Olivier Festor

Affiliations: 
Nancy 1 
Area:
Game theory, Reinforcement learning, Phishing detection, DNS monitoring, URL lexical analysis, Game Theory, CCN, Content, Centric, Information
Google:
"Olivier Festor"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Compastié M, Badonnel R, Festor O, et al. (2020) From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models Computers & Security. 97: 101905
Nguyen T, Mai H, Cogranne R, et al. (2019) Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking Ieee Transactions On Information Forensics and Security. 14: 2470-2485
Nguyen T, Mai H, Doyen G, et al. (2018) A Security Monitoring Plane for Named Data Networking Deployment Ieee Communications Magazine. 56: 88-94
Dabbebi O, Badonnel R, Festor O. (2015) An Online Risk Management Strategy for VoIP Enterprise Infrastructures Journal of Network and Systems Management. 23: 137-162
Fournier R, Cholez T, Latapy M, et al. (2014) Comparing pedophile activity in different P2P systems The Social Sciences. 3: 314-325
Barrere M, Badonnel R, Festor O. (2014) Vulnerability Assessment in Autonomic Networks and Services: A Survey Ieee Communications Surveys and Tutorials. 16: 988-1004
Dabbebi O, Badonnel R, Festor O. (2014) Leveraging countermeasures as a service for VoIP security in the cloud International Journal of Network Management. 24: 70-84
Cholez T, Chrisment I, Festor O, et al. (2013) Detection and mitigation of localized attacks in a widely deployed P2P network Peer-to-Peer Networking and Applications. 6: 155-174
Lahmadi A, Festor O. (2012) A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services Ieee Transactions On Network and Service Management. 9: 114-127
Rebahi Y, Nassar M, Magedanz T, et al. (2011) A survey on fraud and service misuse in voice over IP (VoIP) networks Information Security Technical Report. 16: 12-19
See more...