EN FR
EN FR


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 1M. Barrere.

    Vulnerability Management for Safe Configurations in Autonomic Networks and Systems, Université de Lorraine, June 2014.

    https://hal.inria.fr/tel-01095206

Articles in International Peer-Reviewed Journals

  • 2B. Addis, D. Ardagna, G. Carello, A. Capone.

    Energy-aware joint management of networks and Cloud infrastructures, in: Computer Networks and ISDN Systems, September 2014, pp. 75–95, http://www.sciencedirect.com/science/article/pii/S1389128614001649.

    https://hal.archives-ouvertes.fr/hal-01088593
  • 3B. Addis, G. Carello, A. Capone, L. G. Gianoli, B. Sansò.

    Energy management through optimized routing and device powering for greener communication networks, in: IEEE/ACM Transactions on Networking, February 2014, vol. 22, no 1, pp. 313-325, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6490068.

    https://hal.archives-ouvertes.fr/hal-01088564
  • 4B. Addis, G. Carello, A. Capone, L. G. Gianoli, B. Sansò.

    On the energy cost of robustness and resiliency in IP networks, in: Computer Networks and ISDN Systems, December 2014, pp. 239-259, http://www.sciencedirect.com/science/article/pii/S1389128614003594.

    https://hal.archives-ouvertes.fr/hal-01088614
  • 5R. Fournier, T. Cholez, M. Latapy, I. Chrisment, C. Magnien, O. Festor, I. Daniloff.

    Comparing Pedophile Activity in Different P2P Systems, in: Social Sciences, July 2014, vol. 3, no 3, pp. 314-325. [ DOI : 10.3390/socsci3030314 ]

    https://hal.inria.fr/hal-01052773
  • 6D. Izzo, L. F. Simões, C. H. Yam, F. Biscani, D. Di Lorenzo, B. Addis, A. Cassioli.

    GTOC5: Results from the European Space Agency and University of Florence, in: ACTA Futura, 2014, pp. 45-55, http://www.esa.int/gsp/ACT/doc/ACTAFUTURA/AF08/papers/AF08.2014.45.pdf.

    https://hal.archives-ouvertes.fr/hal-01088586
  • 7J. Li, Y.-Q. Song, X. Liu.

    Introduction to special issue on Embedded Computing and Systems, in: Computers and Electrical Engineering, July 2014, vol. 40, no 5, pp. 1564-1566.

    https://hal.archives-ouvertes.fr/hal-01093662
  • 8S. Marchal, J. François, R. State, T. Engel.

    PhishStorm: Detecting Phishing with Streaming Analytics, in: IEEE Transactions on Network and Service Management, December 2014, 14 p. [ DOI : 10.1109/TNSM.2014.2377295 ]

    https://hal.inria.fr/hal-01092771

International Conferences with Proceedings

  • 9Y. Abid, B. Saadallah, A. Lahmadi, O. Festor.

    Named data aggregation in wireless sensor networks, in: IEEE Network Operations and Management Symposium (NOMS), Cracovie, Poland, May 2014, pp. 1 - 8. [ DOI : 10.1109/NOMS.2014.6838364 ]

    https://hal.inria.fr/hal-01092025
  • 10M. Barrere, R. Badonnel, O. Festor.

    A SAT-based Autonomous Strategy for Security Vulnerability Management, in: IEEE/IFIP International Symposium on Network Operations and Management (IEEE/IFIP NOMS'14), Cracovie, Poland, May 2014.

    https://hal.inria.fr/hal-01093121
  • 11C. Bernardini, T. Silverston, O. Festor.

    Socially-Aware Caching Strategy for Content Centric Networking, in: IFIP Networking 2014, Trondheim, Norway, June 2014.

    https://hal.inria.fr/hal-01111616
  • 12L. Ciarletta, L. Gilpin, Y. Presse, V. Chevrier, V. Galtier.

    Co-simulation Solution using AA4MM-FMI applied to Smart Space Heating Models, in: 7th International ICST Conference on Simulation Tools and Techniques, Lisbon, Portugal, March 2014.

    https://hal.inria.fr/hal-00966461
  • 13L. Ciarletta, A. Guenard, Y. Presse, V. Galtier, Y.-Q. Song, J.-C. Ponsart, S. Aberkane, D. Theilliol.

    Simulation and platform tools to develop safe flock of UAVs: a CPS application-driven research, in: ICUAS - International Conference on Unmanned Aircraft Systems, Orlando, Floride, United States, May 2014, pp. 95-102. [ DOI : 10.1109/ICUAS.2014.6842244 ]

    https://hal.archives-ouvertes.fr/hal-01059310
  • 14F. Despaux, Y.-Q. Song, A. Lahmadi.

    Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case, in: DCOSS 2014, Marina del Rey, United States, May 2014, pp. 1 - 8. [ DOI : 10.1109/DCOSS.2014.20 ]

    https://hal.inria.fr/hal-01093736
  • 15F. Despaux, Y.-Q. Song, A. Lahmadi.

    Towards performance analysis of wireless sensor networks using Process Mining Techniques, in: ISCC, Madère, Portugal, June 2014, pp. 1 - 7. [ DOI : 10.1109/ISCC.2014.6912522 ]

    https://hal.inria.fr/hal-01093729
  • 16E. Finickel, A. Lahmadi, F. Beck, O. Festor.

    Empirical analysis of Android logs using self-organizing maps, in: ICC 2014 : IEEE International Conference on Communications, Sydney, Australia, IEEE, June 2014, pp. 1802 - 1807. [ DOI : 10.1109/ICC.2014.6883584 ]

    https://hal.inria.fr/hal-01092011
  • 17J. François, L. Dolberg, O. Festor, T. Engel.

    Network Security through Software Defined Networking: a Survey, in: IIT Real-Time Communications (RTC) Conference - Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, United States, ACM, September 2014.

    https://hal.inria.fr/hal-01087248
  • 18J. François, O. Festor.

    Anomaly Traceback using Software Defined Networking, in: International Workshop on Information Forensics and Security, Atlanta, United States, IEEE, December 2014.

    https://hal.inria.fr/hal-01092789
  • 19G. Hurel, R. Badonnel, A. Lahmadi, O. Festor.

    Outsourcing Mobile Security in the Cloud, in: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security - AIMS, Brno, Czech Republic, Monitoring and Securing Virtualized Networks and Services, Springer, June 2014, vol. 8508, pp. 69 - 73. [ DOI : 10.1007/978-3-662-43862-6_9 ]

    https://hal.inria.fr/hal-01092239
  • 20S. Marchal, J. François, R. State, T. Engel.

    PhishScore: Hacking Phishers' Minds, in: International Conference on Network and Service Management, Rio de Janeiro, Brazil, IEEE, November 2014.

    https://hal.inria.fr/hal-01094238
  • 22T. Navarrete, L. Ciarletta, V. Chevrier.

    A control architecture of complex systems based on multi-agent models, in: Conference on Practical Applications of Agents and Multi-Agent Systems, Salamenque, Spain, June 2014.

    https://hal.inria.fr/hal-00966467
  • 23T. Navarrete, L. Ciarletta, V. Chevrier.

    Multi-agent Simulation based control of complex systems, in: International Conference on Autonomous Agents and Multiagent Systems, PARIS, France, May 2014.

    https://hal.inria.fr/hal-00966436
  • 24M. S. Seddiki, M. Shahbaz, S. Donovan, S. Grover, M. Park, N. Feamster, Y.-Q. Song.

    FlowQoS: QoS for the Rest of Us, in: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN'2014), Chicago, United States, August 2014. [ DOI : 10.1145/2620728.2620766 ]

    https://hal.archives-ouvertes.fr/hal-01071445
  • 25A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, J. Schönwälder.

    Addressing DODAG inconsistency attacks in RPL networks, in: Global Information Infrastructure and Networking Symposium (GIIS), Montreal, QC, Canada, September 2014, pp. 1 - 8. [ DOI : 10.1109/GIIS.2014.6934253 ]

    https://hal.inria.fr/hal-01090986
  • 26J. P. Timpanaro, I. Chrisment, O. Festor.

    Group-Based Characterisation for the I2P Anonymous File-Sharing Environment, in: New Technologies, Mobility and Security - NTMS, Dubai, United Arab Emirates, March 2014.

    https://hal.inria.fr/hal-00986228
  • 27C. Zhao, W. Zhang, X. Yang, Y. Yang, Y.-Q. Song.

    A novel compressive sensing based Data Aggregation Scheme for Wireless Sensor Networks, in: IEEE international conference on Communications (ICC), Sidney, Australia, IEEE, June 2014.

    https://hal.archives-ouvertes.fr/hal-01093644

National Conferences with Proceedings

  • 28A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment.

    Gestion de risques appliquée aux réseaux RPL, in: 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Saint-Germain-Au-Mont-d'Or, France, May 2014.

    https://hal.inria.fr/hal-01091008

Conferences without Proceedings

  • 29B. Addis, G. Carello, S. Mattia.

    Energy-aware survivable network management with shared protection, in: ROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Bordeaux, France, Société française de recherche opérationnelle et d'aide à la décision, February 2014.

    https://hal.archives-ouvertes.fr/hal-00946371
  • 30C. Bernardini, T. Silverston, O. Festor.

    A Pin is Worth a Thousand Words: Characterization of Publications in Pinterest, in: 5th International Workshop on TRaffic Analysis and Characterization, Nicosia, Cyprus, IEEE, August 2014.

    https://hal.inria.fr/hal-01111630
  • 31A. Grosso, B. Addis, G. Carello, E. Tànfani.

    A rolling horizon framework for the OR planning under uncertain surgery duration: deterministic versus robust approach, in: ROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Bordeaux, France, Société française de recherche opérationnelle et d'aide à la décision, February 2014.

    https://hal.archives-ouvertes.fr/hal-00946363
  • 32G. Hurel, R. Badonnel, A. Lahmadi, O. Festor.

    Towards Cloud-Based Compositions of Security Functions For Mobile Devices, in: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), Ottawa, Canada, May 2015, 6 p.

    https://hal.inria.fr/hal-01093041

Scientific Books (or Scientific Book chapters)

  • 33T. Cholez, G. Doyen, I. Chrisment, O. Festor, R. Khatoun.

    Faiblesses de l'identification dans les espaces numériques ouverts de partage de contenus : le cas des réseaux pair-à-pair, in: Enseignement, préservation et diffusion des identités numériques, J.-P. Pinte (editor), Traité des sciences et techniques de l'information, Hermès - Lavoisier, May 2014.

    https://hal.inria.fr/hal-01052851
  • 34D. Simon, Y.-Q. Song, O. Sename.

    Conception conjointe commande-ordonnancement, in: Ordonnancement dans les systèmes temps réel, M. Chetto (editor), ISTE Editions, June 2014, pp. 293-324.

    http://hal-lirmm.ccsd.cnrs.fr/lirmm-01017944
  • 35D. Simon, Y.-Q. Song, O. Sename.

    Control and Scheduling Joint Design, in: Real-time Systems Scheduling, M. Chetto (editor), ISTE Editions, September 2014, vol. 2 "Focuses", pp. 53-96.

    http://hal-lirmm.ccsd.cnrs.fr/lirmm-01067487
  • 36Y.-Q. Song.

    L'ordonnancement dans les réseaux, in: Ordonnancement dans les systèmes temps réel, ISTE Editions, July 2014.

    https://hal.archives-ouvertes.fr/hal-01093665
  • 37Y.-Q. Song.

    Scheduling in Networks, in: Real-time Systems Scheduling 2 : Focuses, Real-time Systems Scheduling 2 : Focuses, ISTE, August 2014, vol. 2.

    https://hal.archives-ouvertes.fr/hal-01093667

Other Publications

  • 38Y. Abid.

    Modélisation et analyse de l'impact des cyber-attaques sur les systèmes SCADA, Université de Lorraine, September 2014.

    https://hal.inria.fr/hal-01093741
  • 39B. Addis, G. Carello, A. Grosso, E. Tànfani.

    A rolling horizon framework for the operating rooms planning under uncertain surgery duration, 2014.

    https://hal.archives-ouvertes.fr/hal-00936085
  • 40B. Addis, G. Carello, E. Tànfani.

    A robust optimization approach for the Advanced Scheduling Problem with uncertain surgery duration in Operating Room Planning - an extended analysis, 2014.

    https://hal.archives-ouvertes.fr/hal-00936019
  • 41F. Baklouti.

    Analysis and visualisation of network data flows of Android applications, ENSI Tunisie, October 2014.

    https://hal.inria.fr/hal-01093731
  • 42R. Chevalier.

    Etude de la cartographie des systèmes SCADA à l'échelle d'Internet, ENS Cachan antenne de Bretagne, Université de Rennes 1, September 2014.

    https://hal.inria.fr/hal-01095049
  • 43A. Deroche.

    Mise en place d’un service de géolocalisation au sein d’une plateforme d’exploitation d’un réseau de capteurs sans fil, TELECOM Nancy, September 2014, 31 p.

    https://hal.inria.fr/hal-01097784
  • 44A. Deroche, T. Duhal.

    Mise en œuvre d'un réseau expérimental de capteurs sans fil et application domotique, Telecom Nancy, May 2014.

    https://hal.inria.fr/hal-01059027
  • 45T. Duhal.

    Mise en œuvre d'un collecte distribuée au moyen du développement d'une plate-forme de gestion pour des réseaux de capteurs sans fil, Telecom Nancy, September 2014.

    https://hal.inria.fr/hal-01059038
  • 46A. Garnier, E. Nataf.

    Développement d'une plate-forme de supervision d'un réseau de capteurs, IUT Informatique, Nancy, June 2014.

    https://hal.inria.fr/hal-01059019
  • 47A. Goichot.

    Étude du filtrage de flux HTTPS, TELECOM Nancy, September 2014, 38 p.

    https://hal.inria.fr/hal-01097781
  • 48P. O. Kamgueu, E. Nataf, T. Djotio, O. Festor.

    Fuzzy-based routing metrics combination for RPL, January 2014, 8 p, Doctoral Consortium Sensornets 2014.

    https://hal.inria.fr/hal-01093965
  • 49G. Robin.

    Détection d'anomalies dans les systèmes SCADA, ENSEM, February 2014.

    https://hal.inria.fr/hal-01095048
References in notes
  • 50O. Festor, A. Lahmadi, R. Hofstede, A. Pras.

    Information Elements for IPFIX Metering Process Location, July 2013, Internet Draft - IETF.

    https://hal.inria.fr/hal-00879567
  • 51J. Siebert.

    Approche multi-agent pour la multi-modélisation et le couplage de simulations. Application à l'étude des influences entre le fonctionnement des réseaux ambiants et le comportement de leurs utilisateurs, Université Henri Poincaré - Nancy I, September 2011.

    http://tel.archives-ouvertes.fr/tel-00642034