Monitoring the neighbor discovery protocol F Beck, T Cholez, O Festor, I Chrisment 2007 International Multi-Conference on Computing in the Global Information …, 2007 | 61 | 2007 |
Powering monitoring analytics with elk stack A Lahmadi, F Beck 9th international conference on autonomous infrastructure, management and …, 2015 | 27 | 2015 |
A universal controller to take over a z-wave network L Rouch, J François, F Beck, A Lahmadi Black Hat Europe 2017, 1-9, 2017 | 26 | 2017 |
A platform for the analysis and visualization of network flow data of android environments A Lahmadi, F Beck, E Finickel, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 23 | 2015 |
Real-time attack detection on robot cameras: A self-driving car application S Lagraa, M Cailac, S Rivera, F Beck, R State 2019 Third IEEE International Conference on Robotic Computing (IRC), 102-109, 2019 | 17 | 2019 |
Optimizing internet scanning for assessing industrial systems exposure J François, A Lahmadi, V Giannini, D Cupif, F Beck, B Wallrich 2016 International Wireless Communications and Mobile Computing Conference …, 2016 | 14 | 2016 |
Automated and secure IPv6 configuration in enterprise networks F Beck, O Festor, I Chrisment, R Droms 2010 International Conference on Network and Service Management, 64-71, 2010 | 11 | 2010 |
Ipv6 neighbor discovery protocol based os fingerprinting F Beck, O Festor, I Chrisment Inria, 2007 | 10 | 2007 |
Syscall interception in xen hypervisor F Beck, O Festor | 9 | 2009 |
A source discovery protocol for asm applications in ssm networks M Hoerdt, F Beck, D Magoni, JJ Pansiot International Conference on Networking, 324-330, 2004 | 6 | 2004 |
Source discovery protocol in ssm network F Beck, M Hoerdt, JJ Pansiot Internet Engineering Task Force,” Internet Draft, 2003 | 6 | 2003 |
Empirical analysis of Android logs using self-organizing maps E Finickel, A Lahmadi, F Beck, O Festor 2014 IEEE International Conference on Communications (ICC), 1802-1807, 2014 | 5 | 2014 |
HSL: a cyber security research facility for sensitive data experiments F Beck, A Lahmadi, J François 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2021 | 3 | 2021 |
Automated mapping of CVE vulnerabilties to MITRE ATT&CK Framework K Baccar, A Lahmadi, F Beck Tekup, 2021 | 2 | 2021 |
ThreatPredict: from global social and technical big data to cyber threat forecast J François, F Beck, G Mezzour, KM Carley, A Lahmadi, M Ghogho, ... Advanced Technologies for Security Applications: Proceedings of the NATO …, 2020 | 2 | 2020 |
A monitoring approach for safe IPv6 renumbering F Beck, I Chrisment 2006 International Multi-Conference on Computing in the Global Information …, 2006 | 2 | 2006 |
Multi-source communications over SSM networks M Hoerdt, F Beck, JJ Pansiot June 2003. Internet Draft, work in progress, 2003 | 2 | 2003 |
Libemu 1.0 F Beck, M Hoerd Université Louis Pasteur, http://clarinet. u-strasbg. fr/hoerdt/libemu, 0 | 2 | |
NDPMon F Beck http://ndpmon. sourceforge. net/, 0 | 2 | |
Study protocol for a French multicenter randomized controlled trial evaluating the medicoeconomic impact of Surgical vs Endovascular Arteriovenous Access Creation for … C Caradu, E Ducasse, E Ripoche, A Cordon, A Bénard, A Mallios, ... JVS-Vascular Insights 3, 100163, 2025 | 1 | 2025 |