Reliable detection of interest flooding attack in real deployment of named data networking T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ... IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019 | 36 | 2019 |
A security monitoring plane for named data networking deployment T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ... IEEE Communications Magazine 56 (11), 88-94, 2018 | 27 | 2018 |
Towards a security monitoring plane for named data networking and its application against content poisoning attack HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ... NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018 | 27 | 2018 |
Software defined security monitoring in 5G networks M Liyanage, I Ahmad, J Okwuibe, EM de Oca, HL Mai, OL Perez, ... A comprehensive guide to 5G security, 231-243, 2018 | 20 | 2018 |
On the readiness of ndn for a secure deployment: The case of pending interest table HL Mai, NT Nguyen, G Doyen, A Ploix, R Cogranne Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016 | 17 | 2016 |
Toward content-oriented orchestration: SDN and NFV as enabling technologies for NDN HL Mai, M Aouadj, G Doyen, W Mallouli, EM de Oca, O Festor 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 15 | 2019 |
Implementation of content poisoning attack detection and reaction in virtualized NDN networks HL Mai, M Aouadj, G Doyen, D Kondo, X Marchal, T Cholez, EM De Oca, ... 2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018 | 12 | 2018 |
Towards content-centric control plane supporting efficient anomaly detection functions HL Mai, G Doyen, W Mallouli, EM de Oca, O Festor 2019 15th International Conference on Network and Service Management (CNSM), 1-9, 2019 | 3 | 2019 |
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users G Doyen, T Cholez, W Mallouli, B Mathieu, HL Mai, X Marchal, D Kondo, ... IEEE Communications Magazine 57 (6), 33-39, 2019 | 2 | 2019 |
Towards a Content-oriented Security Plane for Named Data Networking: Application to Content Poisoning Attack HL Mai Université de Technologie de Troyes, 2020 | | 2020 |
Leveraging Icn for Efficient Security Monitoring: From Concepts to Practical Experiments P Degezelle, A Ploix, HL Mai, W MALLAOUI, E MONTES DE OCA, ... Available at SSRN 4957934, 0 | | |
Deployment: the case of Pending Interest Table HL Mai, NT Nguyen, G Doyen, A Ploix, R Cogranne | | |