| FireCol: a collaborative protection network for the detection of flooding DDoS attacks J François, I Aib, R Boutaba IEEE/ACM Transactions on Networking (TON) 20 (6), 1828-1841, 2012 | 113 | 2012 |
| BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011, 1-14, 2011 | 106 | 2011 |
| Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, T Engel Information Forensics and Security (WIFS), 2011 IEEE International Workshop …, 2011 | 78 | 2011 |
| Phishstorm: Detecting phishing with streaming analytics S Marchal, J François, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 36 | 2014 |
| CCN traffic optimization for IoT J François, T Cholez, T Engel Network of the Future (NOF), 2013 Fourth International Conference on the, 1-5, 2013 | 36 | 2013 |
| Proactive discovery of phishing related domain names S Marchal, J François, T Engel International Workshop on Recent Advances in Intrusion Detection, 190-209, 2012 | 32 | 2012 |
| R. State, and T. Engel,“ C Wagner, J François Machine learning approach for IP-flow record anomaly detection,” in IFIP …, 2011 | 24 | 2011 |
| A collaborative approach for proactive detection of distributed denial of service attacks J François, A El-Atawy, E Al Shaer, R Boutaba | 21* | 2007 |
| Security monitoring for content-centric networking D Goergen, T Cholez, J François, T Engel Data privacy management and autonomous spontaneous security, 274-286, 2013 | 19 | 2013 |
| Malware analysis with graph kernels and support vector machines C Wagner, G Wagener, T Engel Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009 | 19 | 2009 |
| Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention K Alsubhi, I Aib, J François, R Boutaba Communications, 2009. ICC'09. IEEE International Conference on, 1-6, 2009 | 19 | 2009 |
| Machine learning approach for ip-flow record anomaly detection C Wagner, J François, T Engel International Conference on Research in Networking, 28-39, 2011 | 17 | 2011 |
| Anomaly traceback using software defined networking J François, O Festor Information Forensics and Security (WIFS), 2014 IEEE International Workshop …, 2014 | 16 | 2014 |
| Network security through software defined networking: a survey J François, L Dolberg, O Festor, T Engel Proceedings of the Conference on Principles, Systems and Applications of IP …, 2014 | 16 | 2014 |
| Ptf: Passive temporal fingerprinting J François, H Abdelnur, O Festor Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium …, 2011 | 16 | 2011 |
| DANAK: Finding the odd! C Wagner, J François, T Engel 5th International Conference on Network and System Security, 2011 | 14 | 2011 |
| Semantic exploration of DNS S Marchal, J François, C Wagner, T Engel International Conference on Research in Networking, 370-384, 2012 | 13 | 2012 |
| A multi-level framework to identify https services WM Shbair, T Cholez, J Francois, I Chrisment Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, 240-248, 2016 | 12 | 2016 |
| DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, A Dulaunoy, T Engel, O Festor Network Operations and Management Symposium (NOMS), 2012 IEEE, 988-993, 2012 | 12 | 2012 |
| PhishScore: Hacking phishers' minds S Marchal, J François, T Engel Network and Service Management (CNSM), 2014 10th International Conference on …, 2014 | 11 | 2014 |