FireCol: a collaborative protection network for the detection of flooding DDoS attacks J François, I Aib, R Boutaba IEEE/ACM Transactions on networking 20 (6), 1828-1841, 2012 | 231 | 2012 |
PhishStorm: Detecting phishing with streaming analytics S Marchal, J François, R State, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 200 | 2014 |
BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011, 1-14, 2011 | 167 | 2011 |
Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, R State, T Engel 2011 IEEE international workshop on information forensics and security, 1-6, 2011 | 125 | 2011 |
State, R.; Engel, T. PhishStorm: Detecting phishing with streaming analytics S Marchal, J François IEEE Trans. Netw. Serv. Manag 11 (4), 458-471, 2014 | 101 | 2014 |
Machine learning approach for ip-flow record anomaly detection C Wagner, J François, R State, T Engel NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 97 | 2011 |
A multi-level framework to identify HTTPS services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 83 | 2016 |
CCN traffic optimization for IoT J François, T Cholez, T Engel 2013 Fourth international conference on the network of the future (NOF), 1-5, 2013 | 76 | 2013 |
Proactive discovery of phishing related domain names S Marchal, J François, R State, T Engel Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 65 | 2012 |
Anomaly traceback using software defined networking J François, O Festor 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 64 | 2014 |
R. State, and T. Engel,“ C Wagner, J François Machine learning approach for IP-flow record anomaly detection,” in Lecture …, 2011 | 59 | 2011 |
Ndn. p4: Programming information-centric data-planes S Signorello, R State, J François, O Festor 2016 IEEE NetSoft Conference and Workshops (NetSoft), 384-389, 2016 | 47 | 2016 |
BotGM: Unsupervised graph mining to detect botnets in traffic flows S Lagraa, J François, A Lahmadi, M Miner, C Hammerschmidt, R State 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 41 | 2017 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J François 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 38 | 2016 |
PhishScore: Hacking phishers' minds S Marchal, J François, R State, T Engel 10th international conference on network and service management (CNSM) and …, 2014 | 38 | 2014 |
Huma: A multi-layer framework for threat analysis in a heterogeneous log environment J Navarro, V Legrand, S Lagraa, J François, A Lahmadi, G De Santis, ... Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 37 | 2018 |
Knowledge discovery of port scans from darknet S Lagraa, J François 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 37 | 2017 |
Network security through software defined networking: a survey J François, L Dolberg, O Festor, T Engel Proceedings of the Conference on Principles, Systems and Applications of IP …, 2014 | 37 | 2014 |
Transparent and service-agnostic monitoring of encrypted web traffic PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019 | 36 | 2019 |
A holistic monitoring service for fog/edge infrastructures: a foresight study M Abderrahim, M Ouzzif, K Guillouard, J Francois, A Lebre 2017 IEEE 5th International Conference on Future Internet of Things and …, 2017 | 34 | 2017 |