Thibault Cholez

Orcid: 0000-0002-0435-3909

According to our database1, Thibault Cholez authored at least 42 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions.
J. Netw. Syst. Manag., April, 2023

Efficient Identification of Cloud Gaming Traffic at the Edge.
Proceedings of the NOMS 2023, 2023

A Hybrid P4/NFV Architecture for Cloud Gaming Traffic Detection with Unsupervised ML.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Ethereum's Peer-to-Peer Network Monitoring and Sybil Attack Prevention.
J. Netw. Syst. Manag., 2022

Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
An open measurement dataset on the Bitcoin P2P Network.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints.
Proceedings of the 17th International Conference on Network and Service Management, 2021

A Comprehensive Study of the Bitcoin P2P Network.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

2020
Early Identification of Services in HTTPS Traffic.
CoRR, 2020

A Survey of HTTPS Traffic and Services Identification Approaches.
CoRR, 2020

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic.
IEEE Trans. Netw. Serv. Manag., 2019

An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019

2018
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Passive Monitoring of HTTPS Service Use.
Proceedings of the 14th International Conference on Network and Service Management, 2018

<i>μ</i>NDN: an orchestrated microservice architecture for named data networking.
Proceedings of the 5th ACM Conference on Information-Centric Networking, 2018

2017
An SDN and NFV Use Case: NDN Implementation and Security Monitoring.
Proceedings of the Guide to Security in SDN and NFV, 2017

Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2016
A multi-level framework to identify HTTPS services.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Improving SNI-Based HTTPS Security Monitoring.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

PIT matching from unregistered remote faces: a critical NDN vulnerability.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Server-side performance evaluation of NDN.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
Efficiently bypassing SNI-based HTTPS filtering.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
Proceedings of the ICISSP 2015, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Detection and mitigation of localized attacks in a widely deployed P2P network.
Peer-to-Peer Netw. Appl., 2013

CCN traffic optimization for IoT.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

A key management scheme for Content Centric Networking.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A semantic firewall for Content-Centric Networking.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Comparing paedophile activity in different P2P systems
CoRR, 2012

Security Monitoring for Content-Centric Networking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus. (Monitoring of structured peer-to-peer networks applied to the security of contents).
PhD thesis, 2011

Content pollution quantification in large P2P networks : A measurement study on KAD.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

BitTorrent's Mainline DHT Security Assessment.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

When KAD Meets BitTorrent - Building a Stronger P2P Network.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

2010
Efficient DHT attack mitigation through peers' ID distribution.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Monitoring and Controlling Content Access in KAD.
Proceedings of IEEE International Conference on Communications, 2010

2009
Evaluation of Sybil Attacks Protection Schemes in KAD.
Proceedings of the Scalability of Networks and Services, 2009

2008
A Distributed and Adaptive Revocation Mechanism for P2P Networks.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008


  Loading...