default search action
Romain Fontugne
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment. J. Netw. Syst. Manag. 32(1): 1 (2024) - [c50]Koki Itoh, Jin Nakazato, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
Enhancing Real-Time Streaming Quality through a Multipath Redundant Communication Framework. IFIP Networking 2024: 1-10 - [c49]Christoff Visser, Romain Fontugne:
Inside the Engine Room: Investigating Steam's Content Delivery Platform Infrastructure in the Era of 100GB Games. PAM (1) 2024: 32-60 - [c48]Ioana Livadariu, Romain Fontugne, Amreesh Phokeer, Massimo Candela, Massimiliano Stucchi:
A Tale of Two Synergies: Uncovering RPKI Practices for RTBH at IXPs. PAM (2) 2024: 88-103 - [c47]Malte Tashiro, Romain Fontugne, Kensuke Fukuda:
Following the Data Trail: An Analysis of IXP Dependencies. PAM (2) 2024: 199-227 - 2023
- [c46]Bradley Huffaker, Romain Fontugne, Alexander Marder, kc claffy:
On the Importance of Being an AS: An Approach to Country-Level AS Rankings. IMC 2023: 52-65 - [c45]Weitong Li, Zhexiao Lin, Md. Ishtiaq Ashiq, Emile Aben, Romain Fontugne, Amreesh Phokeer, Taejoong Chung:
RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKI. IMC 2023: 73-88 - [c44]Romain Fontugne, Amreesh Phokeer, Cristel Pelsser, Kevin Vermeulen, Randy Bush:
RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes. PAM 2023: 429-457 - [c43]Momoka Yamamoto, Jin Nakazato, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
Poster: Evaluation of IPv6-only-Capable Iterative Resolvers. SIGCOMM 2023: 1102-1104 - [c42]Ben Du, Cecilia Testart, Romain Fontugne, Alex C. Snoeren, kc claffy:
Poster: Taking the Low Road: How RPKI Invalids Propagate. SIGCOMM 2023: 1144-1146 - 2022
- [c41]Ben Du, Cecilia Testart, Romain Fontugne, Gautam Akiwate, Alex C. Snoeren, kc claffy:
Mind your MANRS: measuring the MANRS ecosystem. IMC 2022: 716-729 - [c40]Malte Appel, Emile Aben, Romain Fontugne:
Metis: Better Atlas Vantage Point Selection for Everyone. TMA 2022 - 2021
- [c39]Porapat Ongkanchana, Romain Fontugne, Hiroshi Esaki, Job Snijders, Emile Aben:
Hunting BGP zombies in the wild. ANRW 2021: 1-7 - 2020
- [c38]Romain Fontugne, Anant Shah, Kenjiro Cho:
Persistent Last-mile Congestion: Not so Uncommon. Internet Measurement Conference 2020: 420-427 - [c37]Romain Fontugne, Ksenia Ermoshina, Emile Aben:
The Internet in Crimea: a Case Study on Routing Interregnum. Networking 2020: 809-814 - [c36]Arun Dunna, Zachary S. Bischof, Romain Fontugne:
Sanitizing a View of Consumer Broadband in the United States. TMA 2020
2010 – 2019
- 2019
- [c35]Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:
Detecting Network Disruptions At Colocation Facilities. INFOCOM 2019: 2161-2169 - [c34]Romain Fontugne, Esteban Bautista, Colin Petrie, Yutaro Nomura, Patrice Abry, Paulo Gonçalves, Kensuke Fukuda, Emile Aben:
BGP Zombies: An Analysis of Beacons Stuck Routes. PAM 2019: 197-209 - [c33]Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Mérindol, Alistair King, Alberto Dainotti, Cristel Pelsser:
Chocolatine: Outage Detection for Internet Background Radiation. TMA 2019: 1-8 - [c32]Shinyoung Cho, Romain Fontugne, Kenjiro Cho, Alberto Dainotti, Phillipa Gill:
BGP hijacking classification. TMA 2019: 25-32 - [i6]Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Mérindol, Alistair King, Alberto Dainotti, Cristel Pelsser:
Chocolatine: Outage Detection for Internet Background Radiation. CoRR abs/1906.04426 (2019) - [i5]Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:
Detecting Network Disruptions At Colocation Facilities. CoRR abs/1911.04866 (2019) - 2018
- [c31]Zachary S. Bischof, Romain Fontugne, Fabián E. Bustamante:
Untangling the world-wide mesh of undersea cables. HotNets 2018: 78-84 - [c30]Chia-ling Chan, Romain Fontugne, Kenjiro Cho, Shigeki Goto:
Monitoring TLS adoption using backbone and edge traffic. INFOCOM Workshops 2018: 208-213 - [c29]Tomoyuki Kitabatake, Romain Fontugne, Hiroshi Esaki:
BLT: A taxonomy and classification tool for mining BGP update messages. INFOCOM Workshops 2018: 409-414 - [c28]Romain Fontugne, Anant Shah, Emile Aben:
The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony. PAM 2018: 216-227 - 2017
- [j7]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections. IEEE/ACM Trans. Netw. 25(4): 2152-2165 (2017) - [c27]Jonghwan Hyun, Youngjoon Won, Kenjiro Cho, Romain Fontugne, Jae Yoon Chung, James Won-Ki Hong:
High-end LTE service evolution in Korea: 4 years of nationwide mobile network measurements. CNSM 2017: 1-7 - [c26]Romain Fontugne, Pierre Borgnat, Patrick Flandrin:
Online Empirical Mode Decomposition. ICASSP 2017: 4306-4310 - [c25]Romain Fontugne, Cristel Pelsser, Emile Aben, Randy Bush:
Pinpointing delay and forwarding anomalies using large-scale traceroute measurements. Internet Measurement Conference 2017: 15-28 - [c24]Romain Fontugne, Anant Shah, Emile Aben:
AS Hegemony: A Robust Metric for AS Centrality. SIGCOMM Posters and Demos 2017: 48-50 - [c23]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Profiling internet scanners: Spatiotemporal structures and measurement ethics. TMA 2017: 1-9 - [c22]Anant Shah, Romain Fontugne, Emile Aben, Cristel Pelsser, Randy Bush:
Disco: Fast, good, and cheap outage detection. TMA 2017: 1-9 - [i4]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: a 14 year and 3 day longitudinal study, with multiscale analyses and random projections. CoRR abs/1703.02005 (2017) - [i3]Romain Fontugne, Anant Shah, Emile Aben:
The (thin) Bridges of AS Connectivity: Measuring Dependency using AS Hegemony. CoRR abs/1711.02805 (2017) - 2016
- [c21]Anant Shah, Romain Fontugne, Christos Papadopoulos:
Towards characterizing international routing detours. AINTEC 2016: 17-24 - [c20]Jordan Frécon, Romain Fontugne, Gustavo Didier, Nelly Pustelnik, Kensuke Fukuda, Patrice Abry:
Non-linear regression for bivariate self-similarity identification - application to anomaly detection in Internet traffic based on a joint scaling analysis of packet and byte counts. ICASSP 2016: 4184-4188 - [c19]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Identifying Coordination of Network Scans Using Probed Address Structure. TMA 2016 - [i2]Romain Fontugne, Emile Aben, Cristel Pelsser, Randy Bush:
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements. CoRR abs/1605.04784 (2016) - [i1]Anant Shah, Romain Fontugne, Christos Papadopoulos:
Towards Characterizing International Routing Detours. CoRR abs/1606.05047 (2016) - 2015
- [j6]Johan Mazel, Pedro Casas, Romain Fontugne, Kensuke Fukuda, Philippe Owezarski:
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection. Int. J. Netw. Manag. 25(5): 283-305 (2015) - [c18]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Pierre Borgnat, Johan Mazel, Herwig Wendt, Darryl Veitch:
Random projection and multiscale wavelet leader based anomaly detection and address identification in internet traffic. ICASSP 2015: 5530-5534 - [c17]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
An empirical mixture model for large-scale RTT measurements. INFOCOM 2015: 2470-2478 - 2014
- [c16]Jianxing Chen, Romain Fontugne, Akira Kato, Kensuke Fukuda:
Clustering Spam Campaigns with Fuzzy Hashing. AINTEC 2014: 66 - [c15]Jean Lorchat, Cristel Pelsser, Romain Fontugne:
Collaborative Repository for Cybersecurity Data and Threat Information. BADGERS@ESORICS 2014: 83-87 - [c14]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
Hashdoop: A MapReduce framework for network anomaly detection. INFOCOM Workshops 2014: 494-499 - [c13]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
A taxonomy of anomalies in backbone network traffic. IWCMC 2014: 30-36 - [c12]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Visual comparison of network anomaly detectors with chord diagrams. SAC 2014: 473-480 - 2013
- [j5]Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara:
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches. Comput. Commun. 36(5): 575-588 (2013) - [c11]Romain Fontugne, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Hiroshi Esaki:
Mining anomalous electricity consumption using Ensemble Empirical Mode Decomposition. ICASSP 2013: 5238-5242 - [c10]Youngjoon Won, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki, Kensuke Fukuda:
Nine years of observing traffic anomalies: Trending analysis in backbone networks. IM 2013: 636-642 - [c9]Romain Fontugne, Jorge Ortiz, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Kensuke Fukuda, David E. Culler, Hiroshi Esaki:
Strip, bind, and search: a method for identifying abnormal energy consumption in buildings. IPSN 2013: 129-140 - 2012
- [j4]John W. Byers, Jeffrey C. Mogul, Fadel Adib, Jay Aikat, Danai Chasaki, Ming-Hung Chen, Marshini Chetty, Romain Fontugne, Vijay Gabale, László Gyarmati, Katrina LaCurts, Qi Liao, Marc Mendonca, Trang Cao Minh, S. H. Shah Newaz, Pawan Prakash, Yan Shvartzshnaider, Praveen Yalagandula, Chun-Yu Yang:
Report on the SIGCOMM 2011 conference. Comput. Commun. Rev. 42(1): 80-96 (2012) - [c8]Johan Mazel, Hiroshi Esaki, Romain Fontugne, Kensuke Fukuda:
Improving an SVD-based combination strategy of anomaly detectors for traffic labelling. AINTEC 2012: 69-76 - 2011
- [b1]Romain Fontugne:
Increasing reliability in network traffic anomaly detection. Graduate University for Advanced Studies, Japan, 2011 - [j3]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies. J. Networks 6(4): 577-586 (2011) - [c7]Romain Fontugne, Kenjiro Cho, Youngjoon Won, Kensuke Fukuda:
Disasters seen through Flickr cameras. SWID@CoNEXT 2011: 5:1-5:10 - [c6]Romain Fontugne, Kensuke Fukuda:
A Hough-transform-based anomaly detector with an adaptive time interval. SAC 2011: 471-477 - 2010
- [j2]Romain Fontugne, Yosuke Himura, Kensuke Fukuda:
Evaluation of Anomaly Detection Method Based on Pattern Recognition. IEICE Trans. Commun. 93-B(2): 328-335 (2010) - [j1]Guillaume Dewaele, Yosuke Himura, Pierre Borgnat, Kensuke Fukuda, Patrice Abry, Olivier J. J. Michel, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki:
Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 20(5): 317-337 (2010) - [c5]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. CoNEXT 2010: 8 - [c4]Kensuke Fukuda, Romain Fontugne:
Estimating Speed of Scanning Activities with a Hough Transform. ICC 2010: 1-5 - [c3]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory. TMA 2010: 101-114
2000 – 2009
- 2009
- [c2]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Towards systematic traffic annotation. StudentWorkshop@CoNEXT 2009: 15-16 - 2008
- [c1]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
An image processing approach to traffic anomaly detection. AINTEC 2008: 17-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint