Jérôme François

Orcid: 0000-0002-7457-458X

According to our database1, Jérôme François authored at least 93 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions.
IEEE Trans. Netw. Serv. Manag., March, 2023

Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification.
IEEE Access, 2023

Multi-label Classification of Hosts Observed through a Darknet.
Proceedings of the NOMS 2023, 2023

HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots.
Proceedings of the NOMS 2023, 2023

Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning.
Proceedings of the NOMS 2023, 2023

2022
Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates.
IEEE Trans. Netw. Serv. Manag., December, 2022

Non-Intrusive and Workflow-Aware Virtual Network Function Scheduling in User-Space.
IEEE Trans. Cloud Comput., 2022

Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

NetREC: Network-wide in-network REal-value Computation.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

2021
Mitigating TCP Protocol Misuse With Programmable Data Planes.
IEEE Trans. Netw. Serv. Manag., 2021

Comparative Assessment of Process Mining for Supporting IoT Predictive Security.
IEEE Trans. Netw. Serv. Manag., 2021

Software-based Analysis of the Security by Design in Embedded Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Leveraging in-network real-value computation for home network device recognition.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

InREC: In-network REal Number Computation.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

LINT: Accuracy-adaptive and Lightweight In-band Network Telemetry.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

HSL: a Cyber Security Research Facility for Sensitive Data Experiments.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Early Identification of Services in HTTPS Traffic.
CoRR, 2020

A Survey of HTTPS Traffic and Services Identification Approaches.
CoRR, 2020

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

A Process Mining Tool for Supporting IoT Security.
Proceedings of the NOMS 2020, 2020

Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification.
Proceedings of the 2020 IFIP Networking Conference, 2020

BPP over P4: Exploring Frontiers and Limits in Programmable Packet Processing.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic.
IEEE Trans. Netw. Serv. Manag., 2019

Deep mining port scans from darknet.
Int. J. Netw. Manag., 2019

Advanced security management.
Int. J. Netw. Manag., 2019

Efficient Resource Allocation for Multi-Tenant Monitoring of Edge Infrastructures.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

port2dist: Semantic Port Distances for Network Analytics.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

BlockZoom: Large-Scale Blockchain Testbed.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2018
Special issue on security for emerging open networking technologies.
Int. J. Netw. Manag., 2018

Oko: Extending Open vSwitch with Stateful Filters.
Proceedings of the Symposium on SDN Research, 2018

Offloading Security Services to the Cloud Infrastructure.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Blockchain orchestration and experimentation framework: A case study of KYC.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a management plane for smart contracts: Ethereum case study.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Utilizing attack enumerations to study SDN/NFV vulnerabilities.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Passive Monitoring of HTTPS Service Use.
Proceedings of the 14th International Conference on Network and Service Management, 2018

UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), 2017

Understanding disruptive monitoring capabilities of programmable networks.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

Advanced interest flooding attacks in named-data networking.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Knowledge discovery of port scans from darknet.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

BotGM: Unsupervised graph mining to detect botnets in traffic flows.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Topological analysis and visualisation of network monitoring data: Darknet case study.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

A multi-level framework to identify HTTPS services.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

NDN.p4: Programming information-centric data-planes.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

A generic framework to support application-level flow management in software-defined networks.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Optimizing internet scanning for assessing industrial systems exposure.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Improving SNI-Based HTTPS Security Monitoring.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

2014
PhishStorm: Detecting Phishing With Streaming Analytics.
IEEE Trans. Netw. Serv. Manag., 2014

Anomaly traceback using software defined networking.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

RAMSES: Revealing Android Malware Through String Extraction and Selection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Tracking spoofed locations in crowdsourced vehicular applications.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Network security through software defined networking: a survey.
Proceedings of the Conference on Principles, 2014

PhishScore: Hacking phishers' minds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
CCN traffic optimization for IoT.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

Multi-dimensional aggregation for DNS monitoring.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A semantic firewall for Content-Centric Networking.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Aggregated representations and metrics for scalable flow analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
FireCol: a collaborative protection network for the detection of flooding DDoS attacks.
IEEE/ACM Trans. Netw., 2012

Semantic based DNS forensics.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Proactive Discovery of Phishing Related Domain Names.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

SAFEM: Scalable analysis of flows with entropic measures and SVM.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Semantic Exploration of DNS.
Proceedings of the NETWORKING 2012, 2012

Efficient Multidimensional Aggregation for Large Scale Monitoring.
Proceedings of the Strategies, 2012

Security Monitoring for Content-Centric Networking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
BotCloud: Detecting botnets using MapReduce.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

DANAK: Finding the odd!
Proceedings of the 5th International Conference on Network and System Security, 2011

Machine Learning Approach for IP-Flow Record Anomaly Detection.
Proceedings of the NETWORKING 2011, 2011

BotTrack: Tracking Botnets Using NetFlow and PageRank.
Proceedings of the NETWORKING 2011, 2011

PTF: Passive Temporal Fingerprinting.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Enforcing security with behavioral fingerprinting.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Cleaning Your House First: Shifting the Paradigm on How to Secure Networks.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Machine Learning Techniques for Passive Network Inventory.
IEEE Trans. Netw. Serv. Manag., 2010

Digital forensics in VoIP networks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Semi-supervised Fingerprinting of Protocol Messages.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Robustesse et Identification des Applications Communicantes. (Robustness and Identification of Communicating Applications).
PhD thesis, 2009

Botnets IRC et P2P pour une supervision à large échelle.
Tech. Sci. Informatiques, 2009

Automated Behavioral Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention.
Proceedings of IEEE International Conference on Communications, 2009

2008
Towards malware inspired management frameworks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2007
Botnets for Scalable Management.
Proceedings of the Managing Virtualization of Networks and Services, 2007

Malware Models for Network and Service Management.
Proceedings of the Inter-Domain Management, 2007


  Loading...