A Taxonomy of Attacks in RPL-based Internet of Things A Mayzaud, R Badonnel, I Chrisment International Journal of Network Security 18 (3), 459-473,, 2016 | 170 | 2016 |
Group Key Management in MANETs. MS Bouassida, I Chrisment, O Festor IJ Network Security 6 (1), 67-79, 2008 | 98 | 2008 |
A study of RPL DODAG version attacks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder IFIP international conference on autonomous infrastructure, management and …, 2014 | 81 | 2014 |
Evaluation of sybil attacks protection schemes in kad T Cholez, I Chrisment, O Festor IFIP International Conference on Autonomous Infrastructure, Management and …, 2009 | 54 | 2009 |
Monitoring the neighbor discovery protocol F Beck, T Cholez, O Festor, I Chrisment 2007 International Multi-Conference on Computing in the Global Information …, 2007 | 50 | 2007 |
A distributed monitoring strategy for detecting version number attacks in RPL-based networks A Mayzaud, R Badonnel, I Chrisment IEEE Transactions on Network and Service Management 14 (2), 472-486, 2017 | 48 | 2017 |
A multi-level framework to identify https services WM Shbair, T Cholez, J Francois, I Chrisment NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 240-248, 2016 | 46 | 2016 |
Addressing DODAG inconsistency attacks in RPL networks A Sehgal, A Mayzaud, R Badonnel, I Chrisment, J Schönwälder 2014 Global Information Infrastructure and Networking Symposium (GIIS), 1-8, 2014 | 45 | 2014 |
Dynamic group communication security G Chaddoud, I Chrisment, A Schaff Proceedings. Sixth IEEE symposium on computers and communications, 49-56, 2001 | 43 | 2001 |
SRSC: SDN-based routing scheme for CCN E Aubry, T Silverston, I Chrisment Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 40 | 2015 |
Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder International Journal of Network Management 25 (5), 320-339, 2015 | 34 | 2015 |
Detection and mitigation of localized attacks in a widely deployed P2P network T Cholez, I Chrisment, O Festor, G Doyen Peer-to-Peer Networking and Applications 6 (2), 155-174, 2013 | 30 | 2013 |
Using the RPL protocol for supporting passive monitoring in the Internet of Things A Mayzaud, A Sehgal, R Badonnel, I Chrisment, J Schönwälder NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 366-374, 2016 | 29 | 2016 |
Efficiently bypassing SNI-based HTTPS filtering WM Shbair, T Cholez, A Goichot, I Chrisment 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 29 | 2015 |
Efficient group key management protocol in MANETs using the multipoint relaying technique MS Bouassida, I Chrisment, O Festor International Conference on Networking, International Conference on Systems …, 2006 | 29 | 2006 |
Bittorrent's mainline dht security assessment JP Timpanaro, T Cholez, I Chrisment, O Festor 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 28 | 2011 |
An enhanced hybrid key management protocol for secure multicast in ad hoc networks MS Bouassida, I Chrisment, O Festor International Conference on Research in Networking, 725-742, 2004 | 27 | 2004 |
Efficient clustering for multicast key distribution in MANETs MS Bouassida, I Chrisment, O Festor International Conference on Research in Networking, 138-153, 2005 | 26 | 2005 |
Efficient DHT attack mitigation through peers' ID distribution T Cholez, I Chrisment, O Festor 2010 IEEE International Symposium on Parallel & Distributed Processing …, 2010 | 25 | 2010 |
Assessing the security of VoIP Services H Abdelnur, R State, I Chrisment, C Popi 2007 10th IFIP/IEEE International Symposium on Integrated Network Management …, 2007 | 25 | 2007 |