Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1M. Barrere.
Vulnerability Management for Safe Configurations in Autonomic Networks and Systems, Université de Lorraine, June 2014.
https://hal.inria.fr/tel-01095206
Articles in International Peer-Reviewed Journals
-
2B. Addis, D. Ardagna, G. Carello, A. Capone.
Energy-aware joint management of networks and Cloud infrastructures, in: Computer Networks and ISDN Systems, September 2014, pp. 75–95, http://www.sciencedirect.com/science/article/pii/S1389128614001649.
https://hal.archives-ouvertes.fr/hal-01088593 -
3B. Addis, G. Carello, A. Capone, L. G. Gianoli, B. Sansò.
Energy management through optimized routing and device powering for greener communication networks, in: IEEE/ACM Transactions on Networking, February 2014, vol. 22, no 1, pp. 313-325, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6490068.
https://hal.archives-ouvertes.fr/hal-01088564 -
4B. Addis, G. Carello, A. Capone, L. G. Gianoli, B. Sansò.
On the energy cost of robustness and resiliency in IP networks, in: Computer Networks and ISDN Systems, December 2014, pp. 239-259, http://www.sciencedirect.com/science/article/pii/S1389128614003594.
https://hal.archives-ouvertes.fr/hal-01088614 -
5R. Fournier, T. Cholez, M. Latapy, I. Chrisment, C. Magnien, O. Festor, I. Daniloff.
Comparing Pedophile Activity in Different P2P Systems, in: Social Sciences, July 2014, vol. 3, no 3, pp. 314-325. [ DOI : 10.3390/socsci3030314 ]
https://hal.inria.fr/hal-01052773 -
6D. Izzo, L. F. Simões, C. H. Yam, F. Biscani, D. Di Lorenzo, B. Addis, A. Cassioli.
GTOC5: Results from the European Space Agency and University of Florence, in: ACTA Futura, 2014, pp. 45-55, http://www.esa.int/gsp/ACT/doc/ACTAFUTURA/AF08/papers/AF08.2014.45.pdf.
https://hal.archives-ouvertes.fr/hal-01088586 -
7J. Li, Y.-Q. Song, X. Liu.
Introduction to special issue on Embedded Computing and Systems, in: Computers and Electrical Engineering, July 2014, vol. 40, no 5, pp. 1564-1566.
https://hal.archives-ouvertes.fr/hal-01093662 -
8S. Marchal, J. François, R. State, T. Engel.
PhishStorm: Detecting Phishing with Streaming Analytics, in: IEEE Transactions on Network and Service Management, December 2014, 14 p. [ DOI : 10.1109/TNSM.2014.2377295 ]
https://hal.inria.fr/hal-01092771
International Conferences with Proceedings
-
9Y. Abid, B. Saadallah, A. Lahmadi, O. Festor.
Named data aggregation in wireless sensor networks, in: IEEE Network Operations and Management Symposium (NOMS), Cracovie, Poland, May 2014, pp. 1 - 8. [ DOI : 10.1109/NOMS.2014.6838364 ]
https://hal.inria.fr/hal-01092025 -
10M. Barrere, R. Badonnel, O. Festor.
A SAT-based Autonomous Strategy for Security Vulnerability Management, in: IEEE/IFIP International Symposium on Network Operations and Management (IEEE/IFIP NOMS'14), Cracovie, Poland, May 2014.
https://hal.inria.fr/hal-01093121 -
11C. Bernardini, T. Silverston, O. Festor.
Socially-Aware Caching Strategy for Content Centric Networking, in: IFIP Networking 2014, Trondheim, Norway, June 2014.
https://hal.inria.fr/hal-01111616 -
12L. Ciarletta, L. Gilpin, Y. Presse, V. Chevrier, V. Galtier.
Co-simulation Solution using AA4MM-FMI applied to Smart Space Heating Models, in: 7th International ICST Conference on Simulation Tools and Techniques, Lisbon, Portugal, March 2014.
https://hal.inria.fr/hal-00966461 -
13L. Ciarletta, A. Guenard, Y. Presse, V. Galtier, Y.-Q. Song, J.-C. Ponsart, S. Aberkane, D. Theilliol.
Simulation and platform tools to develop safe flock of UAVs: a CPS application-driven research, in: ICUAS - International Conference on Unmanned Aircraft Systems, Orlando, Floride, United States, May 2014, pp. 95-102. [ DOI : 10.1109/ICUAS.2014.6842244 ]
https://hal.archives-ouvertes.fr/hal-01059310 -
14F. Despaux, Y.-Q. Song, A. Lahmadi.
Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case, in: DCOSS 2014, Marina del Rey, United States, May 2014, pp. 1 - 8. [ DOI : 10.1109/DCOSS.2014.20 ]
https://hal.inria.fr/hal-01093736 -
15F. Despaux, Y.-Q. Song, A. Lahmadi.
Towards performance analysis of wireless sensor networks using Process Mining Techniques, in: ISCC, Madère, Portugal, June 2014, pp. 1 - 7. [ DOI : 10.1109/ISCC.2014.6912522 ]
https://hal.inria.fr/hal-01093729 -
16E. Finickel, A. Lahmadi, F. Beck, O. Festor.
Empirical analysis of Android logs using self-organizing maps, in: ICC 2014 : IEEE International Conference on Communications, Sydney, Australia, IEEE, June 2014, pp. 1802 - 1807. [ DOI : 10.1109/ICC.2014.6883584 ]
https://hal.inria.fr/hal-01092011 -
17J. François, L. Dolberg, O. Festor, T. Engel.
Network Security through Software Defined Networking: a Survey, in: IIT Real-Time Communications (RTC) Conference - Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, United States, ACM, September 2014.
https://hal.inria.fr/hal-01087248 -
18J. François, O. Festor.
Anomaly Traceback using Software Defined Networking, in: International Workshop on Information Forensics and Security, Atlanta, United States, IEEE, December 2014.
https://hal.inria.fr/hal-01092789 -
19G. Hurel, R. Badonnel, A. Lahmadi, O. Festor.
Outsourcing Mobile Security in the Cloud, in: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security - AIMS, Brno, Czech Republic, Monitoring and Securing Virtualized Networks and Services, Springer, June 2014, vol. 8508, pp. 69 - 73. [ DOI : 10.1007/978-3-662-43862-6_9 ]
https://hal.inria.fr/hal-01092239 -
20S. Marchal, J. François, R. State, T. Engel.
PhishScore: Hacking Phishers' Minds, in: International Conference on Network and Service Management, Rio de Janeiro, Brazil, IEEE, November 2014.
https://hal.inria.fr/hal-01094238 -
22T. Navarrete, L. Ciarletta, V. Chevrier.
A control architecture of complex systems based on multi-agent models, in: Conference on Practical Applications of Agents and Multi-Agent Systems, Salamenque, Spain, June 2014.
https://hal.inria.fr/hal-00966467 -
23T. Navarrete, L. Ciarletta, V. Chevrier.
Multi-agent Simulation based control of complex systems, in: International Conference on Autonomous Agents and Multiagent Systems, PARIS, France, May 2014.
https://hal.inria.fr/hal-00966436 -
24M. S. Seddiki, M. Shahbaz, S. Donovan, S. Grover, M. Park, N. Feamster, Y.-Q. Song.
FlowQoS: QoS for the Rest of Us, in: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN'2014), Chicago, United States, August 2014. [ DOI : 10.1145/2620728.2620766 ]
https://hal.archives-ouvertes.fr/hal-01071445 -
25A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, J. Schönwälder.
Addressing DODAG inconsistency attacks in RPL networks, in: Global Information Infrastructure and Networking Symposium (GIIS), Montreal, QC, Canada, September 2014, pp. 1 - 8. [ DOI : 10.1109/GIIS.2014.6934253 ]
https://hal.inria.fr/hal-01090986 -
26J. P. Timpanaro, I. Chrisment, O. Festor.
Group-Based Characterisation for the I2P Anonymous File-Sharing Environment, in: New Technologies, Mobility and Security - NTMS, Dubai, United Arab Emirates, March 2014.
https://hal.inria.fr/hal-00986228 -
27C. Zhao, W. Zhang, X. Yang, Y. Yang, Y.-Q. Song.
A novel compressive sensing based Data Aggregation Scheme for Wireless Sensor Networks, in: IEEE international conference on Communications (ICC), Sidney, Australia, IEEE, June 2014.
https://hal.archives-ouvertes.fr/hal-01093644
National Conferences with Proceedings
-
28A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment.
Gestion de risques appliquée aux réseaux RPL, in: 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Saint-Germain-Au-Mont-d'Or, France, May 2014.
https://hal.inria.fr/hal-01091008
Conferences without Proceedings
-
29B. Addis, G. Carello, S. Mattia.
Energy-aware survivable network management with shared protection, in: ROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Bordeaux, France, Société française de recherche opérationnelle et d'aide à la décision, February 2014.
https://hal.archives-ouvertes.fr/hal-00946371 -
30C. Bernardini, T. Silverston, O. Festor.
A Pin is Worth a Thousand Words: Characterization of Publications in Pinterest, in: 5th International Workshop on TRaffic Analysis and Characterization, Nicosia, Cyprus, IEEE, August 2014.
https://hal.inria.fr/hal-01111630 -
31A. Grosso, B. Addis, G. Carello, E. Tànfani.
A rolling horizon framework for the OR planning under uncertain surgery duration: deterministic versus robust approach, in: ROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Bordeaux, France, Société française de recherche opérationnelle et d'aide à la décision, February 2014.
https://hal.archives-ouvertes.fr/hal-00946363 -
32G. Hurel, R. Badonnel, A. Lahmadi, O. Festor.
Towards Cloud-Based Compositions of Security Functions For Mobile Devices, in: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), Ottawa, Canada, May 2015, 6 p.
https://hal.inria.fr/hal-01093041
Scientific Books (or Scientific Book chapters)
-
33T. Cholez, G. Doyen, I. Chrisment, O. Festor, R. Khatoun.
Faiblesses de l'identification dans les espaces numériques ouverts de partage de contenus : le cas des réseaux pair-à-pair, in: Enseignement, préservation et diffusion des identités numériques, J.-P. Pinte (editor), Traité des sciences et techniques de l'information, Hermès - Lavoisier, May 2014.
https://hal.inria.fr/hal-01052851 -
34D. Simon, Y.-Q. Song, O. Sename.
Conception conjointe commande-ordonnancement, in: Ordonnancement dans les systèmes temps réel, M. Chetto (editor), ISTE Editions, June 2014, pp. 293-324.
http://hal-lirmm.ccsd.cnrs.fr/lirmm-01017944 -
35D. Simon, Y.-Q. Song, O. Sename.
Control and Scheduling Joint Design, in: Real-time Systems Scheduling, M. Chetto (editor), ISTE Editions, September 2014, vol. 2 "Focuses", pp. 53-96.
http://hal-lirmm.ccsd.cnrs.fr/lirmm-01067487 -
36Y.-Q. Song.
L'ordonnancement dans les réseaux, in: Ordonnancement dans les systèmes temps réel, ISTE Editions, July 2014.
https://hal.archives-ouvertes.fr/hal-01093665 -
37Y.-Q. Song.
Scheduling in Networks, in: Real-time Systems Scheduling 2 : Focuses, Real-time Systems Scheduling 2 : Focuses, ISTE, August 2014, vol. 2.
https://hal.archives-ouvertes.fr/hal-01093667
Other Publications
-
38Y. Abid.
Modélisation et analyse de l'impact des cyber-attaques sur les systèmes SCADA, Université de Lorraine, September 2014.
https://hal.inria.fr/hal-01093741 -
39B. Addis, G. Carello, A. Grosso, E. Tànfani.
A rolling horizon framework for the operating rooms planning under uncertain surgery duration, 2014.
https://hal.archives-ouvertes.fr/hal-00936085 -
40B. Addis, G. Carello, E. Tànfani.
A robust optimization approach for the Advanced Scheduling Problem with uncertain surgery duration in Operating Room Planning - an extended analysis, 2014.
https://hal.archives-ouvertes.fr/hal-00936019 -
41F. Baklouti.
Analysis and visualisation of network data flows of Android applications, ENSI Tunisie, October 2014.
https://hal.inria.fr/hal-01093731 -
42R. Chevalier.
Etude de la cartographie des systèmes SCADA à l'échelle d'Internet, ENS Cachan antenne de Bretagne, Université de Rennes 1, September 2014.
https://hal.inria.fr/hal-01095049 -
43A. Deroche.
Mise en place d’un service de géolocalisation au sein d’une plateforme d’exploitation d’un réseau de capteurs sans fil, TELECOM Nancy, September 2014, 31 p.
https://hal.inria.fr/hal-01097784 -
44A. Deroche, T. Duhal.
Mise en œuvre d'un réseau expérimental de capteurs sans fil et application domotique, Telecom Nancy, May 2014.
https://hal.inria.fr/hal-01059027 -
45T. Duhal.
Mise en œuvre d'un collecte distribuée au moyen du développement d'une plate-forme de gestion pour des réseaux de capteurs sans fil, Telecom Nancy, September 2014.
https://hal.inria.fr/hal-01059038 -
46A. Garnier, E. Nataf.
Développement d'une plate-forme de supervision d'un réseau de capteurs, IUT Informatique, Nancy, June 2014.
https://hal.inria.fr/hal-01059019 -
47A. Goichot.
Étude du filtrage de flux HTTPS, TELECOM Nancy, September 2014, 38 p.
https://hal.inria.fr/hal-01097781 -
48P. O. Kamgueu, E. Nataf, T. Djotio, O. Festor.
Fuzzy-based routing metrics combination for RPL, January 2014, 8 p, Doctoral Consortium Sensornets 2014.
https://hal.inria.fr/hal-01093965 -
49G. Robin.
Détection d'anomalies dans les systèmes SCADA, ENSEM, February 2014.
https://hal.inria.fr/hal-01095048
-
50O. Festor, A. Lahmadi, R. Hofstede, A. Pras.
Information Elements for IPFIX Metering Process Location, July 2013, Internet Draft - IETF.
https://hal.inria.fr/hal-00879567 -
51J. Siebert.
Approche multi-agent pour la multi-modélisation et le couplage de simulations. Application à l'étude des influences entre le fonctionnement des réseaux ambiants et le comportement de leurs utilisateurs, Université Henri Poincaré - Nancy I, September 2011.
http://tel.archives-ouvertes.fr/tel-00642034