A Taxonomy of Attacks in RPL-based Internet of Things A Mayzaud, R Badonnel, I Chrisment International journal of network security 18 (3), 459-473, 2016 | 339 | 2016 |
A study of RPL DODAG version attacks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 122 | 2014 |
A distributed monitoring strategy for detecting version number attacks in RPL-based networks A Mayzaud, R Badonnel, I Chrisment IEEE transactions on network and service management 14 (2), 472-486, 2017 | 117 | 2017 |
Group Key Management in MANETs. MS Bouassida, I Chrisment, O Festor Int. J. Netw. Secur. 6 (1), 67-79, 2008 | 106 | 2008 |
A multi-level framework to identify HTTPS services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 78 | 2016 |
Addressing DODAG inconsistency attacks in RPL networks A Sehgal, A Mayzaud, R Badonnel, I Chrisment, J Schönwälder 2014 Global Information Infrastructure and Networking Symposium (GIIS), 1-8, 2014 | 65 | 2014 |
Monitoring the neighbor discovery protocol F Beck, T Cholez, O Festor, I Chrisment 2007 International Multi-Conference on Computing in the Global Information …, 2007 | 62 | 2007 |
Evaluation of sybil attacks protection schemes in kad T Cholez, I Chrisment, O Festor Scalability of Networks and Services: Third International Conference on …, 2009 | 60 | 2009 |
Using the RPL protocol for supporting passive monitoring in the Internet of Things A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 366-374, 2016 | 59 | 2016 |
Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder International Journal of Network Management 25 (5), 320-339, 2015 | 57 | 2015 |
SRSC: SDN-based routing scheme for CCN E Aubry, T Silverston, I Chrisment Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 57 | 2015 |
Efficiently bypassing SNI-based HTTPS filtering WM Shbair, T Cholez, A Goichot, I Chrisment 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 46 | 2015 |
Dynamic group communication security G Chaddoud, I Chrisment, A Schaff Proceedings. Sixth IEEE symposium on computers and communications, 49-56, 2001 | 44 | 2001 |
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture A Mayzaud, R Badonnel, I Chrisment 2016 12th international conference on network and service management (CNSM …, 2016 | 41 | 2016 |
Detection and mitigation of localized attacks in a widely deployed P2P network T Cholez, I Chrisment, O Festor, G Doyen Peer-to-Peer Networking and Applications 6, 155-174, 2013 | 36 | 2013 |
Transparent and service-agnostic monitoring of encrypted web traffic PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019 | 35 | 2019 |
Bittorrent's mainline dht security assessment JP Timpanaro, T Cholez, I Chrisment, O Festor 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 31 | 2011 |
A bird’s eye view on the I2P anonymous file-sharing environment JP Timpanaro, I Chrisment, O Festor Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 30 | 2012 |
Implementation and evaluation of a controller-based forwarding scheme for NDN E Aubry, T Silverston, I Chrismen 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 29 | 2017 |
Efficient group key management protocol in MANETs using the multipoint relaying technique MS Bouassida, I Chrisment, O Festor International Conference on Networking, International Conference on Systems …, 2006 | 29 | 2006 |