Rémi Badonnel

Orcid: 0000-0001-9213-4695

Affiliations:
  • LORIA, France


According to our database1, Rémi Badonnel authored at least 80 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services.
J. Netw. Syst. Manag., March, 2024

2022
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022

An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Managing Security for the Cyber-Space - From Smart Monitoring to Automated Configuration. (Gestion de la Sécurité pour le Cyber-Espace - Du Monitorage Intelligent à la Configuration Automatique).
, 2022

2021
Comparative Assessment of Process Mining for Supporting IoT Predictive Security.
IEEE Trans. Netw. Serv. Manag., 2021

Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag., 2021

CNSM 2019 special issue: Embracing the new wave of artificial intelligence.
Int. J. Netw. Manag., 2021

Towards Automating Security Enhancement for Cloud Services.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures.
Proceedings of the 17th International Conference on Network and Service Management, 2021

PESTLE Analysis of Cybersecurity Education.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems.
IEEE Trans. Netw. Serv. Manag., 2020

From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models.
Comput. Secur., 2020

A Process Mining Tool for Supporting IoT Security.
Proceedings of the NOMS 2020, 2020

A Process Mining Approach for Supporting IoT Predictive Security.
Proceedings of the NOMS 2020, 2020

2019
IoT Security Approaches in Social Robots for Ambient Assisted Living Scenarios.
Proceedings of the 22nd International Symposium on Wireless Personal Multimedia Communications, 2019

A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

A Tool Suite for the Automated Synthesis of Security Function Chains.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Automated Factorization of Security Chains in Software-Defined Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Updated Taxonomy for the Network and Service Management Research Field.
J. Netw. Syst. Manag., 2018

Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.
J. Netw. Syst. Manag., 2018

Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2018

Generation of SDN policies for protecting android environments based on automata learning.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Synaptic: A formal checker for SDN-based security policies.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Unikernel-based approach for software-defined security in cloud infrastructures.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks.
IEEE Trans. Netw. Serv. Manag., 2017

Softwarization of networks, clouds, and internet of things.
Int. J. Netw. Manag., 2017

Special Issue on management of SDN/NFV-based systems.
Int. J. Netw. Manag., 2017

Automated verification of security chains in software-defined networks with synaptic.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

Towards a Software-Defined Security Framework for Supporting Distributed Cloud.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
A Taxonomy of Attacks in RPL-based Internet of Things.
Int. J. Netw. Secur., 2016

Using the RPL protocol for supporting passive monitoring in the Internet of Things.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Detecting version number attacks in RPL-based networks using a distributed monitoring architecture.
Proceedings of the 12th International Conference on Network and Service Management, 2016

A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Analysis and Evaluation of OpenFlow Message Usage for Security Applications.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
An Online Risk Management Strategy for VoIP Enterprise Infrastructures.
J. Netw. Syst. Manag., 2015

Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks.
Int. J. Netw. Manag., 2015

Towards cloud-based compositions of security functions for mobile devices.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015

Behavioral and dynamic security functions chaining for Android devices.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2014
Leveraging countermeasures as a service for VoIP security in the cloud.
Int. J. Netw. Manag., 2014

Vulnerability Assessment in Autonomic Networks and Services: A Survey.
IEEE Commun. Surv. Tutorials, 2014

A SAT-based autonomous strategy for security vulnerability management.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Addressing DODAG inconsistency attacks in RPL networks.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

A Study of RPL DODAG Version Attacks.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Outsourcing Mobile Security in the Cloud.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Ovaldroid: An OVAL-based vulnerability assessment framework for Android.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Improving present security through the detection of past hidden vulnerable states.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A probabilistic cost-efficient approach for mobile security assessment.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Monitoring and Security for the Internet of Things.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Dynamic exposure control in P2PSIP networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Towards the assessment of distributed vulnerabilities in autonomic networks and systems.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A trust-based strategy for addressing residual attacks in the RELOAD architecture.
Proceedings of IEEE International Conference on Communications, 2012

Collaborative remediation of configuration vulnerabilities in autonomic networks and systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Supporting vulnerability awareness in autonomic networks and systems with OVAL.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Econometric Feedback for Runtime Risk Management in VoIP Architectures.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

Towards Vulnerability Prevention in Autonomic Networks and Systems.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Automated runtime risk management for voice over IP networks and services.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Risk management in VoIP infrastructures using support vector machines.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Managing Risks at Runtime in VoIP Networks and Services.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Monitoring and counter-profiling for Voice over IP networks and services.
Proceedings of the Integrated Network Management, 2009

2008
Self-configurable fault monitoring in ad-hoc networks.
Ad Hoc Networks, 2008

Dynamic pull-based load balancing for autonomic servers.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process.
Proceedings of the Resilient Networks and Services, 2008

On Service Orchestration in Mobile Computing Environments.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2007

Fault Detection in Autonomic Networks Using the Concept of Promised Cooperation.
Proceedings of the Managing Virtualization of Networks and Services, 2007

2006
Supervision des Réseaux et Services Ad-Hoc. (Management of Ad-Hoc Networks and Services).
PhD thesis, 2006

Probabilistic Management of Ad-Hoc Networks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Fault Monitoring in Ad-Hoc Networks Based on Information Theory.
Proceedings of the NETWORKING 2006, 2006

2005
Self-Organized Monitoring in Ad-Hoc Networks.
Telecommun. Syst., 2005

A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks.
J. Netw. Syst. Manag., 2005

Management of mobile ad hoc networks: information model and probe-based architecture.
Int. J. Netw. Manag., 2005

Management of mobile ad-hoc networks: evaluating the network behavior.
Proceedings of the Integrated Network Management, 2005

Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks.
Proceedings of the Networking, 2005

2004
Automating the Provisioning of Application Services with the BPEL4WS Workflow Language.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004


  Loading...