A Taxonomy of Attacks in RPL-based Internet of Things A Mayzaud, R Badonnel, I Chrisment International journal of network security 18 (3), 459-473, 2016 | 376 | 2016 |
A study of RPL DODAG version attacks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 131 | 2014 |
A distributed monitoring strategy for detecting version number attacks in RPL-based networks A Mayzaud, R Badonnel, I Chrisment IEEE transactions on network and service management 14 (2), 472-486, 2017 | 124 | 2017 |
Group Key Management in MANETs. MS Bouassida, I Chrisment, O Festor Int. J. Netw. Secur. 6 (1), 67-79, 2008 | 106 | 2008 |
A multi-level framework to identify HTTPS services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 85 | 2016 |
Addressing DODAG inconsistency attacks in RPL networks A Sehgal, A Mayzaud, R Badonnel, I Chrisment, J Schönwälder 2014 Global Information Infrastructure and Networking Symposium (GIIS), 1-8, 2014 | 71 | 2014 |
Using the RPL protocol for supporting passive monitoring in the Internet of Things A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 366-374, 2016 | 64 | 2016 |
Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder International Journal of Network Management 25 (5), 320-339, 2015 | 62 | 2015 |
Evaluation of sybil attacks protection schemes in kad T Cholez, I Chrisment, O Festor IFIP International Conference on Autonomous Infrastructure, Management and …, 2009 | 61 | 2009 |
Monitoring the neighbor discovery protocol F Beck, T Cholez, O Festor, I Chrisment 2007 International Multi-Conference on Computing in the Global Information …, 2007 | 61 | 2007 |
SRSC: SDN-based routing scheme for CCN E Aubry, T Silverston, I Chrisment Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 59 | 2015 |
Efficiently bypassing SNI-based HTTPS filtering WM Shbair, T Cholez, A Goichot, I Chrisment 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 52 | 2015 |
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture A Mayzaud, R Badonnel, I Chrisment 2016 12th international conference on network and service management (CNSM …, 2016 | 47 | 2016 |
Dynamic group communication security G Chaddoud, I Chrisment, A Schaff Proceedings. Sixth IEEE symposium on computers and communications, 49-56, 2001 | 45 | 2001 |
Transparent and service-agnostic monitoring of encrypted web traffic PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019 | 38 | 2019 |
Detection and mitigation of localized attacks in a widely deployed P2P network T Cholez, I Chrisment, O Festor, G Doyen Peer-to-Peer Networking and Applications 6, 155-174, 2013 | 37 | 2013 |
A bird’s eye view on the I2P anonymous file-sharing environment JP Timpanaro, I Chrisment, O Festor Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 32 | 2012 |
Improving sni-based https security monitoring WM Shbair, T Cholez, J François, I Chrisment 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 31 | 2016 |
BitTorrent's mainline DHT security assessment JP Timpanaro, T Cholez, I Chrisment, O Festor 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 31 | 2011 |
Implementation and evaluation of a controller-based forwarding scheme for NDN E Aubry, T Silverston, I Chrismen 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 29 | 2017 |