关注
Isabelle Chrisment
Isabelle Chrisment
Professor of Computer Science, TELECOM Nancy, Université de Lorraine, France
在 loria.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Taxonomy of Attacks in RPL-based Internet of Things
A Mayzaud, R Badonnel, I Chrisment
International journal of network security 18 (3), 459-473, 2016
3392016
A study of RPL DODAG version attacks
A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
1222014
A distributed monitoring strategy for detecting version number attacks in RPL-based networks
A Mayzaud, R Badonnel, I Chrisment
IEEE transactions on network and service management 14 (2), 472-486, 2017
1172017
Group Key Management in MANETs.
MS Bouassida, I Chrisment, O Festor
Int. J. Netw. Secur. 6 (1), 67-79, 2008
1062008
A multi-level framework to identify HTTPS services
WM Shbair, T Cholez, J Francois, I Chrisment
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016
782016
Addressing DODAG inconsistency attacks in RPL networks
A Sehgal, A Mayzaud, R Badonnel, I Chrisment, J Schönwälder
2014 Global Information Infrastructure and Networking Symposium (GIIS), 1-8, 2014
652014
Monitoring the neighbor discovery protocol
F Beck, T Cholez, O Festor, I Chrisment
2007 International Multi-Conference on Computing in the Global Information …, 2007
622007
Evaluation of sybil attacks protection schemes in kad
T Cholez, I Chrisment, O Festor
Scalability of Networks and Services: Third International Conference on …, 2009
602009
Using the RPL protocol for supporting passive monitoring in the Internet of Things
A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 366-374, 2016
592016
Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks
A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder
International Journal of Network Management 25 (5), 320-339, 2015
572015
SRSC: SDN-based routing scheme for CCN
E Aubry, T Silverston, I Chrisment
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
572015
Efficiently bypassing SNI-based HTTPS filtering
WM Shbair, T Cholez, A Goichot, I Chrisment
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
462015
Dynamic group communication security
G Chaddoud, I Chrisment, A Schaff
Proceedings. Sixth IEEE symposium on computers and communications, 49-56, 2001
442001
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture
A Mayzaud, R Badonnel, I Chrisment
2016 12th international conference on network and service management (CNSM …, 2016
412016
Detection and mitigation of localized attacks in a widely deployed P2P network
T Cholez, I Chrisment, O Festor, G Doyen
Peer-to-Peer Networking and Applications 6, 155-174, 2013
362013
Transparent and service-agnostic monitoring of encrypted web traffic
PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan
IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019
352019
Bittorrent's mainline dht security assessment
JP Timpanaro, T Cholez, I Chrisment, O Festor
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
312011
A bird’s eye view on the I2P anonymous file-sharing environment
JP Timpanaro, I Chrisment, O Festor
Network and System Security: 6th International Conference, NSS 2012 …, 2012
302012
Implementation and evaluation of a controller-based forwarding scheme for NDN
E Aubry, T Silverston, I Chrismen
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
292017
Efficient group key management protocol in MANETs using the multipoint relaying technique
MS Bouassida, I Chrisment, O Festor
International Conference on Networking, International Conference on Systems …, 2006
292006
系统目前无法执行此操作,请稍后再试。
文章 1–20