FireCol: a collaborative protection network for the detection of flooding DDoS attacks J François, I Aib, R Boutaba IEEE/ACM Transactions on networking 20 (6), 1828-1841, 2012 | 234 | 2012 |
PhishStorm: Detecting phishing with streaming analytics S Marchal, J François, R State, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 207 | 2014 |
BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011, 1-14, 2011 | 165 | 2011 |
Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, R State, T Engel 2011 IEEE international workshop on information forensics and security, 1-6, 2011 | 118 | 2011 |
State, R., Engel, T.: PhishStorm: detecting phishing with streaming analytics S Marchal, J François IEEE Trans. Netw. Serv. Manag 11 (4), 458-471, 2014 | 103 | 2014 |
Machine learning approach for ip-flow record anomaly detection C Wagner, J François, R State, T Engel NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 98 | 2011 |
A multi-level framework to identify HTTPS services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 85 | 2016 |
CCN traffic optimization for IoT J François, T Cholez, T Engel 2013 fourth international conference on the network of the future (NOF), 1-5, 2013 | 74 | 2013 |
Proactive discovery of phishing related domain names S Marchal, J François, R State, T Engel Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 70 | 2012 |
Anomaly traceback using software defined networking J François, O Festor 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 60 | 2014 |
R. State, and T. Engel,“ C Wagner, J François Machine learning approach for IP-flow record anomaly detection,” in Lecture …, 2011 | 59 | 2011 |
Ndn. p4: Programming information-centric data-planes S Signorello, R State, J François, O Festor 2016 IEEE NetSoft Conference and Workshops (NetSoft), 384-389, 2016 | 47 | 2016 |
BotGM: Unsupervised graph mining to detect botnets in traffic flows S Lagraa, J François, A Lahmadi, M Miner, C Hammerschmidt, R State 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 44 | 2017 |
PhishScore: Hacking phishers' minds S Marchal, J François, R State, T Engel 10th international conference on network and service management (CNSM) and …, 2014 | 42 | 2014 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J François 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 39 | 2016 |
Transparent and service-agnostic monitoring of encrypted web traffic PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019 | 38 | 2019 |
DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor 2012 IEEE Network Operations and Management Symposium, 988-993, 2012 | 38 | 2012 |
Huma: A multi-layer framework for threat analysis in a heterogeneous log environment J Navarro, V Legrand, S Lagraa, J François, A Lahmadi, G De Santis, ... Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 37 | 2018 |
Blockchain orchestration and experimentation framework: A case study of KYC WM Shbair, M Steichen, J François IEEE/IFIP Man2Block 2018-IEEE/IFIP Network Operations and Management Symposium, 2018 | 36 | 2018 |
Network security through software defined networking: a survey J François, L Dolberg, O Festor, T Engel Proceedings of the Conference on Principles, Systems and Applications of IP …, 2014 | 36 | 2014 |