Olivier Festor
Affiliations: | Nancy 1 |
Area:
Game theory, Reinforcement learning, Phishing detection, DNS monitoring, URL lexical analysis, Game Theory, CCN, Content, Centric, InformationGoogle:
"Olivier Festor"Children
Sign in to add traineeHassen Sallay | grad student | 2004 | Université Henri Poincaré Nancy 1. Faculté des sciences et techniques |
Guillaume Doyen | grad student | 2005 | Nancy 1 |
Mohamed Salah Bouassida | grad student | 2006 | Nancy 1 |
Vincent Cridlig | grad student | 2006 | Université Henri Poincaré Nancy 1. Faculté des sciences et techniques |
Humberto Jorge Abdelnur | grad student | 2009 | Nancy 1 |
Mohamed Nassar | grad student | 2009 | Nancy 1 |
Jérôme François | grad student | 2009 | Nancy 1 |
Gérard Wagener | grad student | 2011 | Vandoeuvre-les-Nancy, INPL |
Sheila Becker | grad student | 2012 | Université de Lorraine |
Oussema Dabbebi | grad student | 2013 | Université de Lorraine |
Martín Barrère Cambrún | grad student | 2014 | Université de Lorraine |
César Bernardini | grad student | 2015 | Université de Lorraine |
Samuel Marchal | grad student | 2015 | Université de Lorraine |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Compastié M, Badonnel R, Festor O, et al. (2020) From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models Computers & Security. 97: 101905 |
Nguyen T, Mai H, Cogranne R, et al. (2019) Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking Ieee Transactions On Information Forensics and Security. 14: 2470-2485 |
Nguyen T, Mai H, Doyen G, et al. (2018) A Security Monitoring Plane for Named Data Networking Deployment Ieee Communications Magazine. 56: 88-94 |
Dabbebi O, Badonnel R, Festor O. (2015) An Online Risk Management Strategy for VoIP Enterprise Infrastructures Journal of Network and Systems Management. 23: 137-162 |
Fournier R, Cholez T, Latapy M, et al. (2014) Comparing pedophile activity in different P2P systems The Social Sciences. 3: 314-325 |
Barrere M, Badonnel R, Festor O. (2014) Vulnerability Assessment in Autonomic Networks and Services: A Survey Ieee Communications Surveys and Tutorials. 16: 988-1004 |
Dabbebi O, Badonnel R, Festor O. (2014) Leveraging countermeasures as a service for VoIP security in the cloud International Journal of Network Management. 24: 70-84 |
Cholez T, Chrisment I, Festor O, et al. (2013) Detection and mitigation of localized attacks in a widely deployed P2P network Peer-to-Peer Networking and Applications. 6: 155-174 |
Lahmadi A, Festor O. (2012) A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services Ieee Transactions On Network and Service Management. 9: 114-127 |
Rebahi Y, Nassar M, Magedanz T, et al. (2011) A survey on fraud and service misuse in voice over IP (VoIP) networks Information Security Technical Report. 16: 12-19 |