CrowdOut: A mobile crowdsourcing service for road safety in digital cities E Aubry, T Silverston, A Lahmadi, O Festor 2014 IEEE international conference on pervasive computing and communication …, 2014 | 81 | 2014 |
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey MS Frikha, SM Gammar, A Lahmadi, L Andrey Computer Communications 178, 98-113, 2021 | 64 | 2021 |
Using information centric networking in internet of things: a survey D Mars, S Mettali Gammar, A Lahmadi, L Azouz Saidane Wireless Personal Communications 105, 87-103, 2019 | 57 | 2019 |
CCNx for Contiki: implementation details B Saadallah, A Lahmadi, O Festor INRIA, 2012 | 51 | 2012 |
Survey of SNMP performance analysis studies L Andrey, O Festor, A Lahmadi, A Pras, J Schönwälder International Journal of Network Management 19 (6), 527-548, 2009 | 39 | 2009 |
BotGM: Unsupervised graph mining to detect botnets in traffic flows S Lagraa, J François, A Lahmadi, M Miner, C Hammerschmidt, R State 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 38 | 2017 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J François 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 36 | 2016 |
Secsip: A stateful firewall for sip-based networks A Lahmadi, O Festor 2009 IFIP/IEEE International Symposium on Integrated Network Management, 172-179, 2009 | 35 | 2009 |
Huma: A multi-layer framework for threat analysis in a heterogeneous log environment J Navarro, V Legrand, S Lagraa, J François, A Lahmadi, G De Santis, ... Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 34 | 2018 |
Powering monitoring analytics with elk stack A Lahmadi, F Beck 9th international conference on autonomous infrastructure, management and …, 2015 | 28 | 2015 |
A testing framework for discovering vulnerabilities in 6lowpan networks A Lahmadi, C Brandin, O Festor 2012 IEEE 8th International Conference on Distributed Computing in Sensor …, 2012 | 27 | 2012 |
MitM attack detection in BLE networks using reconstruction and classification machine learning techniques A Lahmadi, A Duque, N Heraief, J Francq Joint European Conference on Machine Learning and Knowledge Discovery in …, 2020 | 25 | 2020 |
A universal controller to take over a z-wave network L Rouch, J François, F Beck, A Lahmadi Black Hat Europe 2017, 1-9, 2017 | 25 | 2017 |
Automated verification of security chains in software-defined networks with synaptic N Schnepf, R Badonnel, A Lahmadi, S Merz 2017 IEEE Conference on Network Softwarization (NetSoft), 1-9, 2017 | 22 | 2017 |
A platform for the analysis and visualization of network flow data of android environments A Lahmadi, F Beck, E Finickel, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 21 | 2015 |
A framework for automated exploit prevention from known vulnerabilities in voice over IP services A Lahmadi, O Festor IEEE Transactions on Network and Service Management 9 (2), 114-127, 2012 | 20 | 2012 |
Named data aggregation in wireless sensor networks Y Abidy, B Saadallahy, A Lahmadi, O Festor 2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014 | 17 | 2014 |
On the impact of management on the performance of a managed system: A jmx-based management case study A Lahmadi, L Andrey, O Festor Ambient Networks: 16th IFIP/IEEE International Workshop on Distributed …, 2005 | 17 | 2005 |
Towards cloud-based compositions of security functions for mobile devices G Hurel, R Badonnel, A Lahmadi, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 15 | 2015 |
Optimizing internet scanning for assessing industrial systems exposure J François, A Lahmadi, V Giannini, D Cupif, F Beck, B Wallrich 2016 International Wireless Communications and Mobile Computing Conference …, 2016 | 14 | 2016 |