Остановите войну!
for scientists:
default search action
Vania Conan
- > Home > Persons > Vania Conan
Publications
- 2022
- [j29]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Group anomaly detection in mobile app usages: A spatiotemporal convex hull methodology. Comput. Networks 216: 109277 (2022) - 2020
- [j28]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Detection of zero-day attacks: An unsupervised port-based approach. Comput. Networks 180: 107391 (2020) - [j26]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection. IEEE Trans. Netw. Serv. Manag. 17(3): 1701-1714 (2020) - [c82]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
BotFP: FingerPrints Clustering for Bot Detection. NOMS 2020: 1-7 - 2019
- [j24]Filippo Rebecchi, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
DDoS protection with stateful software-defined networking. Int. J. Netw. Manag. 29(1) (2019) - [j21]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Change in Continuity: Chaining Services With an Augmented IGP. IEEE Trans. Netw. Serv. Manag. 16(4): 1332-1344 (2019) - [c80]Agathe Blaise, Mathieu Bouet, Stefano Secci, Vania Conan:
Split and Merge: Detecting Unknown Botnets. IM 2019: 153-161 - [c78]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Finding Next Service Hop with NFV-Routers. INFOCOM Workshops 2019: 1017-1018 - [c75]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Let there be Chaining: How to Augment your IGP to Chain your Services. Networking 2019: 1-9 - [c74]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Distributed Function Chaining with Anycast Routing. SOSR 2019: 91-97 - 2018
- [j20]Mathieu Bouet, Vania Conan:
Mobile Edge Computing Resources Optimization: A Geo-Clustering Approach. IEEE Trans. Netw. Serv. Manag. 15(2): 787-796 (2018) - [c71]Dallal Belabed, Mathieu Bouet, Vania Conan:
Centralized Defense Using Smart Routing Against Link-Flooding Attacks. CSNet 2018: 1-8 - [i18]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Distributed Function Chaining with Anycast Routing. CoRR abs/1810.03355 (2018) - 2017
- [c67]Julien Boite, Pierre-Alexis Nardin, Filippo Rebecchi, Mathieu Bouet, Vania Conan:
Statesec: Stateful monitoring for DDoS protection in software defined networks. NetSoft 2017: 1-9 - [c66]Filippo Rebecchi, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
Traffic monitoring and DDoS detection using stateful SDN. NetSoft 2017: 1-2 - [c64]Mathieu Bouet, Vania Conan:
Geo-partitioning of MEC Resources. MECOMM@SIGCOMM 2017: 43-48 - 2016
- [c62]Kevin Phemius, Jawad Seddar, Mathieu Bouet, Hicham Khalife, Vania Conan:
Bringing SDN to the edge of tactical networks. MILCOM 2016: 1047-1052 - [c61]François Reynaud, François-Xavier Aguessy, Olivier Bettan, Mathieu Bouet, Vania Conan:
Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art. NetSoft 2016: 471-476 - [c60]Mathis Obadia, Jean-Louis Rougier, Luigi Iannone, Vania Conan, Mathieu Bouet:
Revisiting NFV orchestration with routing games. NFV-SDN 2016: 107-113 - [c59]Mathis Obadia, Mathieu Bouet, Vania Conan, Luigi Iannone, Jean-Louis Rougier:
Elastic Network Service Provisioning with VNF Auctioning. ITC 2016: 340-348 - [i17]Mathieu Bouet, Vania Conan, Hicham Khalife, Kevin Phemius, Jawad Seddar:
MUREN: delivering edge services in joint SDN-SDR multi-radio nodes. CoRR abs/1606.00994 (2016) - 2015
- [j14]Mathieu Bouet, Jérémie Leguay, Théo Combe, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25(6): 490-506 (2015) - [c51]Mathieu Bouet, Jérémie Leguay, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. NetSoft 2015: 1-9 - 2013
- [c46]Mathieu Bouet, Julien Boite, Jeremie Leguay, Vania Conan:
Differentiating link state advertizements to optimize control overhead in overlay networks. ICC 2013: 2277-2282 - [c42]Mathieu Bouet, Jeremie Leguay, Vania Conan:
Cost-Based Placement of Virtualized Deep Packet Inspection Functions in SDN. MILCOM 2013: 992-997 - 2012
- [j12]Mathieu Bouet, Gérard Nguengang, Vania Conan, Apostolos Kousaridas, Panagiotis Spapis, Nancy Alonistioti:
Embedding cognition in wireless network management: an experimental perspective. IEEE Commun. Mag. 50(12): 150-160 (2012) - [c34]Julien Boite, Vania Conan, Gérard Nguengang, Mathieu Bouet, Alain Ploix, Dominique Gaïti:
Scaling end-to-end measurements in heterogeneous wireless mesh networks. Q2SWinet 2012: 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint