewardPEMWN 2021 - 10th IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Nov 2021, Waterloo, Canada
Communication dans un congrès
hal-03506409v1
|
|
Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT NetworksThe 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob2020), Oct 2020, Thessaloniki (Virtual), Greece
Communication dans un congrès
hal-02980094v1
|
|
Efficient Distribution of Security Policy Filtering Rules in Software Defined NetworksNCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France
Communication dans un congrès
hal-03036350v1
|
|
MitM Attack Detection in BLE Networks using Reconstruction and Classification Machine Learning TechniquesMLCS 2020 - 2nd Workshop on Machine Learning for Cybersecurity, Sep 2020, Ghent, Belgium. pp.1-16
Communication dans un congrès
hal-02948407v1
|
|
Management plane for differential privacy preservation through smart contractsAICCSA 2020 - 17th ACS/IEEE International Conference on Computer Systems and Applications, Nov 2020, Antalya / Virtual, Turkey
Communication dans un congrès
hal-03088227v1
|
|
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms3rd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Jun 2020, Tampere (online), Finland
Communication dans un congrès
hal-02980115v1
|
|
Double Mask: An efficient rule encoding for Software Defined NetworkingICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
Communication dans un congrès
hal-02547097v1
|
|
Automated Factorization of Security Chains in Software-Defined NetworksIFIP/IEEE IM 2019 - IFIP/IEEE International Symposium on Integrated Network Management, Apr 2019, Washington, United States
Communication dans un congrès
hal-02111656v1
|
|
SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network TrafficLCN 2019 - 44th IEEE Conference on Local Computer Networks, Oct 2019, Osnabrück, Germany
Communication dans un congrès
hal-02403616v1
|
|
Demonstration of Synchronization Attacks on Distributed and Cooperative Control in MicrogridsIM 2019 - The 16th IFIP/IEEE Symposium on Integrated Network and Service Management, Apr 2019, Washington DC, United States
Communication dans un congrès
hal-02389307v1
|
|
A Tool Suite for the Automated Synthesis of Security Function ChainsIFIP/IEEE IM 2019 - IFIP/IEEE International Symposium on Integrated Network Management, Apr 2019, Washington, United States
Communication dans un congrès
hal-02111658v1
|
|
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing RatesISI 2018 - IEEE Intelligence and Security Informatics, Nov 2018, Miami, United States
Communication dans un congrès
hal-01947984v1
|
|
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov ModelsNTMS 2018 - 9th IFIP International Conference on New Technologies, Mobility and Security, Feb 2018, Paris, France
Communication dans un congrès
hal-01935664v1
|
|
Generation of SDN policies for protecting Android environments based on automata learningNOMS 2018 - IEEE/IFIP Network Operations and Management Symposium, Apr 2018, Taipei, Taiwan. ⟨10.1109/NOMS.2018.8406153⟩
Communication dans un congrès
hal-01892390v1
|
|
Rule-Based Synthesis of Chains of Security Functions for Software-Defined NetworksAVOCS 2018 - 18th International Workshop on Automated Verification of Critical Systems, Jul 2018, Oxford, United Kingdom
Communication dans un congrès
hal-01892423v1
|
|
On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid SystemsIEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, Oct 2018, Aalborg, Denmark
Communication dans un congrès
hal-01870771v1
|
|
Synaptic: A formal checker for SDN-based security policiesNOMS 2018 - IEEE/IFIP Network Operations and Management Symposium, Apr 2018, Taipei, Taiwan. ⟨10.1109/NOMS.2018.8406122⟩
Communication dans un congrès
hal-01892397v1
|
Towards a management plane for smart contracts: Ethereum case studyNOMS 2018 - IEEE/IFIP Network Operations and Management Symposium, Apr 2018, Taipei, Taiwan. ⟨10.1109/NOMS.2018.8406326⟩
Communication dans un congrès
hal-01935669v1
|
|
|
Automated Verification of Security Chains in Software-Defined Networks with SynapticNetSoft 2017 - IEEE Conference on Network Softwarization, Jul 2017, Bologna, Italy. 9pp., ⟨10.1109/NETSOFT.2017.8004195⟩
Communication dans un congrès
hal-01630806v1
|
|
BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic FlowsCSNet 2017 - 1st Cyber Security in Networking Conference, Oct 2017, Rio de Janeiro, Brazil
Communication dans un congrès
hal-01636480v1
|
|
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment10th international symposium on foundations and practice of security, Oct 2017, Nancy, France. pp.144-159, ⟨10.1007/978-3-319-75650-9_10⟩
Communication dans un congrès
hal-02460272v1
|
|
A Universal Controller to Take Over a Z-Wave NetworkBlack Hat Europe 2017, Dec 2017, London, United Kingdom. pp.1-9
Communication dans un congrès
hal-01684569v1
|
|
Modeling of IP scanning activities with Hidden Markov Models: Darknet case study8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus
Communication dans un congrès
hal-01404127v1
|
|
Optimizing Internet Scanning for Assessing Industrial Systems Exposure7th International Workshop on TRaffic Analysis and Characterization, Sep 2016, Paphos, Cyprus. ⟨10.1109/IWCMC.2016.7577111⟩
Communication dans un congrès
hal-01371674v1
|
|
Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study8th IEEE International Workshop on Information Forensics and Security - WIFS 2016, Dec 2016, Abu Dhabi, United Arab Emirates
Communication dans un congrès
hal-01403950v1
|
Towards Cloud-Based Compositions of Security Functions For Mobile DevicesIFIP/IEEE International Symposium on Integrated Network Management (IM'15), May 2015, Ottawa, Canada. pp.6
Communication dans un congrès
hal-01093041v2
|
|
|
Behavioral and Dynamic Security Functions Chaining For Android Devices11th IFIP/IEEE/In Assoc. with ACM SIGCOMM International Conference on Network and Service Management (CNSM 2015), Nov 2015, Barcelone, France
Communication dans un congrès
hal-01231173v1
|
|
Extracting Markov Chain Models from Protocol Execution Traces for End to End Delay Evaluation in Wireless Sensor NetworksIEEE WFCS 2015, May 2015, Mallorca, Spain. ⟨10.1109/WFCS.2015.7160562⟩
Communication dans un congrès
hal-01241042v1
|
|
Empirical analysis of Android logs using self-organizing mapsICC 2014 : IEEE International Conference on Communications, Jun 2014, Sydney, Australia. pp.1802 - 1807, ⟨10.1109/ICC.2014.6883584⟩
Communication dans un congrès
hal-01092011v1
|
|
Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use CaseDCOSS 2014, May 2014, Marina del Rey, United States. pp.1 - 8, ⟨10.1109/DCOSS.2014.20⟩
Communication dans un congrès
hal-01093736v1
|
|
Outsourcing Mobile Security in the Cloud8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Communication dans un congrès
hal-01092239v1
|
|
Named data aggregation in wireless sensor networksIEEE Network Operations and Management Symposium (NOMS), 2014, May 2014, cracovie, Poland. pp.1 - 8, ⟨10.1109/NOMS.2014.6838364⟩
Communication dans un congrès
hal-01092025v1
|
|
Towards performance analysis of wireless sensor networks using Process Mining TechniquesISCC, Jun 2014, Madère, Portugal. pp.1 - 7, ⟨10.1109/ISCC.2014.6912522⟩
Communication dans un congrès
hal-01093729v1
|
|
CrowdOut: un service de crowdsourcing pour la sécurité routière dans les villes numériquesUbimob 2013, Jun 2013, Nancy, France
Communication dans un congrès
hal-00929838v1
|
|
Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC PerformanceCSCPS - 1st International Workshop on Compressive Sensing in Cyber-Physical Systems - 2013, Oct 2013, Hangzhou, China
Communication dans un congrès
hal-00877466v1
|
|
Vers une détection automatique des applications malveillantes dans les environnements AndroidUbiMob - 9èmes journées francophones Mobilité et Ubiquité - 2013, Jun 2013, Nancy, France
Communication dans un congrès
hal-00879614v1
|
|
On the Gap Between Mathematical Modeling and Measurement Analysis for Performance Evaluation of the 802.15.4 MAC ProtocolRTN - 12th International Workshop on Real-Time Networks - 2013, Jul 2013, Paris, France
Communication dans un congrès
hal-00877452v1
|
|
Efficient Distributed Monitoring in 6LoWPAN NetworksCNSM - 9th International Conference on Network and Service Management - 2013, University of Zürich, Oct 2013, Zurich, Switzerland
Communication dans un congrès
hal-00879550v1
|
|
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN NetworksIEEE workshop WiSARN, in conjunction with IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS2012), May 2012, Hangzhou, China
Communication dans un congrès
hal-00747010v1
|
|
Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless NetworksIEEE workshop WiSARN, in conjunction with IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS2012), IEE, May 2012, Hangzhou, China. pp.317-322
Communication dans un congrès
hal-00745243v1
|
|
Routing based Roles Assignment for Monitoring 6LowPAN NetworksThird International Conference on Communications and Networking (ComNet), Mar 2012, Hammamet, Tunisia. ⟨10.1109/ComNet.2012.6217745⟩
Communication dans un congrès
hal-00747002v1
|
|
Hinky: Defending Against Text-based Message Spam on SmartphonesIEEE International Conference on Communications ICC2011, Jun 2011, Kyoto, Japan
Communication dans un congrès
inria-00594854v1
|
|
Génération automatique de politiques de sécurité pour SecSIPCFIP 2011 - Colloque Francophone sur l Ingénierie des Protocoles, UTC, May 2011, Sainte Maxime, France
Communication dans un congrès
inria-00586832v1
|
|
YANG-Based Configuration Modeling - The SecSIP IPS Case StudyIFIP/IEEE International Symposium on Integrated Network Management, May 2011, Dublin, Ireland
Communication dans un congrès
inria-00595825v1
|
|
VeTo: An Exploit Prevention Language from Known Vulnerabilities in SIP ServicesIEEE/IFIP Network Operations and Management Symposium - NOMS 2010, Apr 2010, Osaka, Japan. pp.216-223, ⟨10.1109/NOMS.2010.5488464⟩
Communication dans un congrès
inria-00544976v1
|
|
Performance of Network and Service Monitoring Frameworks11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, May 2009, Long Island, United States
Communication dans un congrès
inria-00404856v1
|
|
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks LimitsThe Eighth International Conference on Networks - ICN 2009, Mar 2009, Cancun, Mexico
Communication dans un congrès
inria-00404862v1
|
|
SecSip: A Stateful Firewall for SIP-based Networks11th IFIP/IEEE International Symposium on Integrated Network Management - IM 2009, May 2009, Long Island, United States
Communication dans un congrès
inria-00404853v1
|
|
Caractérisation de la variation des délais dans les applications de supervision de réseaux et de services9èmes Journées Doctorales En Informatique et Réseaux - JDIR'08, Jan 2008, Villeneuve d'Ascq, France
Communication dans un congrès
inria-00337569v1
|
Un modèle analytique pour l'évaluation de la supervision de réseaux et de services8ème Colloque Francophone de Gestion de Réseaux et de Services - GRES 2007, Nov 2007, Hammamet, Tunisie
Communication dans un congrès
inria-00190899v1
|
|
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case StudyInter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, Jun 2007, Oslo, Norway. pp.1-12, ⟨10.1007/978-3-540-72986-0_1⟩
Communication dans un congrès
inria-00169007v1
|
|
Modeling and Performance Evaluation of the Network and Service Management PlaneInter-Domain Management - First International Conference on Autonomous Infrastructure, Management and Security, Jun 2007, Oslo, Norway. pp.156-159, ⟨10.1007/978-3-540-72986-0_14⟩
Communication dans un congrès
inria-00169010v1
|
|
|
Evaluation du passage à l'échelle des systèmes de gestion : métriques et modèlesColloque Francophone sur l'Ingénierie des Protocoles - CFIP 2006, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur/Tunisia
Communication dans un congrès
inria-00105550v1
|
On Delays in Management Frameworks: Metrics, Models and Analysis17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management - DSOM 2006, Oct 2006, Dublin/Ireland
Communication dans un congrès
inria-00105535v1
|
|
|
Une approche de benchmarking des pratiques de gestion basées sur un middleware JMX pour les services et les applicationsNouvelles Technologies de la Répartion - NOTERE 2006, LAAS-CNRS et l'ENSICA, Jun 2006, Toulouse/France, pp.145-151
Communication dans un congrès
inria-00090144v1
|
Performances et résistance au facteur d'échelle d'un agent de supervision basé sur JMX : Méthodologie et premiers résultatsColloque GRES 2005 : Gestion de REseaux et de Services, Equipe SIERA / IRIT, Toulouse, France, Feb 2005, Luchon, France, pp.269-282
Communication dans un congrès
inria-00000346v1
|
|
Balade : diffusion multicast sécurisée d'un flux multimédia multi-sources séquentielles dans un environnement ad hocColloque Francophone sur l'Ingénierie des Protocoles - CFIP 2005, Mar 2005, Bordeaux/France, pp.531--546
Communication dans un congrès
inria-00000596v1
|
|
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management - Management of Ambient Networks - DSOM 2005, Universitat Politècnica de Catalunya, Oct 2005, Barcelona/Spain, pp.24--35, ⟨10.1007/11568285⟩
Communication dans un congrès
inria-00000587v1
|
|
|
Extension de l'architecture active AMAM pour le support des services de sécurité multicastColloque Francophone sur la Gestion de Réseaux Et de Services - GRES'2003, Feb 2003, Fortaleza, Ceara, Brésil, 13 p
Communication dans un congrès
inria-00107646v1
|
Evaluation des implémentations IPsec pour IPv6: intéropérabilité et performances2ème Rencontre Francophone sur Sécurité et Architecture Réseaux - SAR'2003, 2003, Nancy, France
Communication dans un congrès
inria-00099798v1
|
|
|
A Secure SSM ArchitectureIEEE International Conference on Networks - ICON'2002, Aug 2002, Singapore, 13 p
Communication dans un congrès
inria-00099434v1
|
S-SSM : Sécurisation d'une architecture SSMColloque Francophone sur l'Ingénierie des Protocoles - CFIP'2002, May 2002, Montréal, Canada, 14 p
Communication dans un congrès
inria-00100800v1
|
|
Characterization and troubleshooting of cloud gaming applications on mobile networksNetwork Traffic Measurement and Analysis Conference (TMA 2022), Jun 2022, Enschede, Netherlands
Poster de conférence
hal-03878114v1
|
|
R2-D2: Filter Rule set Decomposition and Distribution in Software Defined NetworksCNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
Poster de conférence
hal-03036292v1
|
|
Minimizing Range Rules for Packet Filtering Using a Double Mask RepresentationIFIP Networking 2019, May 2019, Varsovie, Poland
Poster de conférence
hal-02393008v1
|
|
A platform for the analysis and visualization of network flow data of android environmentsIFIP/IEEE International Symposium on Integrated Network Management (IM), May 2015, Ottawa, Canada. 2015, ⟨10.1109/INM.2015.7140443⟩
Poster de conférence
hal-01242911v1
|
|
CCNx in Every SensorCCNx Community Meeting - 2012, Sep 2012, INRIA Sophia Antipolis, France
Poster de conférence
hal-00747041v1
|
Practical security analysis of IoT devicesIFIP/IEEE International Symposium on Integrated Network Management, May 2021, Bordeaux, France
Document associé à des manifestations scientifiques
hal-03363567v1
|
|
|
Security Analysis of Internet of Things Devices: Hands-on labAIMS 2018 - 12th International Conference on Autonomous Infrastructure, Management and Security, Jun 2018, Munich, Germany
Document associé à des manifestations scientifiques
hal-01943543v1
|
|
Powering Monitoring Analytics with ELK stack9th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2015), Jun 2015, Ghent, Belgium. 9th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2015), 2015
Document associé à des manifestations scientifiques
hal-01212015v1
|
Automated Orchestration of Security Chains Driven by Process LearningCommunication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, Wiley, 2021, 978-1-119-67550-1. ⟨10.1002/9781119675525.ch12⟩
Chapitre d'ouvrage
hal-03518390v1
|
|
|
ThreatPredict: From Global Social and Technical Big Data to Cyber Threat ForecastAdvanced Technologies for Security Applications, Springer, pp.45-54, 2020, Advanced Technologies for Security Applications. Proceedings of the NATO Science for Peace and Security 'Cluster Workshop on Advanced Technologies, ⟨10.1007/978-94-024-2021-0_5⟩
Chapitre d'ouvrage
hal-03036928v1
|
Computer-implemented method for testing the cybersecurity of a target environmentFrance, Patent n° : WO2022023671A1. 2022
Brevet
hal-03902223v1
|
IPv6 DOTS Signal Option2016
Autre publication scientifique
hal-01406267v1
|
|
|
Extending IP Flow-Based Network Monitoring with Location Information2015
Autre publication scientifique
hal-00879567v3
|
First Year Report on Automated Configuration and Repair (Deliverable D6.1, Flamingo NoE)2013
Autre publication scientifique
hal-00926198v1
|
|
|
Information Elements for device location in IPFIX2012
Autre publication scientifique
hal-00747053v1
|
|
Minimizing Range Rules for Packet Filtering Using Double Mask Representation2019
Pré-publication, Document de travail
hal-02102225v4
|
|
Performances des fonctions et architectures de supervision de réseaux et de servicesRéseaux et télécommunications [cs.NI]. Université Nancy II, 2007. Français. ⟨NNT : ⟩
Thèse
tel-00208049v1
|
|
Automated mapping of CVE vulnerabilties to MITRE ATT&CK FrameworkComputer Science [cs]. 2021
Mémoire d'étudiant
hal-03951196v3
|
Mise en oeuvre d'une couche de communication CCN pour les réseaux de capteurs sans filRéseaux et télécommunications [cs.NI]. 2011
Mémoire d'étudiant
hal-00645949v1
|