FireCol: a collaborative protection network for the detection of flooding DDoS attacks J François, I Aib, R Boutaba IEEE/ACM Transactions on networking 20 (6), 1828-1841, 2012 | 212 | 2012 |
PhishStorm: Detecting phishing with streaming analytics S Marchal, J François, R State, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 178 | 2014 |
BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011, 1-14, 2011 | 157 | 2011 |
Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, R State, T Engel 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 112 | 2011 |
Machine learning approach for ip-flow record anomaly detection C Wagner, J François, R State, T Engel NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 81 | 2011 |
CCN traffic optimization for IoT J François, T Cholez, T Engel 2013 Fourth international conference on the network of the future (NOF), 1-5, 2013 | 71 | 2013 |
A multi-level framework to identify https services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 67 | 2016 |
Anomaly traceback using software defined networking J François, O Festor 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 59 | 2014 |
Proactive discovery of phishing related domain names S Marchal, J François, R State, T Engel Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 53 | 2012 |
R. State, and T. Engel,“ C Wagner, J François Machine learning approach for IP-flow record anomaly detection,” in Lecture …, 2011 | 52 | 2011 |
Ndn. p4: Programming information-centric data-planes S Signorello, R State, J François, O Festor 2016 IEEE NetSoft Conference and Workshops (NetSoft), 384-389, 2016 | 42 | 2016 |
Topological analysis and visualisation of network monitoring data: Darknet case study M Coudriau, A Lahmadi, J Francois 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 36 | 2016 |
Network security through software defined networking: a survey J François, L Dolberg, O Festor, T Engel Proceedings of the Conference on Principles, Systems and Applications of IP …, 2014 | 36 | 2014 |
PhishScore: Hacking phishers' minds S Marchal, J François, R State, T Engel 10th International Conference on Network and Service Management (CNSM) and …, 2014 | 34 | 2014 |
DNSSM: A large scale passive DNS security monitoring framework S Marchal, J François, C Wagner, R State, A Dulaunoy, T Engel, O Festor 2012 IEEE Network Operations and Management Symposium, 988-993, 2012 | 33 | 2012 |
BotGM: Unsupervised graph mining to detect botnets in traffic flows S Lagraa, J François, A Lahmadi, M Miner, C Hammerschmidt, R State 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 32 | 2017 |
A holistic monitoring service for fog/edge infrastructures: a foresight study M Abderrahim, M Ouzzif, K Guillouard, J Francois, A Lebre 2017 IEEE 5th International Conference on Future Internet of Things and …, 2017 | 31 | 2017 |
Transparent and service-agnostic monitoring of encrypted web traffic PO Brissaud, J Francçis, I Chrisment, T Cholez, O Bettan IEEE Transactions on Network and Service Management 16 (3), 842-856, 2019 | 29 | 2019 |
Security monitoring for content-centric networking D Goergen, T Cholez, J François, T Engel Data Privacy Management and Autonomous Spontaneous Security: 7th …, 2013 | 29 | 2013 |
Factors influencing mass transfer during immersion cold storage of apples in NaCl/sucrose solutions T Lucas, J Francois, P Bohuon, AL Raoult-Wack LWT-Food Science and Technology 32 (6), 327-332, 1999 | 29 | 1999 |