


default search action
Radu State
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j43]Farouk Damoun
, Hamida Seba, Jean Hilger, Radu State
:
Graph-level heterogeneous information network embeddings for cardholder transaction analysis. Neural Comput. Appl. 37(12): 7751-7765 (2025) - [i42]Yewei Song, Lujun Li, Cedric Lothritz, Saad Ezzini, Lama Sleem, Niccolo Gentile, Radu State, Tegawendé F. Bissyandé, Jacques Klein:
Is LLM the Silver Bullet to Low-Resource Languages Machine Translation? CoRR abs/2503.24102 (2025) - 2024
- [j42]Yiqun Wang
, Hui Huang
, Radu State
:
Cross Domain Early Crop Mapping Using CropSTGAN. IEEE Access 12: 130800-130815 (2024) - [j41]Nino Adamashvili, Caterina Tricase, Otar Zumburidze, Radu State, Roberto Tonelli:
Editorial "Blockchain Technology - A Breakthrough Innovation for Modern Industries". Comput. 13(12): 330 (2024) - [j40]Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. Int. J. Inf. Sec. 23(1): 119-140 (2024) - [j39]Hui Huang
, Yangjie Xu, Jin Zhang
, Radu State:
NIRWatchdog: Cross-Domain Product Quality Assessment Using Miniaturized Near-Infrared Sensors. IEEE Internet Things J. 11(7): 12071-12086 (2024) - [c221]Farouk Damoun
, Hamida Seba
, Radu State
:
Federated Learning-Based Tokenizer for Domain-Specific Language Models in Finance. ASONAM (2) 2024: 3-20 - [c220]Pavel Pantiukhov, Dmitrii Koriakov, Antonio Ken Iannillo, Radu State:
Whistleblowers' Protection with XRP Ledger. BCCA 2024: 586-591 - [c219]Jeovane Honório Alves
, Radu State, Cinthia Obladen de Almendra Freitas, Jean Paul Barddal:
LongKey: Keyphrase Extraction for Long Documents. IEEE Big Data 2024: 1706-1715 - [c218]Flaviene Scheidt de Cristo, Jean-Philippe Eisenbarth
, Jorge Augusto Meira, Radu State:
Causal AI for XRPL/GossipSub network configuration. CNSM 2024: 1-5 - [c217]Timur Mudarisov
, Radu Valentin State
, Zsófia Kräussl
, Alexander Yakubov
, Tatiana Petrova
:
Cross-Sector Market Regime Forecasting with LLM-Augmented News Analysis. ICAIF 2024: 461-468 - [c216]Arno Geimer
, Beltran Fiz
, Radu State
:
WallStreetFeds: Client-Specific Tokens as Investment Vehicles in Federated Learning. ICAIF 2024: 839-846 - [c215]Yangjie Xu, Hui Huang, Radu State:
CTQW-GraphSAGE: Trainabel Continuous-Time Quantum Walk On Graph. ICANN (5) 2024: 79-92 - [c214]Flaviene Scheidt de Cristo, Jorge Augusto Meira, Jean-Philippe Eisenbarth
, Radu State:
A 9-dimensional Analysis of GossipSub over the XRP Ledger Consensus Protocol. NOMS 2024: 1-7 - [c213]Lucian Trestioreanu, Flaviene Scheidt de Cristo, Wazen M. Shbair, Jérôme François, Damien Magoni, Radu State:
To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger. NOMS 2024: 1-7 - [c212]Farouk Damoun
, Hamida Seba
, Radu State
:
Privacy-Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions. WISE (5) 2024: 286-301 - [i41]Yiqun Wang, Hui Huang, Radu State:
Cross Domain Early Crop Mapping using CropGAN and CNN Classifier. CoRR abs/2401.07398 (2024) - [i40]Arno Geimer, Beltran Fiz, Radu State:
Mitigating federated learning contribution allocation instability through randomized aggregation. CoRR abs/2405.08044 (2024) - [i39]Jeovane Honório Alves, Radu State, Cinthia Obladen de Almendra Freitas, Jean Paul Barddal:
LongKey: Keyphrase Extraction for Long Documents. CoRR abs/2411.17863 (2024) - 2023
- [j38]Yiqun Wang
, Hui Huang, Radu State:
Early Crop Mapping Using Dynamic Ecoregion Clustering: A USA-Wide Study. Remote. Sens. 15(20): 4962 (2023) - [c211]Lucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo
, Radu State:
Blockly2Hooks: Smart Contracts for Everyone with the XRP Ledger and Google Blockly. DAPPS 2023: 145-150 - [c210]Bahareh Parhizkari
, Antonio Ken Iannillo
, Christof Ferreira Torres
, Sebastian Banescu
, Joseph Jiaqi Xu
, Radu State
:
Timely Identification of Victim Addresses in DeFi Attacks. ESORICS Workshops (1) 2023: 394-410 - [c209]Vytautas Tumas, Beltran Borja Fiz Pontiveros, Christof Ferreira Torres
, Radu State:
A Ripple for Change: Analysis of Frontrunning in the XRP Ledger. ICBC 2023: 1-9 - [c208]Loris Bergeron, Jérôme François, Radu State, Jean Hilger:
ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models. IHTC 2023: 1-6 - [c207]Vytautas Tumas, Sean Rivera, Damien Magoni, Radu State:
Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks. ISCC 2023: 443-449 - [c206]Flaviene Scheidt de Cristo, Arno Geimer, Radu State:
NLAC: A Self-Maintained Trust Overlay for the XRP Ledger. LATINCOM 2023: 1-6 - [c205]Flaviene Scheidt de Cristo, Wazen M. Shbair
, Lucian Trestioreanu, Radu State:
Pub/Sub Dissemination on the XRP Ledger. LATINCOM 2023: 1-6 - [c204]Fernando Kaway Carvalho Ota
, Cristina Godoy Bernardo de Oliveira, Rafael Meira Silva, Radu State:
A Decentralized Super App. MDM 2023: 81-88 - [c203]Lucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo
, Radu State:
XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay. NOMS 2023: 1-5 - [c202]Mary Roszel, Beltran Fiz, Radu State:
FLAIRS: Federated Learning AI Regulatory Sandbox. PKDD/ECML Workshops (1) 2023: 439-449 - [c201]Farouk Damoun
, Hamida Seba
, Jean Hilger
, Radu State
:
G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactions. SAC 2023: 528-535 - [c200]Vytautas Tumas
, Sean Rivera
, Damien Magoni
, Radu State
:
Topology Analysis of the XRP Ledger. SAC 2023: 1277-1284 - [i38]Lucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo
, Radu State:
XRP-NDN Overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay. CoRR abs/2301.10209 (2023) - 2022
- [c199]Fernando Kaway Carvalho Ota
, Farouk Damoun
, Sofiane Lagraa, Patricia Becerra-Sánchez, Christophe Atten, Jean Hilger, Radu State:
Mobile Application Behaviour Anomaly Detection based on API Calls. IEEE Big Data 2022: 1892-1899 - [c198]Antonio Ken Iannillo, Sean Rivera, Darius Suciu, Radu Sion
, Radu State:
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices. CPSS@AsiaCCS 2022: 85-94 - [c197]Vytautas Tumas, Sean Rivera, Damien Magoni
, Radu State:
Probabilistic Edge Multicast Routing for the XRP Network. GLOBECOM 2022: 5129-5134 - [c196]Ben Weintraub, Christof Ferreira Torres
, Cristina Nita-Rotaru, Radu State:
A flash(bot) in the pan: measuring maximal extractable value in private pools. IMC 2022: 458-471 - [c195]Mary Roszel, Robert Norvill, Radu State:
An Analysis of Byzantine-Tolerant Aggregation Mechanisms on Model Poisoning in Federated Learning. MDAI 2022: 143-155 - [c194]Christof Ferreira Torres
, Hugo Jonker, Radu State:
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. RAID 2022: 115-128 - [i37]Vytautas Tumas, Sean Rivera, Damien Magoni, Radu State:
Topology Analysis of the XRP Network. CoRR abs/2205.00869 (2022) - [i36]Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, Radu State:
A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools. CoRR abs/2206.04185 (2022) - [i35]Lucian Trestioreanu, Cyril Cassagnes, Radu State:
Deep dive into Interledger: Understanding the Interledger ecosystem. CoRR abs/2206.10446 (2022) - 2021
- [c193]Flaviene Scheidt de Cristo
, Wazen M. Shbair, Lucian Trestioreanu, Radu State, Aanchal Malhotra:
Self-Sovereign Identity for the Financial Sector: A Case Study of PayString Service. Blockchain 2021: 213-220 - [c192]Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CNS 2021: 92-100 - [c191]Christof Ferreira Torres
, Antonio Ken Iannillo, Arthur Gervais, Radu State:
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. EuroS&P 2021: 103-119 - [c190]Christof Ferreira Torres
, Antonio Ken Iannillo
, Arthur Gervais
, Radu State
:
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. Financial Cryptography (1) 2021: 33-52 - [c189]Flaviene Scheidt de Cristo
, Wazen M. Shbair
, Lucian Trestioreanu
, Aanchal Malhotra, Radu State:
Privacy-Preserving PayString Service. IEEE ICBC 2021: 1-3 - [c188]Wazen M. Shbair
, Eugene Gavrilov, Radu State:
HSM-based Key Management Solution for Ethereum Blockchain. IEEE ICBC 2021: 1-3 - [c187]Sean Rivera, Radu State:
Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS). IM 2021: 754-759 - [c186]Sofiane Lagraa, Radu State:
What database do you choose for heterogeneous security log events analysis? IM 2021: 812-817 - [c185]Fernando Kaway Carvalho Ota
, Farouk Damoun
, Sofiane Lagraa
, Patricia Becerra-Sánchez
, Christophe Atten
, Jean Hilger
, Radu State
:
Event-Driven Interest Detection for Task-Oriented Mobile Apps. MobiQuitous 2021: 582-598 - [c184]Christof Ferreira Torres, Ramiro Camino, Radu State:
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. USENIX Security Symposium 2021: 1343-1359 - [i34]Christof Ferreira Torres
, Antonio Ken Iannillo, Arthur Gervais, Radu State:
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. CoRR abs/2101.06204 (2021) - [i33]Christof Ferreira Torres
, Ramiro Camino, Radu State:
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. CoRR abs/2102.03347 (2021) - [i32]Mary Roszel, Robert Norvill, Jean Hilger, Radu State:
Know Your Model (KYM): Increasing Trust in AI and Machine Learning. CoRR abs/2106.11036 (2021) - [i31]Christof Ferreira Torres, Hugo Jonker, Radu State:
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching. CoRR abs/2108.10071 (2021) - [i30]Lucian Trestioreanu
, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CoRR abs/2110.09207 (2021) - [i29]Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State:
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. IACR Cryptol. ePrint Arch. 2021: 284 (2021) - 2020
- [j37]Alexander Yakubov, Wazen M. Shbair, Nida Khan, Radu State, Christophe Medinger, Jean Hilger:
BlockPGP: A Blockchain-based Framework for PGP Key Servers. Int. J. Netw. Comput. 10(1): 1-24 (2020) - [c183]Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo
, Radu State:
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. ARES 2020: 78:1-78:10 - [c182]Nida Khan, Abdelkader Lahmadi, Zsófia Kräussl
, Radu State:
Management Plane for Differential Privacy Preservation Through Smart Contracts. AICCSA 2020: 1-8 - [c181]Robert Norvill, Cyril Cassanges, Wazen M. Shbair
, Jean Hilger, Andrea J. Cullen, Radu State:
A Security and Privacy Focused KYC Data Sharing Platform. BSCI 2020: 151-160 - [c180]Nino Adamashvili, Radu State, Cyril Cassagnes, Ruggiero Sardano, Nicola Faccilongo, Francesco Contò:
Opportunities for Blockchain Diffusion in the Agri-food Supply Chain: Case Study in Wine Sector - Abstract. HAICTA 2020: 68-69 - [c179]Ramiro Camino
, Christof Ferreira Torres
, Mathis Baden, Radu State:
A Data Science Approach for Detecting Honeypots in Ethereum. IEEE ICBC 2020: 1-9 - [c178]Christof Ferreira Torres
, Mathis Baden, Radu State:
Towards Usable Protection Against Honeypots. IEEE ICBC 2020: 1-2 - [c177]Ramiro Daniel Camino, Radu State, Christian A. Hammerschmidt:
Oversampling Tabular Data with Deep Generative Models: Is it worth the effort? ICBINB@NeurIPS 2020: 148-157 - [c176]Ekaterina Khramtsova, Christian A. Hammerschmidt, Sofiane Lagraa, Radu State
:
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection. ICDCS 2020: 1316-1321 - [c175]Sean Rivera, Antonio Ken Iannillo, Sofiane Lagraa, Clément Joly, Radu State:
ROS-FM: Fast Monitoring for the Robotic Operating System(ROS). ICECCS 2020: 187-196 - [c174]Robert Norvill, Jean Hilger, Irfan Awan, Andrea J. Cullen, Radu State:
Decentralised Compliant Data Trading for Banks. IECC 2020: 121-128 - [c173]Vytautas Tumas, Robert Norvill, Damien Magoni
, Radu State:
VaVite: Verifiable Information Exchange for Virtual Asset Service Providers. IPTComm 2020: 1-8 - [c172]Fernando Kaway Carvalho Ota
, Jorge Augusto Meira
, Raphaël Frank, Radu State:
Towards Privacy Preserving Data Centric Super App. MedComNet 2020: 1-4 - [c171]Cyril Renaud Cassagnes, Lucian Trestioreanu
, Clément Joly, Radu State:
The rise of eBPF for non-intrusive performance monitoring. NOMS 2020: 1-7 - [c170]Sofiane Lagraa, Radu State:
Process mining-based approach for investigating malicious login events. NOMS 2020: 1-5 - [c169]Faouzi Amrouche, Sofiane Lagraa, Raphaël Frank, Radu State:
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application. VTC Spring 2020: 1-5 - [i28]Nida Khan, Tabrez Ahmad, Anass Patel, Radu State:
Blockchain Governance: An Overview and Prediction of Optimal Strategies using Nash Equilibrium. CoRR abs/2003.09241 (2020) - [i27]Ramiro Camino, Christian A. Hammerschmidt, Radu State:
Minority Class Oversampling for Tabular Data with Deep Generative Models. CoRR abs/2005.03773 (2020) - [i26]Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State:
Towards Smart Hybrid Fuzzing for Smart Contracts. CoRR abs/2005.12156 (2020)
2010 – 2019
- 2019
- [c168]Jérémy Charlier, Radu State, Jean Hilger:
Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment. Canadian AI 2019: 556-562 - [c167]Eric Falk, Vendel Toth, Alexandre Knaff, Radu State:
A Tale of Location-Based User Authentication. BigComp 2019: 1-4 - [c166]Nida Khan
, Radu State
:
Lightning Network: A Comparative Review of Transaction Fees and Data Analysis. BLOCKCHAIN 2019: 11-18 - [c165]Mathis Baden, Christof Ferreira Torres
, Beltran Borja Fiz Pontiveros
, Radu State:
Whispering Botnet Command and Control Instructions. CVCBT 2019: 77-81 - [c164]Manxing Du, Christian A. Hammerschmidt, Georgios Varisteas, Radu State, Mats Brorsson, Zhu Zhang:
time series modelling of market price in real-time bidding. ESANN 2019 - [c163]Beltran Borja Fiz Pontiveros
, Christof Ferreira Torres
, Radu State:
Sluggish Mining: Profiting from the Verifier's Dilemma. Financial Cryptography Workshops 2019: 67-81 - [c162]Wazen M. Shbair
, Mathis Steichen, Jérôme François
, Radu State:
BlockZoom: Large-Scale Blockchain Testbed. IEEE ICBC 2019: 5-6 - [c161]Robert Norvill, Mathis Steichen, Wazen M. Shbair
, Radu State:
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing. IEEE ICBC 2019: 9-10 - [c160]Beltran Borja Fiz Pontiveros
, Mathis Steichen, Radu State:
Mint Centrality: A Centrality Measure for the Bitcoin Transaction Graph. IEEE ICBC 2019: 159-162 - [c159]Robert Norvill, Beltran Fiz
, Radu State, Andrea J. Cullen:
Standardising smart contracts: Automatically inferring ERC standards. IEEE ICBC 2019: 192-195 - [c158]Manxing Du, Alexander I. Cowen-Rivers, Ying Wen, Phu Sakulwongtana, Jun Wang, Mats Brorsson, Radu State:
Know Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation. ICDM Workshops 2019: 973-981 - [c157]Nida Khan, Tabrez Ahmad, Radu State:
Blockchain-based micropayment systems: economic impact. IDEAS 2019: 45:1-45:3 - [c156]Georgios Kaiafas, Christian A. Hammerschmidt, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles. IM 2019: 37-42 - [c155]Faouzi Amrouche, Sofiane Lagraa, Georgios Kaiafas, Radu State:
Graph-based malicious login events investigation. IM 2019: 63-66 - [c154]Sofiane Lagraa, Maxime Cailac, Sean Rivera, Frédéric Beck, Radu State:
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application. IRC 2019: 102-109 - [c153]Sean Rivera, Sofiane Lagraa, Radu State:
ROSploit: Cybersecurity Tool for ROS. IRC 2019: 415-416 - [c152]Antonio Ken Iannillo
, Radu State:
A Proposal for Security Assessment of Trustzone-M Based Software. ISSRE Workshops 2019: 126-127 - [c151]Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo
, Radu State:
Auto-Encoding Robot State Against Sensor Spoofing Attacks. ISSRE Workshops 2019: 252-257 - [c150]Fernando Kaway Carvalho Ota
, Jorge Augusto Meira
, Cyril Renaud Cassagnes, Radu State:
Mobile App to SGX Enclave Secure Channel. ISSRE Workshops 2019: 258-263 - [c149]Jérémy Charlier, Gaston Ormazabal, Radu State, Jean Hilger:
MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning. MIDAS@PKDD 2019: 1-15 - [c148]Georgios Kaiafas
, Christian A. Hammerschmidt
, Sofiane Lagraa
, Radu State
:
Auto Semi-supervised Outlier Detection for Malicious Authentication Events. PKDD/ECML Workshops (2) 2019: 176-190 - [c147]Jérémy Charlier, Radu State, Jean Hilger:
PHom-GeM: Persistent Homology for Generative Models. SDS 2019: 87-92 - [c146]Nida Khan
, Tabrez Ahmad
, Radu State
:
Feasibility of Stellar as a Blockchain-Based Micropayment System. SmartBlock 2019: 53-65 - [c145]Eric Aislan Antonelo, Radu State:
On importance weighting for electric fraud detection with dataset shifts. SMC 2019: 3235-3242 - [c144]Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker, Radu State:
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. IEEE Symposium on Security and Privacy Workshops 2019: 114-119 - [c143]Christof Ferreira Torres, Mathis Steichen, Radu State:
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. USENIX Security Symposium 2019: 1591-1607 - [i25]Ramiro Daniel Camino, Christian A. Hammerschmidt
, Radu State:
Improving Missing Data Imputation with Deep Generative Models. CoRR abs/1902.10666 (2019) - [i24]Manxing Du, Alexander I. Cowen-Rivers, Ying Wen, Phu Sakulwongtana, Jun Wang, Mats Brorsson, Radu State:
Infer Your Enemies and Know Yourself, Learning in Real-Time Bidding with Partially Observable Opponents. CoRR abs/1902.11212 (2019) - [i23]Jérémy Charlier, Radu State, Jean Hilger:
Modeling Smart Contracts Activities: A Tensor Based Approach. CoRR abs/1905.09868 (2019) - [i22]Jérémy Charlier, Radu State, Jean Hilger:
Non-Negative PARATUCK2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling. CoRR abs/1905.09869 (2019) - [i21]Jérémy Charlier, Radu State, Jean Hilger:
PHom-GeM: Persistent Homology for Generative Models. CoRR abs/1905.09894 (2019) - [i20]Jérémy Charlier, Eric Falk, Radu State, Jean Hilger:
User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition. CoRR abs/1905.10363 (2019) - [i19]Jérémy Charlier, Gaston Ormazabal, Radu State, Jean Hilger:
VecHGrad for solving accurately complex tensor decomposition. CoRR abs/1905.12413 (2019) - [i18]Jérémy Charlier, Gaston Ormazabal, Radu State, Jean Hilger:
MQLV: Modified Q-Learning for Vasicek Model. CoRR abs/1905.12567 (2019) - [i17]Jérémy Charlier, Radu State, Jean Hilger:
Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment. CoRR abs/1905.12568 (2019) - [i16]Jérémy Charlier, François Petit, Gaston Ormazabal, Radu State, Jean Hilger:
PHom-WAE: Persitent Homology for Wasserstein Auto-Encoders. CoRR abs/1905.13020 (2019) - [i15]Jérémy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne:
SynGAN: Towards Generating Synthetic Network Attacks using GANs. CoRR abs/1908.09899 (2019) - [i14]Ramiro Camino, Christof Ferreira Torres, Radu State:
A Data Science Approach for Honeypot Detection in Ethereum. CoRR abs/1910.01449 (2019) - 2018
- [c142]Christof Ferreira Torres
, Julian Schütte, Radu State:
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. ACSAC 2018: 664-676 - [c141]Jérémy Charlier, Radu State, Jean Hilger:
Non-negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling. BigComp 2018: 74-81 - [c140]Patrick O. Glauner, Petko Valtchev, Radu State:
Impact of Biases in Big Data. ESANN 2018 - [c139]Alexander Yakubov, Wazen M. Shbair
, Radu State:
BlockPGP: A Blockchain-Based Framework for PGP Key Servers. CANDAR Workshops 2018: 316-322 - [c138]Jérémy Charlier, Eric Falk, Radu State, Jean Hilger:
User-Device Authentication in Mobile Banking Using APHEN for Paratuck2 Tensor Decomposition. ICDM Workshops 2018: 886-894 - [c137]Aman Singh, Shashank Murali, Lalka Rieger, Ruoyu Li
, Stefan Hommes
, Radu State, Gaston Ormazabal, Henning Schulzrinne:
HANZO: Collaborative Network Defense for Connected Things. IPTComm 2018: 1-8 - [c136]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Andrea J. Cullen:
IPFS for Reduction of Chain Size in Ethereum. iThings/GreenCom/CPSCom/SmartData 2018: 1121-1128 - [c135]Mathis Steichen, Beltran Fiz
, Robert Norvill, Wazen M. Shbair, Radu State:
Blockchain-Based, Decentralized Access Control for IPFS. iThings/GreenCom/CPSCom/SmartData 2018: 1499-1506 - [c134]Sandro Mund, Raphaël Frank, Georgios Varisteas, Radu State:
Visualizing the Learning Progress of Self-Driving Cars. ITSC 2018: 2358-2363 - [c133]Georgios Varisteas, Tigran Avanesov, Radu State:
Distributed C++-Python embedding for fast predictions and fast prototyping. DIDL@Middleware 2018: 9-14 - [c132]Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:
Detecting malicious authentication events trustfully. NOMS 2018: 1-6 - [c131]Nida Khan, Abdelkader Lahmadi, Jérôme François
, Radu State:
Towards a management plane for smart contracts: Ethereum case study. NOMS 2018: 1-6 - [c130]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Andrea J. Cullen:
Visual emulation for Ethereum's virtual machine. NOMS 2018: 1-4 - [c129]Beltran Borja Fiz Pontiveros
, Robert Norvill, Radu State:
Monitoring the transaction selection policy of Bitcoin mining pools. NOMS 2018: 1-6 - [c128]Wazen M. Shbair
, Mathis Steichen, Jérôme François, Radu State:
Blockchain orchestration and experimentation framework: A case study of KYC. NOMS 2018: 1-6 - [c127]Alexander Yakubov, Wazen M. Shbair
, Anders Wallbom, David Sanda, Radu State:
A blockchain-based PKI management framework. NOMS 2018: 1-6 - [c126]Beltran Borja Fiz Pontiveros
, Robert Norvill, Radu State:
Recycling Smart Contracts: Compression of the Ethereum Blockchain. NTMS 2018: 1-5 - [i13]Patrick O. Glauner, Radu State, Petko Valtchev, Diogo Duarte:
On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage. CoRR abs/1801.05627 (2018) - [i12]Patrick O. Glauner, Petko Valtchev, Radu State:
Impact of Biases in Big Data. CoRR abs/1803.00897 (2018) - [i11]Ramiro Camino, Christian A. Hammerschmidt
, Radu State:
Generating Multi-Categorical Samples with Generative Adversarial Networks. CoRR abs/1807.01202 (2018) - 2017
- [j36]Patrick O. Glauner, Jorge Augusto Meira
, Petko Valtchev
, Radu State, Franck Bettinger:
The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey. Int. J. Comput. Intell. Syst. 10(1): 760-775 (2017) - [j35]Eric Falk, Vijay K. Gurbani, Radu State:
Query-able Kafka: An agile data analytics pipeline for mobile wireless networks. Proc. VLDB Endow. 10(12): 1646-1657 (2017) - [c125]Eric Falk, Jérémy Charlier, Radu State:
Your Moves, Your Device: Establishing Behavior Profiles Using Tensors. ADMA 2017: 460-474 - [c124]Manxing Du, Redouane Sassioui, Georgios Varisteas, Radu State, Mats Brorsson, Omar Cherkaoui:
Improving Real-Time Bidding Using a Constrained Markov Decision Process. ADMA 2017: 711-726 - [c123]Khalil Blaiech, Salaheddine Hamadi, Stefan Hommes
, Petko Valtchev
, Omar Cherkaoui, Radu State:
Rule Compilation in Multi-Tenant Networks. ANCS 2017: 97-98 - [c122]Beltran Fiz
, Stefan Hommes
, Radu State:
Confirmation Delay Prediction of Transactions in the Bitcoin Network. CSA/CUTE 2017: 534-539 - [c121]Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State:
BotGM: Unsupervised graph mining to detect botnets in traffic flows. CSNet 2017: 1-8 - [c120]Patrick O. Glauner, Manxing Du, Victor Paraschiv, Andrey Boytsov, Isabel Lopez Andrade, Jorge Augusto Meira, Petko Valtchev, Radu State:
The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study. ESANN 2017 - [c119]Eric Falk, Stefan Repcek, Beltran Fiz
, Stefan Hommes
, Radu State, Raimondas Sasnauskas:
VSOC - A Virtual Security Operating Center. GLOBECOM 2017: 1-6 - [c118]Eric A. Antonelo, Radu State:
Recurrent Dynamical Projection for Time Series-Based Fraud Detection. ICANN (2) 2017: 503-511 - [c117]Vijay K. Gurbani, Dan Kushnir, Veena B. Mendiratta, Chitra Phadke, Eric Falk, Radu State:
Detecting and predicting outages in mobile networks with log data. ICC 2017: 1-7 - [c116]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Irfan Awan, Andrea J. Cullen:
Automated Labeling of Unknown Contracts in Ethereum. ICCCN 2017: 1-6 - [c115]Patrick O. Glauner, Niklas Dahringer, Oleksandr Puhachov, Jorge Augusto Meira
, Petko Valtchev
, Radu State, Diogo Duarte:
Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations. ICDM Workshops 2017: 258-265 - [c114]Ramiro Daniel Camino
, Radu State, Leandro Montero, Petko Valtchev
:
Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. ICDM Workshops 2017: 787-796 - [c113]Eric Falk, Ramiro Camino
, Radu State, Vijay K. Gurbani:
On non-parametric models for detecting outages in the mobile network. IM 2017: 1139-1142 - [c112]Mathis Steichen, Stefan Hommes
, Radu State:
ChainGuard - A firewall for blockchain applications using SDN with OpenFlow. IPTComm 2017: 1-8 - [c111]Christian A. Hammerschmidt, Sebastian Garcia, Sicco Verwer, Radu State:
Reliable Machine Learning for Networking: Key Issues and Approaches. LCN 2017: 167-170 - [c110]Salvatore Signorello, Samuel Marchal
, Jérôme François, Olivier Festor, Radu State:
Advanced interest flooding attacks in named-data networking. NCA 2017: 1-10 - [c109]Stefan Hommes
, Petko Valtchev
, Khalil Blaiech, Salaheddine Hamadi, Omar Cherkaoui, Radu State:
Optimising packet forwarding in multi-tenant networks using rule compilation. NCA 2017: 305-313 - [c108]Jérémy Charlier, Sofiane Lagraa, Radu State, Jérôme François:
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining. MIDAS@PKDD/ECML 2017: 31-42 - [i10]Patrick O. Glauner, Angelo Migliosi, Jorge Augusto Meira, Eric Aislan Antonelo, Petko Valtchev, Radu State, Franck Bettinger:
Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses? CoRR abs/1702.03767 (2017) - [i9]Patrick O. Glauner, Manxing Du, Victor Paraschiv, Andrey Boytsov, Isabel Lopez Andrade, Jorge Augusto Meira, Petko Valtchev, Radu State:
The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study. CoRR abs/1703.10121 (2017) - [i8]Christian A. Hammerschmidt
, Radu State, Sicco Verwer:
Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms. CoRR abs/1707.09430 (2017) - [i7]Patrick O. Glauner, Niklas Dahringer, Oleksandr Puhachov, Jorge Augusto Meira, Petko Valtchev, Radu State, Diogo Duarte:
Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations. CoRR abs/1709.03008 (2017) - 2016
- [j34]Carol Davids, Vijay K. Gurbani, Gaston Ormazabal, Andrew Rollins, Kundan Singh, Radu State:
Research topics related to real-time communications over 5G networks. Comput. Commun. Rev. 46(3): 8:1-8:6 (2016) - [j33]Kevin Allix
, Tegawendé F. Bissyandé
, Quentin Jérome, Jacques Klein
, Radu State, Yves Le Traon
:
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios. Empir. Softw. Eng. 21(1): 183-211 (2016) - [c107]Patrick O. Glauner, Jorge Augusto Meira
, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni:
Neighborhood features help detecting non-technical losses in big data sets. BDCAT 2016: 253-261 - [c106]Manxing Du, Radu State, Mats Brorsson, Tigran Avanesov:
Behavior profiling for mobile advertising. BDCAT 2016: 302-307 - [c105]Christian A. Hammerschmidt, Samuel Marchal
, Radu State, Sicco Verwer:
Behavioral clustering of non-stationary IP flow record data. CNSM 2016: 297-301 - [c104]Christian A. Hammerschmidt, Benjamin Loos, Radu State, Thomas Engel:
Flexible State-Merging for Learning (P)DFAs in Python. ICGI 2016: 154-159 - [c103]Salaheddine Hamadi, Khalil Blaiech, Petko Valtchev
, Omar Cherkaoui, Radu State:
Compiling packet forwarding rules for switch pipelined architecture. INFOCOM 2016: 1-9 - [c102]Patrick O. Glauner, Andre Boechat, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte:
Large-scale detection of non-technical losses in imbalanced data sets. ISGT 2016: 1-5 - [c101]Christian A. Hammerschmidt, Samuel Marchal
, Radu State, Gaetano Pellegrino, Sicco Verwer:
Efficient Learning of Communication Profiles from IP Flow Records. LCN 2016: 559-562 - [c100]Salvatore Signorello, Radu State, Jérôme François, Olivier Festor:
NDN.p4: Programming information-centric data-planes. NetSoft 2016: 384-389 - [i6]Patrick O. Glauner, Andre Boechat, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte:
Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets. CoRR abs/1602.08350 (2016) - [i5]Patrick O. Glauner, Andre Boechat, Lautaro Dolberg, Jorge Augusto Meira, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte:
The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. CoRR abs/1606.00626 (2016) - [i4]Patrick O. Glauner, Jorge Augusto Meira, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte:
Neighborhood Features Help Detecting Electricity Theft in Big Data Sets. CoRR abs/1607.00872 (2016) - [i3]Christian Albert Hammerschmidt
, Sicco Verwer, Qin Lin, Radu State:
Interpreting Finite Automata for Sequential Data. CoRR abs/1611.07100 (2016) - 2015
- [j32]Samuel Marchal
, Anil Mehta, Vijay K. Gurbani, Radu State, Tin Kam Ho, Flavia Sancier-Barbosa
:
Mitigating Mimicry Attacks Against the Session Initiation Protocol. IEEE Trans. Netw. Serv. Manag. 12(3): 467-482 (2015) - [c99]Salvatore Signorello, Radu State, Olivier Festor
:
Exploring IoT Protocols Through the Information-Centric Networking's Lens. AIMS 2015: 56-60 - [c98]Vijay K. Gurbani, Angelo Migliosi, Radu State, Charles Payette, Bruce Cilli, Thomas Engel:
A characterization of short-video and distributed hot-spot activity in Instagram. IPTComm 2015: 28-34 - [c97]Miroslaw Kantor, Radu State, Thomas Engel, Gaston Ormazabal:
A policy-based per-flow mobility management system design. IPTComm 2015: 35-42 - 2014
- [j31]Carol Davids, Gaston Ormazabal, Radu State:
Real-time communications: topics for research and methods of collaboration. Comput. Commun. Rev. 44(3): 112-115 (2014) - [j30]Samuel Marchal
, Jérôme François
, Radu State, Thomas Engel:
PhishStorm: Detecting Phishing With Streaming Analytics. IEEE Trans. Netw. Serv. Manag. 11(4): 458-471 (2014) - [j29]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton: Securing Virtual Coordinates by Enforcing Physical Laws. IEEE/ACM Trans. Netw. 22(3): 798-811 (2014) - [c96]Samuel Marchal
, Xiuyan Jiang, Radu State, Thomas Engel:
A Big Data Architecture for Large Scale Security Monitoring. BigData Congress 2014: 56-63 - [c95]Samuel Marchal
, Jérôme François, Radu State, Thomas Engel:
PhishScore: Hacking phishers' minds. CNSM 2014: 46-54 - [c94]Vijay K. Gurbani, David Goergen, Radu State, Thomas Engel:
Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data. CNSM 2014: 193-198 - [c93]Kevin Allix
, Tegawendé F. Bissyandé
, Quentin Jérome, Jacques Klein
, Radu State, Yves Le Traon
:
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. CODASPY 2014: 163-166 - [c92]Kevin Allix
, Quentin Jérome, Tegawendé F. Bissyandé
, Jacques Klein
, Radu State, Yves Le Traon
:
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? COMPSAC 2014: 384-393 - [c91]Stefan Hommes
, Radu State, Thomas Engel:
Implications and detection of DoS attacks in OpenFlow-based networks. GLOBECOM 2014: 537-543 - [c90]Quentin Jérome, Kevin Allix
, Radu State, Thomas Engel
:
Using opcode-sequences to detect malicious Android applications. ICC 2014: 914-919 - [c89]David Goergen, Angelo Migliosi, Vijay K. Gurbani, Radu State, Thomas Engel:
Spatial and temporal analysis of Twitter: a tale of two countries. IPTComm 2014: 5:1-5:6 - [c88]David Goergen, Veena B. Mendiratta, Radu State, Thomas Engel:
Analysis of large call data records with big data. IPTComm 2014: 8:1-8:6 - [c87]Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State, Thomas Engel:
RAMSES: Revealing Android Malware Through String Extraction and Selection. SecureComm (1) 2014: 498-506 - 2013
- [j28]Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani
, Radu State, Joaquín García-Alfaro
, Nadia Tawbi
:
Editorial. J. Inf. Secur. Appl. 18(1): 1 (2013) - [c86]Jérôme François, Radu State, Thomas Engel:
Aggregated representations and metrics for scalable flow analysis. CNS 2013: 478-482 - [c85]Stefan Hommes
, Frank Hermann, Radu State, Thomas Engel:
Automated source code extension for debugging of OpenFlow based networks. CNSM 2013: 105-108 - [c84]Quentin Jérome, Samuel Marchal
, Radu State, Thomas Engel:
Advanced Detection Tool for PDF Threats. DPM/SETOP 2013: 300-315 - [c83]Laura Heath, Henry Owen, Raheem A. Beyah
, Radu State:
CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking. ICC 2013: 3732-3737 - [c82]Cynthia Wagner, Jérôme François, Radu State, Alexandre Dulaunoy, Thomas Engel, Gilles Massen:
ASMATRA: Ranking ASs providing transit service to malware hosters. IM 2013: 260-268 - [c81]Stefan Hommes, Radu State, Thomas Engel:
Classification of Log Files with Limited Labeled Data. IPTComm 2013: 2 - [c80]David Goergen, Veena B. Mendiratta, Radu State, Thomas Engel:
Identifying abnormal patterns in cellular communication flows. IPTComm 2013: 5 - [e3]Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State:
Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers. Lecture Notes in Computer Science 7731, Springer 2013, ISBN 978-3-642-35889-0 [contents] - 2012
- [j27]Cynthia Wagner, Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:
Breaking Tor anonymity with game theory and data mining. Concurr. Comput. Pract. Exp. 24(10): 1052-1065 (2012) - [c79]Thorsten Ries, Radu State, Thomas Engel:
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems. AIMS 2012: 98-108 - [c78]Jeffrey Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Securing Virtual Coordinates by Enforcing Physical Laws. ICDCS 2012: 315-324 - [c77]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. NDSS 2012 - [c76]Stefan Hommes
, Radu State, Thomas Engel:
Detecting Stealthy Backdoors with Association Rule Mining. Networking (2) 2012: 161-171 - [c75]Stefan Hommes
, Radu State, Thomas Engel:
A distance-based method to detect anomalous attributes in log files. NOMS 2012: 498-501 - [c74]Jérôme François
, Cynthia Wagner, Radu State, Thomas Engel:
SAFEM: Scalable analysis of flows with entropic measures and SVM. NOMS 2012: 510-513 - [c73]Samuel Marchal
, Jérôme François
, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor
:
DNSSM: A large scale passive DNS security monitoring framework. NOMS 2012: 988-993 - [c72]Cynthia Wagner, Jérôme François
, Radu State, Thomas Engel, Gérard Wagener, Alexandre Dulaunoy:
SDBF: Smart DNS brute-forcer. NOMS 2012: 1001-1007 - [c71]Samuel Marchal
, Jérôme François
, Radu State, Thomas Engel:
Proactive Discovery of Phishing Related Domain Names. RAID 2012: 190-209 - [c70]Samuel Marchal
, Jérôme François
, Radu State, Thomas Engel:
Semantic based DNS forensics. WIFS 2012: 91-96 - [i2]Gérard Wagener, Alexandre Dulaunoy, Radu State:
Torinj : Automated Exploitation Malware Targeting Tor Users. CoRR abs/1208.2877 (2012) - 2011
- [j26]Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:
Heliza: talking dirty to the attackers. J. Comput. Virol. 7(3): 221-232 (2011) - [c69]Thorsten Ries, Radu State, Andriy Panchenko:
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. AISC 2011: 77-86 - [c68]Stefan Hommes
, Radu State, Andreas Zinnen, Thomas Engel:
Detection of abnormal behaviour in a surveillance environment using control charts. AVSS 2011: 113-118 - [c67]Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Digging into IP Flow Records with a Visual Kernel Method. CISIS 2011: 41-49 - [c66]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Enforcing security with behavioral fingerprinting. CNSM 2011: 1-9 - [c65]Sheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State:
Applying game theory to analyze attacks and defenses in virtual coordinate systems. DSN 2011: 133-144 - [c64]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
PTF: Passive Temporal Fingerprinting. Integrated Network Management 2011: 289-296 - [c63]Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:
Adaptive and self-configurable honeypots. Integrated Network Management 2011: 345-352 - [c62]Thorsten Ries, Radu State, Thomas Engel:
Measuring anonymity using network coordinate systems. ISCIT 2011: 366-371 - [c61]Jérôme François
, Shaonan Wang, Radu State, Thomas Engel:
BotTrack: Tracking Botnets Using NetFlow and PageRank. Networking (1) 2011: 1-14 - [c60]Cynthia Wagner, Jérôme François
, Radu State, Thomas Engel:
Machine Learning Approach for IP-Flow Record Anomaly Detection. Networking (1) 2011: 28-39 - [c59]Cynthia Wagner, Jérôme François
, Radu State, Thomas Engel:
DANAK: Finding the odd! NSS 2011: 161-168 - [c58]Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State:
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. RAID 2011: 201-221 - [c57]Jérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel:
BotCloud: Detecting botnets using MapReduce. WIFS 2011: 1-6 - 2010
- [j25]Jérôme François
, Humberto J. Abdelnur, Radu State, Olivier Festor
:
Machine Learning Techniques for Passive Network Inventory. IEEE Trans. Netw. Serv. Manag. 7(4): 244-257 (2010) - [j24]Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced fuzzing in the VoIP space. J. Comput. Virol. 6(1): 57-64 (2010) - [c56]Sheila Becker, Humberto J. Abdelnur, Radu State, Thomas Engel:
An Autonomic Testing Framework for IPv6 Configuration Protocols. AIMS 2010: 65-76 - [c55]Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel:
Mining NetFlow Records for Critical Network Activities. AIMS 2010: 135-146 - [c54]Jérôme François
, Humberto J. Abdelnur, Radu State, Olivier Festor
:
Semi-supervised Fingerprinting of Protocol Messages. CISIS 2010: 107-115 - [c53]Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Monitoring of Spatial-Aggregated IP-Flow Records. CISIS 2010: 117-124 - [c52]Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel:
RiskRank: Security risk ranking for IP flow records. CNSM 2010: 56-63 - [c51]Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:
Game theory driven monitoring of spatial-aggregated IP-Flow records. CNSM 2010: 463-468 - [c50]Mohamed Nassar
, Radu State, Olivier Festor:
Labeled VoIP Data-Set for Intrusion Detection Evaluation. EUNICE 2010: 97-106 - [c49]Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel:
FlowRank: ranking NetFlow records. IWCMC 2010: 484-488 - [c48]Mohamed Nassar
, Radu State, Olivier Festor
:
A Framework for Monitoring SIP Enterprise Networks. NSS 2010: 1-8 - [c47]Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:
Breaking Tor Anonymity with Game Theory and Data Mining. NSS 2010: 47-54 - [c46]Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor:
Improving Fuzz Testing Using Game Theory. NSS 2010: 263-268 - [c45]Cynthia Wagner, Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:
PeekKernelFlows: peeking into IP flows. VizSEC 2010: 52-57 - [c44]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Digital forensics in VoIP networks. WIFS 2010: 1-6
2000 – 2009
- 2009
- [b2]Radu State:
Audit et monitorage de la sécurité. (Advanced Security Monitoring and Assessment). Henri Poincaré University, Nancy, France, 2009 - [j23]Jérôme François
, Radu State, Olivier Festor
:
Botnets IRC et P2P pour une supervision à large échelle. Tech. Sci. Informatiques 28(4): 433-458 (2009) - [c43]Mohamed Nassar
, Radu State, Olivier Festor:
VoIP Malware: Attack Tool & Attack Scenarios. ICC 2009: 1-6 - [c42]Sheila Becker, Radu State, Thomas Engel:
Defensive configuration with game theory. Integrated Network Management 2009: 453-459 - [c41]Sheila Becker, Radu State, Thomas Engel:
Using game theory to configure P2P SIP. IPTComm 2009: 6 - [c40]Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Malware analysis with graph kernels and support vector machines. MALWARE 2009: 63-68 - [c39]Jérôme François
, Humberto J. Abdelnur, Radu State, Olivier Festor
:
Automated Behavioral Fingerprinting. RAID 2009: 182-201 - [c38]Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:
Self Adaptive High Interaction Honeypots Driven by Game Theory. SSS 2009: 741-755 - 2008
- [j22]Remi Badonnel, Radu State, Olivier Festor
:
Self-configurable fault monitoring in ad-hoc networks. Ad Hoc Networks 6(3): 458-473 (2008) - [j21]Jürgen Schönwälder
, Radu State:
Report on the 1st International Summer School on Network and Service Management. J. Netw. Syst. Manag. 16(2): 227-230 (2008) - [j20]Gérard Wagener, Radu State, Alexandre Dulaunoy
:
Malware behaviour analysis. J. Comput. Virol. 4(4): 279-287 (2008) - [c37]Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State:
Abusing SIP Authentication. IAS 2008: 237-242 - [c36]Jérôme François, Radu State, Olivier Festor:
Towards malware inspired management frameworks. NOMS 2008: 105-112 - [c35]Mohamed Nassar
, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. RAID 2008: 311-330 - [c34]Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced Network Fingerprinting. RAID 2008: 372-389 - [e2]Henning Schulzrinne, Radu State, Saverio Niccolini:
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers. Lecture Notes in Computer Science 5310, Springer 2008, ISBN 978-3-540-89053-9 [contents] - 2007
- [j19]Radu State:
Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848. ACM Queue 5(3): 44 (2007) - [j18]Remi Badonnel, Radu State, Olivier Festor
:
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 4(1): 39-50 (2007) - [j17]Radu State, Olivier Festor:
Malware: a future framework for device, network and service management. J. Comput. Virol. 3(1): 51-60 (2007) - [c33]Mohamed Nassar, Radu State, Olivier Festor:
IBGP Confederation Provisioning. AIMS 2007: 25-34 - [c32]Jérôme François
, Radu State, Olivier Festor
:
Malware Models for Network and Service Management. AIMS 2007: 192-195 - [c31]Jérôme François, Radu State, Olivier Festor:
Botnets for Scalable Management. DSOM 2007: 1-12 - [c30]Vincent Cridlig, Radu State, Olivier Festor:
A model for checking consistency in access control policies for network management. Integrated Network Management 2007: 11-19 - [c29]Mohamed Nassar
, Radu State, Olivier Festor:
VoIP Honeypot Architecture. Integrated Network Management 2007: 109-118 - [c28]Humberto J. Abdelnur, Radu State, Isabelle Chrisment, C. Popi:
Assessing the security of VoIP Services. Integrated Network Management 2007: 373-382 - [c27]Mohamed Nassar
, Saverio Niccolini, Radu State, Thilo Ewald:
Holistic VoIP intrusion detection and prevention system. IPTComm 2007: 1-9 - [c26]Humberto J. Abdelnur, Radu State, Olivier Festor:
KiF: a stateful SIP fuzzer. IPTComm 2007: 47-56 - 2006
- [j16]Vincent Cridlig, Humberto J. Abdelnur, Radu State, Olivier Festor
:
XBGP-MAN: an XML management architecture for BGP. Int. J. Netw. Manag. 16(4): 295-309 (2006) - [j15]Radu State:
Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686. ACM Queue 4(1): 62 (2006) - [j14]Radu State:
Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962. ACM Queue 4(3): 42 (2006) - [j13]Radu State:
Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705. ACM Queue 4(7): 44 (2006) - [j12]Radu State:
Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X. ACM Queue 4(9): 50 (2006) - [j11]Radu State:
Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. ACM Queue 4(10): 49 (2006) - [j10]Anthony Akins, Radu State:
Bookshelf. IEEE Softw. 23(6): 104-105 (2006) - [j9]Vincent Cridlig, Radu State, Olivier Festor:
Role-Based Access Control for XML enabled multi-protocol management gateways. IEEE Trans. Netw. Serv. Manag. 3(1): 22-32 (2006) - [c25]Remi Badonnel, Radu State, Olivier Festor
:
Fault Monitoring in Ad-Hoc Networks Based on Information Theory. Networking 2006: 427-438 - [c24]Remi Badonnel, Radu State, Olivier Festor:
Probabilistic Management of Ad-Hoc Networks. NOMS 2006: 339-350 - [c23]Vincent Cridlig, Humberto J. Abdelnur, Radu State, Olivier Festor:
A VoIP Security Management Architecture. NOMS 2006 - [e1]Radu State, Sven van der Meer
, Declan O'Sullivan, Tom Pfeifer:
Large Scale Management of Distributed Systems, 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006, Proceedings. Lecture Notes in Computer Science 4269, Springer 2006, ISBN 3-540-47659-8 [contents] - [i1]Mohamed El Baker Nassar, Radu State, Olivier Festor:
Intrusion detection mechanisms for VoIP applications. CoRR abs/cs/0610109 (2006) - 2005
- [j8]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad hoc networks: information model and probe-based architecture. Int. J. Netw. Manag. 15(5): 335-347 (2005) - [j7]Remi Badonnel, Radu State, Olivier Festor, André Schaff:
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. J. Netw. Syst. Manag. 13(4): 479-497 (2005) - [j6]Radu State:
Review of "Network Security Architectures by Sean Convery". ACM Queue 3(1): 61 (2005) - [j5]Radu State:
Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". ACM Queue 3(6): 60 (2005) - [j4]Remi Badonnel, Radu State, Olivier Festor:
Self-Organized Monitoring in Ad-Hoc Networks. Telecommun. Syst. 30(1-3): 143-160 (2005) - [c22]Remi Badonnel, Radu State, Olivier Festor:
Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. ICN (2) 2005: 83-90 - [c21]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad-hoc networks: evaluating the network behavior. Integrated Network Management 2005: 17-30 - [c20]Vincent Cridlig, Radu State, Olivier Festor:
An integrated security framework for XML based management. Integrated Network Management 2005: 587-600 - [c19]Vincent Cridlig, Humberto J. Abdelnur, Jérome Bourdellon, Radu State:
A NetConf Network Management Suite: ENSUITE. IPOM 2005: 152-161 - 2004
- [c18]Vincent Cridlig, Olivier Festor, Radu State:
Role-Based Access Control for XML Enabled Management Gateways. DSOM 2004: 183-195 - [c17]Radu State, Olivier Festor, Benjamin Zores:
An extensible agent toolkit for device management. NOMS (1) 2004: 845-858 - [c16]Claude Chaudet, Olivier Festor, Isabelle Guérin Lassous, Radu State:
A Managed Bandwidth Reservation Protocol for Ad Hoc Networks. SAPIR 2004: 13-20 - 2003
- [c15]Radu State, Olivier Festor, Isabelle Chrisment:
Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. DSOM 2003: 169-180 - [c14]Radu State, Emmanuel Nataf, Olivier Festor:
A SMIng Based Policy Access Control for SNMPv3. HSNMC 2003: 156-164 - [c13]Radu State:
Wireless Terminal Management Architectures. Integrated Network Management 2003: 459-462 - [c12]Radu State, Olivier Festor:
Management of Wireless Dynamic Infrastructures. ISCC 2003: 1373-1378 - 2002
- [j3]Radu State, Olivier Festor, Emmanuel Nataf:
Managing Highly Dynamic Services Using Extended Temporal Information Models. J. Netw. Syst. Manag. 10(2): 195-209 (2002) - [c11]Radu State, Karim El-Khazen, Georges Martinez, Guillaume Vivier:
Service management for multi-operator heterogeneous networks. GLOBECOM 2002: 2069-2073 - [c10]Radu State, Guillaume Vivier:
Policy based management of wireless networks. Net-Con 2002: 15-26 - [c9]Radu State:
Latent multicast monitoring. ISCC 2002: 947-952 - [c8]Radu State, Karim El-Khazen, Georges Martinez, Guillaume Vivier:
Managing multi-configurable terminals. MWCN 2002: 266-269 - [c7]Hassen Sallay
, Radu State, Olivier Festor:
A distributed management platform for integrated multicast monitoring. NOMS 2002: 483-495 - [c6]Karim El-Khazen, Radu State:
Designing an advanced service management platform. SMC 2002: 5 - 2001
- [b1]Radu State:
Modèles d'information étendus pour la supervision des réseaux et services dynamiques. (Extended Network Information models for the management of dynamic networks and services). Henri Poincaré University, Nancy, France, 2001 - [c5]Radu State, Olivier Festor, Emmanuel Nataf:
Managing Highly Dynamic Services Using Extended Temporal Network Information Models. Integrated Network Management 2001: 705-718 - 2000
- [j2]Laurent Andrey, Olivier Festor, Emmanuel Nataf, Radu State:
JTMN: a Java-based TMN development and experimentation environment. IEEE J. Sel. Areas Commun. 18(5): 664-675 (2000) - [c4]Radu State, Emmanuel Nataf, Olivier Festor:
Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture. DSOM 2000: 181-192 - [c3]Radu State, Emmanuel Nataf, Olivier Festor:
A Java based implementation of a network level information model for the ATM/frame relay interconnection. NOMS 2000: 965-966 - [c2]Radu State, Olivier Festor, Emmanuel Nataf:
A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks. PDPTA 2000
1990 – 1999
- 1996
- [j1]Luminita State, Stuart Rubin, Radu State:
Evolutionary/genetic programming in restricted domains. Neural Parallel Sci. Comput. 4(4): 419-444 (1996) - 1995
- [c1]Luminita State, Radu State:
And/Or Trees for Knowledge Representation. ECSQARU 1995: 405-411
Coauthor Index
aka: Ramiro Daniel Camino
aka: Christian Albert Hammerschmidt
aka: Beltran Fiz

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 01:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint