Follow
Hoang Long MAI
Title
Cited by
Cited by
Year
Reliable detection of interest flooding attack in real deployment of named data networking
T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ...
IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019
362019
A security monitoring plane for named data networking deployment
T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ...
IEEE Communications Magazine 56 (11), 88-94, 2018
272018
Towards a security monitoring plane for named data networking and its application against content poisoning attack
HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ...
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
272018
Software defined security monitoring in 5G networks
M Liyanage, I Ahmad, J Okwuibe, EM de Oca, HL Mai, OL Perez, ...
A comprehensive guide to 5G security, 231-243, 2018
202018
On the readiness of ndn for a secure deployment: The case of pending interest table
HL Mai, NT Nguyen, G Doyen, A Ploix, R Cogranne
Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016
172016
Toward content-oriented orchestration: SDN and NFV as enabling technologies for NDN
HL Mai, M Aouadj, G Doyen, W Mallouli, EM de Oca, O Festor
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019
152019
Implementation of content poisoning attack detection and reaction in virtualized NDN networks
HL Mai, M Aouadj, G Doyen, D Kondo, X Marchal, T Cholez, EM De Oca, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
122018
Towards content-centric control plane supporting efficient anomaly detection functions
HL Mai, G Doyen, W Mallouli, EM de Oca, O Festor
2019 15th International Conference on Network and Service Management (CNSM), 1-9, 2019
32019
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users
G Doyen, T Cholez, W Mallouli, B Mathieu, HL Mai, X Marchal, D Kondo, ...
IEEE Communications Magazine 57 (6), 33-39, 2019
22019
Towards a Content-oriented Security Plane for Named Data Networking: Application to Content Poisoning Attack
HL Mai
Université de Technologie de Troyes, 2020
2020
Leveraging Icn for Efficient Security Monitoring: From Concepts to Practical Experiments
P Degezelle, A Ploix, HL Mai, W MALLAOUI, E MONTES DE OCA, ...
Available at SSRN 4957934, 0
Deployment: the case of Pending Interest Table
HL Mai, NT Nguyen, G Doyen, A Ploix, R Cogranne
The system can't perform the operation now. Try again later.
Articles 1–12