default search action
Jérôme François
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c81]Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François:
Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services. NetSoft 2024: 149-152 - [c80]Enzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor:
Vulnet: Learning Navigation in an Attack Graph. NetSoft 2024: 393-398 - [c79]Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, Guillaume Doyen:
How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya. NetSoft 2024: 399-404 - [c78]Lucian Trestioreanu, Flaviene Scheidt de Cristo, Wazen M. Shbair, Jérôme François, Damien Magoni, Radu State:
To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger. NOMS 2024: 1-7 - [i4]Greg Mirsky, Joel M. Halpern, Xiao Min, Alexander Clemm, John Strassner, Jérôme François:
Precision Availability Metrics (PAMs) for Services Governed by Service Level Objectives (SLOs). RFC 9544: 1-12 (2024) - 2023
- [j14]Mehdi Zakroum, Jérôme François, Mounir Ghogho, Isabelle Chrisment:
Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification. IEEE Access 11: 90749-90765 (2023) - [j13]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions. IEEE Trans. Netw. Serv. Manag. 20(1): 830-845 (2023) - [c77]Loris Bergeron, Jérôme François, Radu State, Jean Hilger:
ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models. IHTC 2023: 1-6 - [c76]Omar Anser, Jérôme François, Isabelle Chrisment:
Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning. NOMS 2023: 1-6 - [c75]Pierre-Marie Junges, Jérôme François, Olivier Festor:
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. NOMS 2023: 1-9 - [c74]Enzo d'Andréa, Jérôme François, Olivier Festor, Mehdi Zakroum:
Multi-label Classification of Hosts Observed through a Darknet. NOMS 2023: 1-6 - 2022
- [j12]Anthony, Shihabur Rahman Chowdhury, Tim Bai, Raouf Boutaba, Jérôme François:
Non-Intrusive and Workflow-Aware Virtual Network Function Scheduling in User-Space. IEEE Trans. Cloud Comput. 10(3): 1975-1990 (2022) - [j11]Mehdi Zakroum, Jérôme François, Isabelle Chrisment, Mounir Ghogho:
Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates. IEEE Trans. Netw. Serv. Manag. 19(4): 5170-5182 (2022) - [c73]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
NetREC: Network-wide in-network REal-value Computation. NetSoft 2022: 189-197 - [c72]Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba:
Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane. NOMS 2022: 1-9 - 2021
- [j10]Abir Laraba, Jérôme François, Shihabur Rahman Chowdhury, Isabelle Chrisment, Raouf Boutaba:
Mitigating TCP Protocol Misuse With Programmable Data Planes. IEEE Trans. Netw. Serv. Manag. 18(1): 760-774 (2021) - [j9]Adrien Hemmer, Mohamed Abderrahim, Rémi Badonnel, Jérôme François, Isabelle Chrisment:
Comparative Assessment of Process Mining for Supporting IoT Predictive Security. IEEE Trans. Netw. Serv. Manag. 18(1): 1092-1103 (2021) - [c71]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge. CNSM 2021: 437-445 - [c70]Shihabur Rahman Chowdhury, Raouf Boutaba, Jérôme François:
LINT: Accuracy-adaptive and Lightweight In-band Network Telemetry. IM 2021: 349-357 - [c69]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
InREC: In-network REal Number Computation. IM 2021: 358-366 - [c68]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Software-based Analysis of the Security by Design in Embedded Devices. IM 2021: 558-564 - [c67]Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
Leveraging in-network real-value computation for home network device recognition. IM 2021: 734-735 - [c66]Frédéric Beck, Abdelkader Lahmadi, Jérôme François:
HSL: a Cyber Security Research Facility for Sensitive Data Experiments. IM 2021: 956-961 - 2020
- [c65]Jérôme François, Alexander Clemm, Vivien Maintenant, Sébastien Tabor:
BPP over P4: Exploring Frontiers and Limits in Programmable Packet Processing. GLOBECOM 2020: 1-6 - [c64]Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba:
Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification. Networking 2020: 431-439 - [c63]Adrien Hemmer, Rémi Badonnel, Jérôme François, Isabelle Chrisment:
A Process Mining Tool for Supporting IoT Security. NOMS 2020: 1-2 - [c62]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space. WIFS 2020: 1-6 - [i3]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
A Survey of HTTPS Traffic and Services Identification Approaches. CoRR abs/2008.08339 (2020) - [i2]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
Early Identification of Services in HTTPS Traffic. CoRR abs/2008.08350 (2020)
2010 – 2019
- 2019
- [j8]Carol J. Fung, Jérôme François, Weverton Cordeiro, Mohamed Faten Zhani:
Advanced security management. Int. J. Netw. Manag. 29(3) (2019) - [j7]Sofiane Lagraa, Yutian Chen, Jérôme François:
Deep mining port scans from darknet. Int. J. Netw. Manag. 29(3) (2019) - [j6]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic. IEEE Trans. Netw. Serv. Manag. 16(3): 842-856 (2019) - [c61]Wazen M. Shbair, Mathis Steichen, Jérôme François, Radu State:
BlockZoom: Large-Scale Blockchain Testbed. IEEE ICBC 2019: 5-6 - [c60]Pierre-Marie Junges, Jérôme François, Olivier Festor:
Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis. IM 2019: 7-12 - [c59]Laurent Evrard, Jérôme François, Jean-Noël Colin:
Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis. IM 2019: 89-97 - [c58]Laurent Evrard, Jérôme François, Jean-Noël Colin, Frédéric Beck:
port2dist: Semantic Port Distances for Network Analytics. IM 2019: 747-748 - [c57]Benoit Henry, Shihabur Rahman Chowdhury, Abdelkader Lahmadi, Romain Azaïs, Jérôme François, Raouf Boutaba:
SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic. LCN 2019: 193-201 - [c56]Mohamed Abderrahim, Meryem Ouzzif, Karine Guillouard, Jérôme François, Adrien Lebre, Charles Prud'homme, Xavier Lorca:
Efficient Resource Allocation for Multi-Tenant Monitoring of Edge Infrastructures. PDP 2019: 158-165 - [e2]Joe Betser, Carol J. Fung, Alex Clemm, Jérôme François, Shingo Ata:
IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019. IFIP 2019, ISBN 978-3-903176-15-7 [contents] - 2018
- [j5]Carol J. Fung, Mohamed Faten Zhani, Weverton Cordeiro, Jérôme François:
Special issue on security for emerging open networking technologies. Int. J. Netw. Manag. 28(1) (2018) - [c55]Anthony, Shihabur Rahman Chowdhury, Tim Bai, Raouf Boutaba, Jérôme François:
UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler. CNSM 2018: 152-160 - [c54]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Passive Monitoring of HTTPS Service Use. CNSM 2018: 219-225 - [c53]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. ISI 2018: 175-180 - [c52]Quang-Vinh Dang, Jérôme François:
Utilizing attack enumerations to study SDN/NFV vulnerabilities. NetSoft 2018: 356-361 - [c51]Nida Khan, Abdelkader Lahmadi, Jérôme François, Radu State:
Towards a management plane for smart contracts: Ethereum case study. NOMS 2018: 1-6 - [c50]Wazen M. Shbair, Mathis Steichen, Jérôme François, Radu State:
Blockchain orchestration and experimentation framework: A case study of KYC. NOMS 2018: 1-6 - [c49]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models. NTMS 2018: 1-5 - [c48]Paul Chaignon, Diane Adjavon, Kahina Lazri, Jérôme François, Olivier Festor:
Offloading Security Services to the Cloud Infrastructure. SecSoN@SIGCOMM 2018: 27-32 - [c47]Paul Chaignon, Kahina Lazri, Jérôme François, Thibault Delmas, Olivier Festor:
Oko: Extending Open vSwitch with Stateful Filters. SOSR 2018: 13:1-13:13 - [i1]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. CoRR abs/1812.09790 (2018) - 2017
- [c46]Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State:
BotGM: Unsupervised graph mining to detect botnets in traffic flows. CSNet 2017: 1-8 - [c45]Mohamed Abderrahim, Meryem Ouzzif, Karine Guillouard, Jérôme François, Adrien Lebre:
A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study. FiCloud 2017: 337-344 - [c44]Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis, Olivier Festor, Nadira Lammari, Fayçal Hamdi, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend:
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. FPS 2017: 144-159 - [c43]Sofiane Lagraa, Jérôme François:
Knowledge discovery of port scans from darknet. IM 2017: 935-940 - [c42]Salvatore Signorello, Samuel Marchal, Jérôme François, Olivier Festor, Radu State:
Advanced interest flooding attacks in named-data networking. NCA 2017: 1-10 - [c41]Paul Chaignon, Kahina Lazri, Jérôme François, Olivier Festor:
Understanding disruptive monitoring capabilities of programmable networks. NetSoft 2017: 1-6 - [c40]Jérémy Charlier, Sofiane Lagraa, Radu State, Jérôme François:
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining. MIDAS@PKDD/ECML 2017: 31-42 - 2016
- [c39]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
Improving SNI-Based HTTPS Security Monitoring. ICDCS Workshops 2016: 72-77 - [c38]Jérôme François, Abdelkader Lahmadi, Valentín Giannini, Damien Cupif, Frédéric Beck, Bertrand Wallrich:
Optimizing internet scanning for assessing industrial systems exposure. IWCMC 2016: 516-522 - [c37]Lautaro Dolberg, Jérôme François, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, Thomas Engel:
A generic framework to support application-level flow management in software-defined networks. NetSoft 2016: 121-125 - [c36]Salvatore Signorello, Radu State, Jérôme François, Olivier Festor:
NDN.p4: Programming information-centric data-planes. NetSoft 2016: 384-389 - [c35]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
A multi-level framework to identify HTTPS services. NOMS 2016: 240-248 - [c34]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. NTMS 2016: 1-5 - [c33]Marc Coudriau, Abdelkader Lahmadi, Jérôme François:
Topological analysis and visualisation of network monitoring data: Darknet case study. WIFS 2016: 1-6 - 2015
- [e1]Steven Latré, Marinos Charalambides, Jérôme François, Corinna Schmitt, Burkhard Stiller:
Intelligent Mechanisms for Network Configuration and Security - 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings. Lecture Notes in Computer Science 9122, Springer 2015, ISBN 978-3-319-20033-0 [contents] - 2014
- [j4]Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
PhishStorm: Detecting Phishing With Streaming Analytics. IEEE Trans. Netw. Serv. Manag. 11(4): 458-471 (2014) - [c32]Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
PhishScore: Hacking phishers' minds. CNSM 2014: 46-54 - [c31]Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel:
Network security through software defined networking: a survey. IPTComm 2014: 6:1-6:8 - [c30]Lautaro Dolberg, Jérôme François, Thomas Engel:
Tracking spoofed locations in crowdsourced vehicular applications. NOMS 2014: 1-9 - [c29]Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State, Thomas Engel:
RAMSES: Revealing Android Malware Through String Extraction and Selection. SecureComm (1) 2014: 498-506 - [c28]Jérôme François, Olivier Festor:
Anomaly traceback using software defined networking. WIFS 2014: 203-208 - 2013
- [c27]Jérôme François, Radu State, Thomas Engel:
Aggregated representations and metrics for scalable flow analysis. CNS 2013: 478-482 - [c26]Cynthia Wagner, Jérôme François, Radu State, Alexandre Dulaunoy, Thomas Engel, Gilles Massen:
ASMATRA: Ranking ASs providing transit service to malware hosters. IM 2013: 260-268 - [c25]David Goergen, Thibault Cholez, Jérôme François, Thomas Engel:
A semantic firewall for Content-Centric Networking. IM 2013: 478-484 - [c24]Lautaro Dolberg, Jérôme François, Thomas Engel:
Multi-dimensional aggregation for DNS monitoring. LCN 2013: 390-398 - [c23]Jérôme François, Thibault Cholez, Thomas Engel:
CCN traffic optimization for IoT. NOF 2013: 1-5 - 2012
- [j3]Jérôme François, Issam Aib, Raouf Boutaba:
FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. 20(6): 1828-1841 (2012) - [c22]David Goergen, Thibault Cholez, Jérôme François, Thomas Engel:
Security Monitoring for Content-Centric Networking. DPM/SETOP 2012: 274-286 - [c21]Lautaro Dolberg, Jérôme François, Thomas Engel:
Efficient Multidimensional Aggregation for Large Scale Monitoring. LISA 2012: 163-180 - [c20]Samuel Marchal, Jérôme François, Cynthia Wagner, Thomas Engel:
Semantic Exploration of DNS. Networking (1) 2012: 370-384 - [c19]Jérôme François, Cynthia Wagner, Radu State, Thomas Engel:
SAFEM: Scalable analysis of flows with entropic measures and SVM. NOMS 2012: 510-513 - [c18]Samuel Marchal, Jérôme François, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor:
DNSSM: A large scale passive DNS security monitoring framework. NOMS 2012: 988-993 - [c17]Cynthia Wagner, Jérôme François, Radu State, Thomas Engel, Gérard Wagener, Alexandre Dulaunoy:
SDBF: Smart DNS brute-forcer. NOMS 2012: 1001-1007 - [c16]Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
Proactive Discovery of Phishing Related Domain Names. RAID 2012: 190-209 - [c15]Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
Semantic based DNS forensics. WIFS 2012: 91-96 - 2011
- [c14]Jérôme François, Giovane Cesar Moreira Moura, Aiko Pras:
Cleaning Your House First: Shifting the Paradigm on How to Secure Networks. AIMS 2011: 1-12 - [c13]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Enforcing security with behavioral fingerprinting. CNSM 2011: 1-9 - [c12]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
PTF: Passive Temporal Fingerprinting. Integrated Network Management 2011: 289-296 - [c11]Jérôme François, Shaonan Wang, Radu State, Thomas Engel:
BotTrack: Tracking Botnets Using NetFlow and PageRank. Networking (1) 2011: 1-14 - [c10]Cynthia Wagner, Jérôme François, Radu State, Thomas Engel:
Machine Learning Approach for IP-Flow Record Anomaly Detection. Networking (1) 2011: 28-39 - [c9]Cynthia Wagner, Jérôme François, Radu State, Thomas Engel:
DANAK: Finding the odd! NSS 2011: 161-168 - [c8]Jérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel:
BotCloud: Detecting botnets using MapReduce. WIFS 2011: 1-6 - 2010
- [j2]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Machine Learning Techniques for Passive Network Inventory. IEEE Trans. Netw. Serv. Manag. 7(4): 244-257 (2010) - [c7]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Semi-supervised Fingerprinting of Protocol Messages. CISIS 2010: 107-115 - [c6]Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Digital forensics in VoIP networks. WIFS 2010: 1-6
2000 – 2009
- 2009
- [b1]Jérôme François:
Robustesse et Identification des Applications Communicantes. (Robustness and Identification of Communicating Applications). Henri Poincaré University, Nancy, France, 2009 - [j1]Jérôme François, Radu State, Olivier Festor:
Botnets IRC et P2P pour une supervision à large échelle. Tech. Sci. Informatiques 28(4): 433-458 (2009) - [c5]Khalid Alsubhi, Issam Aib, Jérôme François, Raouf Boutaba:
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention. ICC 2009: 1-6 - [c4]Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Automated Behavioral Fingerprinting. RAID 2009: 182-201 - 2008
- [c3]Jérôme François, Radu State, Olivier Festor:
Towards malware inspired management frameworks. NOMS 2008: 105-112 - 2007
- [c2]Jérôme François, Radu State, Olivier Festor:
Malware Models for Network and Service Management. AIMS 2007: 192-195 - [c1]Jérôme François, Radu State, Olivier Festor:
Botnets for Scalable Management. DSOM 2007: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint