default search action
Guillaume Doyen
- > Home > Persons > Guillaume Doyen
Publications
- 2019
- [j10]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j9]Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 14(9): 2470-2485 (2019) - [c39]Hoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. CNSM 2019: 1-9 - [c38]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. IM 2019: 594-598 - 2018
- [j8]Tan N. Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
A Security Monitoring Plane for Named Data Networking Deployment. IEEE Commun. Mag. 56(11): 88-94 (2018) - [c36]Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. NOMS 2018: 1-9 - [c35]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. NOMS 2018: 1-5 - 2013
- [j3]Thibault Cholez, Isabelle Chrisment, Olivier Festor, Guillaume Doyen:
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Netw. Appl. 6(2): 155-174 (2013) - 2011
- [c13]Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33 - 2005
- [c6]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Hierarchical Architecture for a Distributed Management of P2P Networks and Services. DSOM 2005: 257-268 - [c5]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Performance Management of Peer-to-Peer Distributed Hash Tables. EUNICE 2005: 233-246 - 2004
- [c4]Guillaume Doyen, Olivier Festor, Emmanuel Nataf:
A CIM Extension for Peer-to-Peer Network and Service Management. ICT 2004: 801-810 - [c3]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework. MMNS 2004: 200-212 - 2003
- [c2]Emmanuel Nataf, Olivier Festor, Guillaume Doyen:
An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning. Integrated Network Management 2003: 491-503 - [c1]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Management of Peer-to-Peer Networks Applied to Instant Messaging. MMNS 2003: 449-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint