Olivier Festor

Orcid: 0000-0002-3181-7967

Affiliations:
  • INRIA, France


According to our database1, Olivier Festor authored at least 202 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services.
J. Netw. Syst. Manag., March, 2024

2023
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions.
J. Netw. Syst. Manag., April, 2023

Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions.
IEEE Trans. Netw. Serv. Manag., March, 2023

Multi-label Classification of Hosts Observed through a Darknet.
Proceedings of the NOMS 2023, 2023

HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots.
Proceedings of the NOMS 2023, 2023

Efficient Identification of Cloud Gaming Traffic at the Edge.
Proceedings of the NOMS 2023, 2023

2022
NetREC: Network-wide in-network REal-value Computation.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

2021
Towards Automating Security Enhancement for Cloud Services.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Software-based Analysis of the Security by Design in Embedded Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Leveraging in-network real-value computation for home network device recognition.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

InREC: In-network REal Number Computation.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge.
Proceedings of the 17th International Conference on Network and Service Management, 2021

An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models.
Comput. Secur., 2020

2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019

An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019

A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Commun. Mag., 2018

Oko: Extending Open vSwitch with Stateful Filters.
Proceedings of the Symposium on SDN Research, 2018

Offloading Security Services to the Cloud Infrastructure.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Unikernel-based approach for software-defined security in cloud infrastructures.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

<i>μ</i>NDN: an orchestrated microservice architecture for named data networking.
Proceedings of the 5th ACM Conference on Information-Centric Networking, 2018

2017
Understanding disruptive monitoring capabilities of programmable networks.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

Advanced interest flooding attacks in named-data networking.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Towards a Software-Defined Security Framework for Supporting Distributed Cloud.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

NDN.p4: Programming information-centric data-planes.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

PIT matching from unregistered remote faces: a critical NDN vulnerability.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Server-side performance evaluation of NDN.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
An Online Risk Management Strategy for VoIP Enterprise Infrastructures.
J. Netw. Syst. Manag., 2015

A platform for the analysis and visualization of network flow data of android environments.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards cloud-based compositions of security functions for mobile devices.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015

Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
Proceedings of the ICISSP 2015, 2015

A Comparison of Caching Strategies for Content Centric Networking.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Behavioral and dynamic security functions chaining for Android devices.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Exploring IoT Protocols Through the Information-Centric Networking's Lens.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Leveraging countermeasures as a service for VoIP security in the cloud.
Int. J. Netw. Manag., 2014

Vulnerability Assessment in Autonomic Networks and Services: A Survey.
IEEE Commun. Surv. Tutorials, 2014

Anomaly traceback using software defined networking.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

CrowdOut: A mobile crowdsourcing service for road safety in digital cities.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Group-Based Characterization for the I2P Anonymous File-Sharing Environment.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A SAT-based autonomous strategy for security vulnerability management.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Named data aggregation in wireless sensor networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Socially-aware caching strategy for content centric networking.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

A Pin is worth a thousand words: Characterization of publications in Pinterest.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Network security through software defined networking: a survey.
Proceedings of the Conference on Principles, 2014

Empirical analysis of Android logs using self-organizing maps.
Proceedings of the IEEE International Conference on Communications, 2014

SONETOR: A social network traffic generator.
Proceedings of the IEEE International Conference on Communications, 2014

Outsourcing Mobile Security in the Cloud.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
The Common Log Format (CLF) for the Session Initiation Protocol (SIP): Framework and Information Model.
RFC, February, 2013

Detection and mitigation of localized attacks in a widely deployed P2P network.
Peer-to-Peer Netw. Appl., 2013

Accurate Online Estimation of Battery Lifetime for Wireless Sensors Network.
Proceedings of the SENSORNETS 2013, 2013

Energy-based Metric for the Routing Protocol in Low-power and Lossy Network.
Proceedings of the SENSORNETS 2013, 2013

Monitoring anonymous P2P file-sharing systems.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Ovaldroid: An OVAL-based vulnerability assessment framework for Android.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Improving present security through the detection of past hidden vulnerable states.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

MPC: Popularity-based caching strategy for content centric networks.
Proceedings of IEEE International Conference on Communications, 2013

Efficient distributed monitoring in 6LoWPAN networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

A probabilistic cost-efficient approach for mobile security assessment.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Cache Management Strategy for CCN Based on Content Popularity.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services.
IEEE Trans. Netw. Serv. Manag., 2012

Online Estimation of Battery Lifetime for Wireless Sensors Network
CoRR, 2012

Comparing paedophile activity in different P2P systems
CoRR, 2012

I2P's Usage Characterization.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

A Bird's Eye View on the I2P Anonymous File-Sharing Environment.
Proceedings of the Network and System Security - 6th International Conference, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Dynamic exposure control in P2PSIP networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Towards the assessment of distributed vulnerabilities in autonomic networks and systems.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A trust-based strategy for addressing residual attacks in the RELOAD architecture.
Proceedings of IEEE International Conference on Communications, 2012

A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Improving Content Availability in the I2P Anonymous File-Sharing Environment.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Routing based roles assignment for monitoring 6LowPAN networks.
Proceedings of the Third International Conference on Communications and Networking, 2012

Collaborative remediation of configuration vulnerabilities in autonomic networks and systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
A survey on fraud and service misuse in voice over IP (VoIP) networks.
Inf. Secur. Tech. Rep., 2011

Using decision trees for generating adaptive SPIT signatures.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Content pollution quantification in large P2P networks : A measurement study on KAD.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

BitTorrent's Mainline DHT Security Assessment.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

When KAD Meets BitTorrent - Building a Stronger P2P Network.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

YANG-based configuration modeling - The SecSIP IPS case study -.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

PTF: Passive Temporal Fingerprinting.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Artemisa: An open-source honeypot back-end to support security in VoIP domains.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Hinky: Defending against Text-Based Message Spam on Smartphones.
Proceedings of IEEE International Conference on Communications, 2011

Enforcing security with behavioral fingerprinting.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Supporting vulnerability awareness in autonomic networks and systems with OVAL.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Econometric Feedback for Runtime Risk Management in VoIP Architectures.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

Towards Vulnerability Prevention in Autonomic Networks and Systems.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Advanced fuzzing in the VoIP space.
J. Comput. Virol., 2010

Machine Learning Techniques for Passive Network Inventory.
IEEE Trans. Netw. Serv. Manag., 2010

Special issue on virtualization.
Int. J. Netw. Manag., 2010

Autonomic renumbering in the future iInternet.
IEEE Commun. Mag., 2010

Digital forensics in VoIP networks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

A Framework for Monitoring SIP Enterprise Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Improving Fuzz Testing Using Game Theory.
Proceedings of the Fourth International Conference on Network and System Security, 2010

WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

End-to-end YANG-based configuration management.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

VeTo: An exploit prevention language from known vulnerabilities in SIP services.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Automated runtime risk management for voice over IP networks and services.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Multi-modeling and Co-simulation-Based Mobile Ubiquitous Protocols and Services Development and Assessment.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Efficient DHT attack mitigation through peers' ID distribution.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Labeled VoIP Data-Set for Intrusion Detection Evaluation.
Proceedings of the Networked Services and Applications, 2010

Monitoring and Controlling Content Access in KAD.
Proceedings of IEEE International Conference on Communications, 2010

Risk management in VoIP infrastructures using support vector machines.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Automated and secure IPv6 configuration in enterprise networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Semi-supervised Fingerprinting of Protocol Messages.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Managing Risks at Runtime in VoIP Networks and Services.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Caractérisation des délais dans les applications de supervision de réseaux et de services.
Tech. Sci. Informatiques, 2009

Botnets IRC et P2P pour une supervision à large échelle.
Tech. Sci. Informatiques, 2009

Survey of SNMP performance analysis studies.
Int. J. Netw. Manag., 2009

jYang : A YANG parser in java
CoRR, 2009

Automated Behavioral Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Ontological Configuration Management for Wireless Mesh Routers.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

SecSip: A stateful firewall for SIP-based networks.
Proceedings of the Integrated Network Management, 2009

Performance of network and service monitoring frameworks.
Proceedings of the Integrated Network Management, 2009

Monitoring and counter-profiling for Voice over IP networks and services.
Proceedings of the Integrated Network Management, 2009

Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits.
Proceedings of the Eighth International Conference on Networks, 2009

VoIP Malware: Attack Tool & Attack Scenarios.
Proceedings of IEEE International Conference on Communications, 2009

09052 Report - Management of the Future Internet.
Proceedings of the Management of the Future Internet, 27.01. - 30.01.2009, 2009

Flow Monitoring in Wireless MESH Networks.
Proceedings of the Scalability of Networks and Services, 2009

Evaluation of Sybil Attacks Protection Schemes in KAD.
Proceedings of the Scalability of Networks and Services, 2009

2008
Group Key Management in MANETs.
Int. J. Netw. Secur., 2008

Self-configurable fault monitoring in ad-hoc networks.
Ad Hoc Networks, 2008

Monitoring SIP Traffic Using Support Vector Machines.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Advanced Network Fingerprinting.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards malware inspired management frameworks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Distributed and Adaptive Revocation Mechanism for P2P Networks.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Malware: a future framework for device, network and service management.
J. Comput. Virol., 2007

A Probabilistic Approach for Managing Mobile Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2007

Key research challenges in network management.
IEEE Commun. Mag., 2007

Automated verification of a key management architecture for hierarchical group protocols.
Ann. des Télécommunications, 2007

KiF: a stateful SIP fuzzer.
Proceedings of the Principles, 2007

VoIP Honeypot Architecture.
Proceedings of the Integrated Network Management, 2007

A model for checking consistency in access control policies for network management.
Proceedings of the Integrated Network Management, 2007

Botnets for Scalable Management.
Proceedings of the Managing Virtualization of Networks and Services, 2007

IBGP Confederation Provisioning.
Proceedings of the Inter-Domain Management, 2007

On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study.
Proceedings of the Inter-Domain Management, 2007

Modeling and Performance Evaluation of the Network and Service Management Plane.
Proceedings of the Inter-Domain Management, 2007

Malware Models for Network and Service Management.
Proceedings of the Inter-Domain Management, 2007

2006
Role-Based Access Control for XML enabled multi-protocol management gateways.
IEEE Trans. Netw. Serv. Manag., 2006

XBGP-MAN: an XML management architecture for BGP.
Int. J. Netw. Manag., 2006

Intrusion detection mechanisms for VoIP applications
CoRR, 2006

Mobility-awareness in group key management protocols within MANETs.
Ann. des Télécommunications, 2006

A VoIP Security Management Architecture.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Probabilistic Management of Ad-Hoc Networks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Fault Monitoring in Ad-Hoc Networks Based on Information Theory.
Proceedings of the NETWORKING 2006, 2006

Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

On Delays in Management Frameworks: Metrics, Models and Analysis.
Proceedings of the Large Scale Management of Distributed Systems, 2006

2005
Self-Organized Monitoring in Ad-Hoc Networks.
Telecommun. Syst., 2005

Managing New Networked Worlds - A Report on IM 2005.
J. Netw. Syst. Manag., 2005

A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks.
J. Netw. Syst. Manag., 2005

Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005

Efficient Clustering for Multicast Key Distribution in MANETs.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

An integrated security framework for XML based management.
Proceedings of the Integrated Network Management, 2005

Management of mobile ad-hoc networks: evaluating the network behavior.
Proceedings of the Integrated Network Management, 2005

Performance Management of Peer-to-Peer Distributed Hash Tables.
Proceedings of the EUNICE 2005: Networks and Applications Towards a Ubiquitously Connected World, 2005

Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks.
Proceedings of the Networking, 2005

On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study.
Proceedings of the Ambient Networks, 2005

A Hierarchical Architecture for a Distributed Management of P2P Networks and Services.
Proceedings of the Ambient Networks, 2005

2004
Guest editorial - XML-based management of networks and services.
IEEE Commun. Mag., 2004

A Managed Bandwidth Reservation Protocol for Ad Hoc Networks.
Proceedings of the First International Workshop, 2004

An extensible agent toolkit for device management.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework.
Proceedings of the Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, 2004

A CIM Extension for Peer-to-Peer Network and Service Management.
Proceedings of the Telecommunications and Networking, 2004

Role-Based Access Control for XML Enabled Management Gateways.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
Management of Peer-to-Peer Networks Applied to Instant Messaging.
Proceedings of the Management of Multimedia Networks and Services, 2003

Management of Wireless Dynamic Infrastructures.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A Highly Distributed Dynamic IP Multicast Accounting and Management Framework.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

A SMIng Based Policy Access Control for SNMPv3.
Proceedings of the High Speed Networks and Multimedia Communications, 2003

Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments.
Proceedings of the Self-Managing Distributed Systems, 2003

2002
Managing Highly Dynamic Services Using Extended Temporal Information Models.
J. Netw. Syst. Manag., 2002

Internet Services: Management Beyond the ElementA Report on DSOM'2001.
J. Netw. Syst. Manag., 2002

A distributed management platform for integrated multicast monitoring.
Proceedings of the Management Solutions for the New Communications World, 2002

A hierarchical topology discovery service for IPv6 networks.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Managing Highly Dynamic Services Using Extended Temporal Network Information Models.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
J<sup>TMN</sup>: a Java-based TMN development and experimentation environment.
IEEE J. Sel. Areas Commun., 2000

A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

A Java based implementation of a network level information model for the ATM/frame relay interconnection.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

COJ: a free CMIS compliant Java API and its various implementations.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture.
Proceedings of the Services Management in Intelligent Networks, 2000

1999
Integration of WBEM-based Management Agents in the OSI Framework.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

1998
Management Information Model Engineering.
J. Netw. Syst. Manag., 1998

1997
A practical experience on validating GDMO-based information models with SDL'88 and SDL'92.
Proceedings of the SDL '97 Time for Testing, 1997

RelMan: A GRM-based Relationship Manager.
Proceedings of the Integrated Network Management V, 1997

1996
Executable TMN-specifications in TIMS.
Proceedings of the 1996 Network Operations and Management Symposium, 1996

1995
MODE: a development environment for managed objects based on formal methods.
Proceedings of the Integrated Network Management IV, 1995

1994
Formalisation du comportement des objets gérés dans le cadre du modele OSI. (Formal description of managed object behaviour in the osi management framework).
PhD thesis, 1994

1993
Formal Description of Managed Object Behavior - A Rule Based Approach.
Proceedings of the Integrated Network Management III, 1993


  Loading...