Isabelle Chrisment

Orcid: 0000-0002-8474-0019

According to our database1, Isabelle Chrisment authored at least 75 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification.
IEEE Access, 2023

Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning.
Proceedings of the NOMS 2023, 2023

2022
Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates.
IEEE Trans. Netw. Serv. Manag., December, 2022

Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Mitigating TCP Protocol Misuse With Programmable Data Planes.
IEEE Trans. Netw. Serv. Manag., 2021

Comparative Assessment of Process Mining for Supporting IoT Predictive Security.
IEEE Trans. Netw. Serv. Manag., 2021

Empowering mobile crowdsourcing apps with user privacy control.
J. Parallel Distributed Comput., 2021

An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Early Identification of Services in HTTPS Traffic.
CoRR, 2020

A Survey of HTTPS Traffic and Services Identification Approaches.
CoRR, 2020

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

A Process Mining Tool for Supporting IoT Security.
Proceedings of the NOMS 2020, 2020

A Process Mining Approach for Supporting IoT Predictive Security.
Proceedings of the NOMS 2020, 2020

Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification.
Proceedings of the 2020 IFIP Networking Conference, 2020

Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

Capturing Privacy-Preserving User Contexts with IndoorHash.
Proceedings of the Distributed Applications and Interoperable Systems, 2020

2019
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic.
IEEE Trans. Netw. Serv. Manag., 2019

Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Testing nearby peer-to-peer mobile apps at large.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps.
Proceedings of the Distributed Applications and Interoperable Systems, 2019

2018
Passive Monitoring of HTTPS Service Use.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks.
IEEE Trans. Netw. Serv. Manag., 2017

ANDROFLEET: testing WiFi peer-to-peer mobile apps in the large.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A Taxonomy of Attacks in RPL-based Internet of Things.
Int. J. Netw. Secur., 2016

A multi-level framework to identify HTTPS services.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Using the RPL protocol for supporting passive monitoring in the Internet of Things.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Green growth in NDN: Deployment of content stores.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2016

Improving SNI-Based HTTPS Security Monitoring.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Detecting version number attacks in RPL-based networks using a distributed monitoring architecture.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Exploring Smartphone Application Usage Logs with Declared Sociological Information.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks.
Int. J. Netw. Manag., 2015

Refining smartphone usage analysis by combining crowdsensing and survey.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

SRSC: SDN-based routing scheme for CCN.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Efficiently bypassing SNI-based HTTPS filtering.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
Proceedings of the ICISSP 2015, 2015

2014
Group-Based Characterization for the I2P Anonymous File-Sharing Environment.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Addressing DODAG inconsistency attacks in RPL networks.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

A Study of RPL DODAG Version Attacks.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Detection and mitigation of localized attacks in a widely deployed P2P network.
Peer-to-Peer Netw. Appl., 2013

Monitoring anonymous P2P file-sharing systems.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Monitoring and Security for the Internet of Things.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Comparing paedophile activity in different P2P systems
CoRR, 2012

I2P's Usage Characterization.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

A Bird's Eye View on the I2P Anonymous File-Sharing Environment.
Proceedings of the Network and System Security - 6th International Conference, 2012

Improving Content Availability in the I2P Anonymous File-Sharing Environment.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Content pollution quantification in large P2P networks : A measurement study on KAD.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

BitTorrent's Mainline DHT Security Assessment.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

When KAD Meets BitTorrent - Building a Stronger P2P Network.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

2010
Formal verification of secure group communication protocols modelled in UML.
Innov. Syst. Softw. Eng., 2010

Autonomic renumbering in the future iInternet.
IEEE Commun. Mag., 2010

Efficient DHT attack mitigation through peers' ID distribution.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Monitoring and Controlling Content Access in KAD.
Proceedings of IEEE International Conference on Communications, 2010

Automated and secure IPv6 configuration in enterprise networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Evaluation of Sybil Attacks Protection Schemes in KAD.
Proceedings of the Scalability of Networks and Services, 2009

2008
Group Key Management in MANETs.
Int. J. Netw. Secur., 2008

A Distributed and Adaptive Revocation Mechanism for P2P Networks.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Automated verification of a key management architecture for hierarchical group protocols.
Ann. des Télécommunications, 2007

Assessing the security of VoIP Services.
Proceedings of the Integrated Network Management, 2007

2006
Mobility-awareness in group key management protocols within MANETs.
Ann. des Télécommunications, 2006

Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Efficient Clustering for Multicast Key Distribution in MANETs.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Maîtrise de la dynamique dans l'Internet - de l'adaptation des protocoles à la sécurité des services. (Control of dynamics in the Internet - from the adaptation of protocols to the security of services).
, 2005

2004
Gestion efficace de la sécurité des communications de groupe pour le service SSM.
Tech. Sci. Informatiques, 2004

An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

2003
Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments.
Proceedings of the Self-Managing Distributed Systems, 2003

2002
A secure SSM architecture.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

2001
Dynamic Group Key Management Protocol.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Dynamic Group Communication Security.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

1998
An ALF communication architecture: design and automated implementation.
IEEE J. Sel. Areas Commun., 1998

1996
Evaluating the impact of ALF on communication subsystems design and performance.
J. High Speed Networks, 1996

ALF/ILP Based Automated Implementation of Distributed Applications.
Aust. Comput. J., 1996

ALFred, a Protocol Compiler for the Automated Implementation of Distributed Applications.
Proceedings of the 5th International Symposium on High Performance Distributed Computing (HPDC '96), 1996

1995
Application level framing and automated implementation.
Proceedings of the High Performance Networking VI, 1995

1994
A Remote Operations System Tailored to Application Requirements.
Proceedings of the Upper Layer Protocols, 1994


  Loading...